Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
Data Protection
Highly secure USB flash storage for personal data protection
Data Protection : 30 July, 2014
The datAshur Personal flash drive from iStorage has been launched as an ultra-secure but affordable personal data storage device
Messaging and billing company takes secure platform for AWS
Data Protection : 23 July, 2014
Alert Logic is supplying Fonix Mobile with a secure messaging and payment platform on Amazon Web Services for its SMS messaging and mobile payment billing services
Log management for AWS Marketplace
Data Protection : 18 July, 2014
Users of Amazon Web Services Marketplace gain log management capabilities as part of Alert Logic's SaaS security services
FIPS certification for PC on a stick
Data Protection : 15 July, 2014
The IronKey Workspace W700 PC on a stick from Imation has received FIPS 140-2 level 3 certification enabling its use in federal agencies
Low awareness levels of ICO fines for breaching Data Protection Act
Data Protection : 14 July, 2014
A third of security professionals responding to an iStorage survey were unaware of the level of financial penalties companies face for Data Protection Act breaches
Managed service for application monitoring
Data Protection : 24 June, 2014
The Panda Advanced Protection Service takes proactive approach to security with automatic application classification and exploit detection
18 percent of smaller businesses face Windows XP risks
Data Protection : 23 June, 2014
Research shows that large numbers of small and medium sized businesses are continuing to face malware attack risks by using the unsupported Windows XP operating system
Advanced SIEM for improved detection rates
Data Protection : 19 June, 2014
NTT Com Security is improving the detection of unknown threats with its advanced security information and event management capabilities
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
UK Financial organisation security confidence surveyed
Data Protection : 09 June, 2014
Tripwire has released the conclusions of its survey into the confidence placed by UK financial organisations in the security controls they have in place
Big data retrieval leading to increased burden on IT resources
Data Protection : 30 May, 2014
A study by Iron Mountain has shown that IT professionals are under increasing pressure to devote more time to the retrieval of data
Secure microcontroller for e-Government applications
Data Protection : 21 May, 2014
Dual interface secure microcontroller supplies strong user authentication for e-Government applications such as ID and health insurance cards
The information time bomb at the heart of M&As
Data Protection : 19 May, 2014
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions
Software-as-a-Service penetration testing available
Data Protection : 16 May, 2014
The ImmuniWeb security testing service for web application penetration testing and vulnerability scanning is now generally available after beta testing
Secure enterprise search capability in office documents
Data Protection : 14 May, 2014
Spreadsheets, presentations and documents can be searched securely across an organisation giving access to valuable collective information assets using DatAnswers
UK consumer confusion over EU data privacy proposal
Data Protection : 13 May, 2014
EU "right to be forgotten" rules result in confusion and complacency amidst UK consumers who don't believe a new law would be effective
Change tracking for database vulnerability assessment
Data Protection : 02 May, 2014
The latest version of NNT Change Tracker provides system auditing and change detection for assessing vulnerabilities in databases
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
Cloud management console for endpoint protection
Data Protection : 29 April, 2014
Webroot's SecureAnywhere Global Site Manager provides endpoint protection management in the cloud
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
Cyber threat visibility management system
Data Protection : 24 April, 2014
Check Point releases new security management and monitoring appliances for improved threat visibility in big data environments
Business context crucial in risk assessment
Data Protection : 15 April, 2014
Survey results show importance of business context in the prioritisation of IT security vulnerabilities
UK industry failing to control insider threats
Data Protection : 15 April, 2014
Study from LogRhythm shows the extent to which rogue insiders have free rein on company data in UK industry
Research shows preference for on-premises file sharing and collaboration
Data Protection : 07 April, 2014
Varonis research demonstrates preferences amongst IT professionals for on-premises systems rather than cloud based
Preventing avoidable data breaches
Data Protection : 04 April, 2014
Iron Mountain comments on the Cumbria County Council data breach and how such avoidable incidents can be prevented
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
Global threat intelligence report available
Data Protection : 02 April, 2014
Threat avoidance, response and detection feature within the 2014 global threat intelligence report from NTT Group
Large numbers of companies still operating unsupported Windows XP
Data Protection : 02 April, 2014
With less than a week left before support is withdrawn from Windows XP, Appsense finds over three quarters of UK companies still running the old OS
XP users advised to increase defences
Data Protection : 02 April, 2014
LogRhythm provides advice to Windows XP users on how to take action to minimise vulnerability risk after support withdrawal
Personal data protection warning as USA prepares tax returns
Data Protection : 27 March, 2014
iovation is warning US tax payers of the dangers of internet fraud and identity theft during the season for filing tax returns
Confidential data leak risk with former employees
Data Protection : 24 March, 2014
Incident involving former Microsoft employee demonstrates the risks to companies of data security when employees leave the company
Connection established between Turla and military computer breach
Data Protection : 13 March, 2014
Kaspersky Lab explains the connection between the Turla cyber espionage operation and the Agent.BTZ breach of six years ago
Partnership delivers privileged identity management to Scandinavia
Data Protection : 13 March, 2014
Lieberman Software has expanded its reach into Scandinavia with a distribution agreement with IT2trust for privileged access management
Small businesses underestimate cyber attack risk
Data Protection : 11 March, 2014
Kaspersky Lab Research indicates smaller businesses in the UK are underestimating the amount of risk they face from the activities of cyber criminals
SIEM market forecast for 5 years
Data Protection : 10 March, 2014
The market for Security Information and Event Management software (SIEM) out to 2019 is examined in a new report
Behavioural analysis based intruder detection
Data Protection : 05 March, 2014
DB Networks is providing advanced database threat protection through an Intruder Detection System virtual appliance based on behavioural analysis
Security export strategy to keep UK at the forefront of technology
Data Protection : 03 March, 2014
The UK Government's recently released security export strategy provides encouraging support to the country's cyber security industry
Security monitoring partner programme launched
Data Protection : 03 March, 2014
Lancope has set up a new global partner programme to meet increased demand for the StealthWatch security monitoring system
UK industry attitudes to growth in cyber threats
Data Protection : 28 February, 2014
Research from BAE Systems Applied Intelligence shows increased spending expected in UK industry to counter expected cyber threats
Putting simplicity into effective file integrity monitoring
Data Protection : 27 February, 2014
Mark Kedgley of New Net Technologies explains the importance of real time file integrity monitoring and how it can be achieved without unnecessary complexity
Cloud based vulnerability management
Data Protection : 25 February, 2014
Free vulnerability management system provides cloud based service for smaller businesses of up to 100 IP addresses
Cloud based threat intelligence to combat APTs
Data Protection : 25 February, 2014
BrightCloud and BreachLogic from Webroot provide protection from advanced threats on endpoint devices within the enterprise
Privileged account auditing for reduced vulnerability
Data Protection : 20 February, 2014
A tool for the discovery and auditing of privileged accounts on networks can be used for the prevention of pass-the-hash style attacks
Internal security breaches a serious issue in UK industry
Data Protection : 19 February, 2014
Report details extent of the insider threat to UK businesses with only a quarter of IT professionals considering it to be a security priority
Health insurer protects data from unauthorised access
Data Protection : 19 February, 2014
Highly sensitive patient data held by Tasmanian health insurance company gains protection with the use of DatAdvantage from Varonis Systems
Behavioural analysis and continuous monitoring deployment
Data Protection : 17 February, 2014
Navis has taken the IDS-6300 intelligent security appliance from DB Networks for behavioural analytics and coninuous monitoring
Threat response partnership formed
Data Protection : 14 February, 2014
Bit9 and Carbon Black have joined forces to deliver rapid threat response capabilities for the IT industry
Mainframe security acquisition
Data Protection : 07 February, 2014
Imperva acquires z/OS mainframe security expertise from Tomium Software for integrated real-time monitoring
Webinar explores data breach prevention for retailers
Data Protection : 06 February, 2014
Lancope is providing retailers with insight into protection from data breaches using network visibility improvements at two forthcoming webinars
Privileged identity management to integrate with CARM initiative
Data Protection : 04 February, 2014
Lieberman Software chooses Exclusive Network as first UK distribution partner for its privileged management software.
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo