Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
Data Protection
Social network security acquisition
Data Protection : 30 April, 2013
Avast makes inroads into social network security and privacy protection with the acquisition of secure.me
 
LivingSocial hack results in continued risks
Data Protection : 29 April, 2013
Check Point is warning of extended risk to LivingSocial users who should beware of unsolicited e-mails
 
Opportunistic breaches a significant threat
Data Protection : 29 April, 2013
Rapid7 comments on the Verizon data breach report and notes that the most likely attacks originate from weak credentials
 
Kaspersky calls for greater cooperation on tackling infrastructure threats
Data Protection : 26 April, 2013
Improved collaboration between the UK Government and the private sector in reducing the increasing threat of infrastructure cyber attacks was the theme of a speech by Kaspersky Lab CEO to Government officials
 
Protection of high value intellectual property
Data Protection : 25 April, 2013
On world intellectual property day, Christian Toon of Iron Mountain examines the value of trade secrets and why their protection must be prioritised
 
On demand cloud encryption services
Data Protection : 24 April, 2013
Crypto Hypervisor from SafeNet provides on-demand high assurance key vaulting and encryption for cloud operations
 
McLaren racing team protects sensitive information with CyberReveal
Data Protection : 24 April, 2013
BAE Systems Detica forms bond with McLaren Group to ensure the protection of highly sensitive intellectual property at the formula 1 racing team
 
Data protection expertise on show at InfoSec
Data Protection : 22 April, 2013
Thales is attending InfoSecurity Europe with its range of high assurance data protection solutions for modern IT infrastructures
 
CyberReveal now available for private sector
Data Protection : 22 April, 2013
Defence grade cyber threat investigation and analysis product from BAE Systems Detica is now available for private sector companies with their own security analysis capabilities
 
Telecom group partnership for Managed Security Services
Data Protection : 19 April, 2013
Reliance Globalcom will be offering managed security services from Dell Secureworks to its integrated telecoms services clients
 
Corporate cyber security work attitudes revealed
Data Protection : 18 April, 2013
Lieberman Software survey finds majority of IT professionals believe their organizations will suffer a data breach
 
Virtual appliance for unified security management
Data Protection : 18 April, 2013
USM virtual appliance performs vulnerability assessment, the detection of threats and behaviour monitoring functions
 
Secure user identification demonstrations at UK trade fair
Data Protection : 17 April, 2013
SecurEnvoy is attending the InfoSecurity Europe event in London with demonstrations and presentations on secure user identification
 
Consumer trust levels low for online retailers
Data Protection : 17 April, 2013
Integralis survey shows lack of trust amongst UK consumers in a business' ability to secure online personal information
 
Survey shows insider threats represent highest security concern
Data Protection : 17 April, 2013
The use of user-owned devices and insider threats have been identified as the biggest security concerns in AlgoSec's State of Network Security survey
 
Pentagon loss highlights importance of e-mail security
Data Protection : 16 April, 2013
Varonis comments on the importance of security in e-mail data after the loss of legal military data from the Pentagon server
 
Cyber spies target British university research
Data Protection : 12 April, 2013
A warning from MI5 identifies the vulnerability of the work of UK university researchers to attacks from foreign cyber spies
 
Most UK companies cannot enforce employee data theft
Data Protection : 10 April, 2013
A study by LogRhythm has revealed that as much as 75% of UK companies don't have an enforceable system of preventing data theft by employees
 
Rich list data shows tangible value of information
Data Protection : 08 April, 2013
David Gibson of Varonis Systems comments on the leak of company wealth and tax data and how valuable such information is to cyber criminals
 
Responsible computing could have prevented Spamhaus DDoS attack
Data Protection : 02 April, 2013
David Gibson, VP of Strategy at Varonis explains how internet providers and users can prevent harmful DDoS attacks through adopting a security culture
 
Rapid7 survey shows insecure corporate data in Amazon buckets
Data Protection : 28 March, 2013
Amazon's simple storage service has been discovered to be used by businesses for storing critical or personal data in an insecure way
 
CISP launch to provide critical threat intelligence
Data Protection : 28 March, 2013
BAE Systems Detica comments on the launch of the Cyber Information Sharing Partnership in the UK and its potential benefit as a gatherer of threat intelligence
 
A defensive approach to staying in control of data security
Data Protection : 28 March, 2013
Rob Sobers of Varonis comments on the plain text password goof of GCHQ and the wider issue of staying in control of who has access to what data
 
IT staff don't believe end users take security seriously
Data Protection : 26 March, 2013
Survey of IT professionals reveals a belief that most end users are complacent towards security in the workplace
 
Healthcare breaches demonstrate the use of data as currency
Data Protection : 22 March, 2013
Varonis comments on high levels of healthcare organisation data breaches and the use of illegal data for marketing purposes
 
Power station challenges infrastructure security
Data Protection : 21 March, 2013
Ross Parsell of Thales examines the critical infrastructure security implications of the plan to build the Hinkley Point nuclear power station
 
Metasploit support for free penetration testing tool
Data Protection : 18 March, 2013
Rapid7 has committed its support for the Kali Linux distribution which provides free enterprise level penetration testing and security auditing capabilities
 
Over a third of companies don't encrypt business data
Data Protection : 15 March, 2013
Kaspersky survey shows the lack of protection afforded to business data with barely a third of companies using any form of encryption
 
Basic control processes needed to combat hacking
Data Protection : 15 March, 2013
A resport from Varonis reveals a lack of basic control as the primary cause for recent increases in hacking
 
Endpoint and server system for threat detection and forensics
Data Protection : 14 March, 2013
A trust based security platform from Bit9 provides real time advanced persistent threat detection and forensics capabilities
 
Service management integration contract for Detica
Data Protection : 14 March, 2013
The UK's Foreign and Commonwealth Office has chosen BAE Systems Detica for the integration of service management
 
Cyber Security standard could increase organisational burden
Data Protection : 07 March, 2013
Cyber-Ark comments on the UK Government's idea for organisational standards in cyber security and what this may mean for UK industry
 
Best encryption award for Datacryptor
Data Protection : 06 March, 2013
The Datacryptor data encryption product from Thales has won a 2013 Global Excellence award in the Info Security Products Guide
 
Password reset advised for Evernote users
Data Protection : 05 March, 2013
LogRhythm comments on industry's reliance on point security leading to such cyber attacks as the recent hack on the Evernote service
 
Common Criteria Certification for Gateprotect
Data Protection : 04 March, 2013
Firewall packet filtering appliance gains common criteria EAL4+ certification from BSI in Germany
 
Endpoint security manager improves user security
Data Protection : 04 March, 2013
With a simple to follow dashboard for IT security managers, Endpoint Security Manager provides a complete picture of end user security
 
Privileged account password segmentation
Data Protection : 28 February, 2013
Lieberman software endorses double safekeeping with password segmentation in enterprise random password manager to enable two-man control on critical applications
 
Challenges associated with Universal credit scheme
Data Protection : 28 February, 2013
Ross Parsell of Thales comments on the Universal Credits Scheme from the UK Government and how it could present a fraud risk.
 
Over half of EU organisations expect data losses
Data Protection : 27 February, 2013
Christian Toon of Iron Mountain examines the concerning complacency being exhibited by companies in Europe surrounding what many of them to be the inevitabilty of data loss
 
Information management overhaul needed for digitizing NHS records
Data Protection : 25 February, 2013
Phil Greenwood of Iron Mountain comments on the data protection and information management implications of the NHS' plans to digitize their paper based records by 2018
 
Google Doc ban at Oxford insufficient protection
Data Protection : 25 February, 2013
Varonis comments on Oxford Uni phishing attack, saying that more protection required against attacks that use trusted services
 
Application threat activity report available
Data Protection : 22 February, 2013
A new report from Palo Alto correlates threat activities and application usage revealing common business application as a higher risk than social networking
 
Audit software identifies privileged account vulnerabilities
Data Protection : 21 February, 2013
To help companies thwart the insider threat, Cyber-Ark is supplying a scanning and identification tool to demonstrate network vulnerabilities through privileged accounts
 
APT threats affecting 20% of enterprises
Data Protection : 15 February, 2013
Survey from ISACA reveals the extent of penetration of Advanced Persistent Threat (APT) attacks on global enterprises
 
Trust attacks signal change in cyber threats
Data Protection : 14 February, 2013
Venafi comments on the changes taking place in the cyber security landscape as trust is becoming increasingly the target of attacks
 
Lack of IT security expertise leaves Britain vulnerable
Data Protection : 13 February, 2013
LogRhythm comments on the National Audit Office's statement that Britain is vulnerable to cyber threats due to a lack of IT security expertise
 
The human factor in IT security
Data Protection : 12 February, 2013
Paul Kenyon of Avecto examines the human factor as being the weakest link in the IT security of an organisation
 
USA and EU Data privacy differences
Data Protection : 12 February, 2013
Andy Green of Varonis explains the cultural divide between the USA and Europe in legislative attitudes towards data privacy expectations
 
Security technology management "inadequate"
Data Protection : 11 February, 2013
IT security company believes digital security certificate breaches highlight inadequacy of security technology management practices
 
Modern encryption methods to be demonstrated at RSA Conference
Data Protection : 06 February, 2013
Thales is exhibiting at the RSA Conference this year with a demonstration of how modern encryption technology compares with the World War 2 Enigma machine
 
First | Prev  | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo