Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
Data Protection
Venafi says encryption crack challenge flawed
Data Protection : 06 February, 2013
A challenge to crack storage system is said to be easy to achieve by Venafi as encryption keys remain stored with user files
 
Privacy issues surround DNA and biometric data
Data Protection : 05 February, 2013
Andy Green of Varonis examines the Personally Identifiable Information issues surrounding DNA profiles and biometric data
 
Chinese cyber attack hits New York Times
Data Protection : 01 February, 2013
BAE Systems Detica points out the need for on-going threat monitoring to prevent disruptive attacks such as that which recently hit the New York Times
 
Endpoint security system for growing number of attached devices
Data Protection : 01 February, 2013
The latest version of Kaspersky Endpoint Security for Business enhanced to cope with greater numbers of attached devices and improve workforce mobility
 
Increased capacity on secure USB and portable storage
Data Protection : 31 January, 2013
Portable drives and secure USB sticks with hardware encryption gain increased storage capacity in new datAshur and diskAshur range from iStorage
 
IT professionals wary of virtual server access security
Data Protection : 30 January, 2013
Varonis reveals result of research showing almost half of IT organisations suspecting unauthorized file access on virtual servers
 
Prison terms step up legal battle against cyber crime
Data Protection : 28 January, 2013
FireEye comments on the recent internment in the UK of two cyber criminals for taking part in high impact denial of service attacks
 
EU business culture of inevitable data loss
Data Protection : 28 January, 2013
On European Privacy and Data Protection day, Iron Mountain comments on the attitudes of EU companies towards data loss, resigning themselves to its inevitability
 
Imperfect data security represents serious business risk
Data Protection : 28 January, 2013
Data security specialist at Axway comments on the risks companies face by not ensuring that their data is adequately secured
 
Privileged session management for Unix systems
Data Protection : 25 January, 2013
Cyber-Ark is now providing a privileged session management system that is available for securing systems based on the Unix platform
 
Staffordshire Schools select cloud data protection system
Data Protection : 25 January, 2013
The schools of the UK county of Staffordshire have solved their data protection problems in the cloud with the use of encryption software from DESlock
 
Implications of new EU cyber security legislation
Data Protection : 23 January, 2013
LogRhythm comments on the duties placed on large internet companies by the latest cyber security legislation to come from the European Union
 
Survey shows Paris residents pose greater insider threat
Data Protection : 23 January, 2013
Imperva has conducted a survey comparing London residents with those from Paris regarding risk to corporate data through the insider threat
 
UK partner to implement random password management in the country
Data Protection : 23 January, 2013
Accumuli has joined privileged identity management company Lieberman Software to distribute and implement Enterprise Random Password Manager in the country
 
Security framework strategy defined
Data Protection : 23 January, 2013
Responding to increased focus on integrated IT security strategies in corporations, McAfee further develops its Security Connected framework
 
Australia sets cyber security mitigation strategies
Data Protection : 22 January, 2013
Strategy in Australia to tackle cyber security through minimising privileged access, managing patches and whitelisting applications
 
Cyber security predictions for 2013
Data Protection : 16 January, 2013
Experts at BAE Systems Detica provide their thoughts on how the cyber threat landscape will look during the coming year
 
UK company chosen for global channel management for DESlock
Data Protection : 16 January, 2013
Data encryption specialist DESlock has appointed Insight in the UK to be its global channel partner
 
Trust-based environments safe against Java vulnerability
Data Protection : 15 January, 2013
Bit9 comments on the recent vulnerability announced on the Java platform with trust-based environment users being unaffected
 
Military at risk through poor definition of cyber warfare
Data Protection : 14 January, 2013
BitDefender comments on military cyber risk in the UK and the need for better informed policy making based on the definitions of cyber warfare
 
Cyber criminals focus on lucrative malware for 2013
Data Protection : 07 January, 2013
BitDefender predicts the 2013 cyber threat landscape with more focus on lucrative strains of banking trojans and other related malware
 
ISACA identifies key IT trends of 2013
Data Protection : 20 December, 2012
Looking to the year ahead, ISACA identifies certain aspects of IT security that will have the greatest impact on organizations
 
Extensible Content Security for SME businesses
Data Protection : 20 December, 2012
Centralised management for content security features in the latest edition of XCS solutions available from WatchGuard
 
BYOD security tops Avecto list of 2013 IT trends
Data Protection : 19 December, 2012
Avecto has provided its list of the top 5 trends in IT security for 2013 including Windows 8 issues and Bring-Your-Own-Device (BYOD)
 
UK E-Crime unit makes ransomware arrests
Data Protection : 14 December, 2012
LogRhythm comments on the recent arrests of three people in the UK regarding ransomware, the latest cyber threat
 
Pop-up fines target computer users in surge in ransomware
Data Protection : 14 December, 2012
Following UK arrests for ransomware, FireEye comments on the proliferation of attacks designed to scare computer users into paying fake fines from police and FBI
 
Encryption emerges as favoured technology for data protection
Data Protection : 14 December, 2012
Implementation problems limit the adoption of encryption by some users but still highly popular among businesses for the protection of sensitive data
 
Identity management flaws lead to Swiss attack
Data Protection : 07 December, 2012
A cyber attack on the national security agency of Switzerland has been put down to poor control over identity and access management
 
UK Government produces cyber security strategy
Data Protection : 04 December, 2012
BAE Systems Detica comments on recent announcement from the UK Government on the country's cyber security strategy
 
Biggest security challenge for 2013 to be APT threats
Data Protection : 04 December, 2012
IT Governance identifies Advanced Persistent Threats (APT) as the greatest challenge for IT security professionals in 2013
 
Vulnerabilities of online critical infrastructure
Data Protection : 03 December, 2012
FireEye comments on the recent debate surrounding the movement of critical structure to online environments
 
Salami attacks predicted to increase as an IT threat
Data Protection : 28 November, 2012
Dubbed Salami attacks, composite threats of small attacks combining to create something larger are predicted to grow by Varonis
 
IT professionals prioritising data protection
Data Protection : 28 November, 2012
Study from Kaspersky Lab reveals the prioritisation of infrastructure security and data protection by IT professionals in business environments
 
PC on a Stick available in beta
Data Protection : 26 November, 2012
IronKey Workspace for Windows to Go provides security and speed from a secure USB plugged computing environment
 
Mentor network takes data access management from Varonis
Data Protection : 21 November, 2012
Access to critical data has been simplified in a fluid multiple user environment at the Mentor Network with the use of the Varonis IDU Classification Framework
 
German government issues guidelines on keeping computers secure
Data Protection : 21 November, 2012
Avecto has commented on the German Government IT security arm's advice on securing computers with effective user rights management
 
Over a fifth of businesses losing data due to BYOD
Data Protection : 13 November, 2012
Poor Bring-Your-Own-Device (BYOD) policies are costing corporations their reputations with over a fifth admitting to losing data because of them
 
Data breach mandatory notification for Australia
Data Protection : 12 November, 2012
Varonis comments on the possibility of Australia falling in line with the USA and the EU with the introduction of compulsory declaration of data breaches
 
Security award for securing sensitive information
Data Protection : 12 November, 2012
A project involving large volumes of sensitive information results in security award for participants Callcredit and LogRhythm
 
UK Government Open It Standards Adoption
Data Protection : 12 November, 2012
AlienVault comments on the recent news concerning the use of open IT standards by UK government bodies
 
Star Wars analogy illustrates the IT security jungle
Data Protection : 08 November, 2012
Check Point looks into the lessons provided by the Star Wars fantasy in user authentication and Data Loss Prevention for IT security
 
UK public sector data breach fines reach 2 million pounds
Data Protection : 06 November, 2012
Costing the UK public sector as much as 2 million pounds in fines, information security is proving to be a financial headache for non-commercial organisations
 
EU security governance demonstrated with cyber security strategy plan
Data Protection : 01 November, 2012
Varonis has commented on the recently released cyber security strategy from the European Commission, signalling an important step in cross border governance
 
Hacker forum monitor reveals social media black market
Data Protection : 31 October, 2012
Imperva has been continuing to monitor hacker forums to bring security intelligence about hacker activities including black markets in social network details
 
PIN scam shows fraudsters still use traditional methods
Data Protection : 29 October, 2012
ValidSoft comments on the recent Barnes and Noble PIN scam which shows fraudsters still targetting traditional payment methods
 
Stoke Council fined by ICO over mishandling of sensitive data
Data Protection : 26 October, 2012
Christian Toon, Head of Information Risk for Iron Mountain comments on the recent fine levied on Stoke Council for sending sensitive information to the wrong person
 
Privileged Identity Management through McAfee ePO
Data Protection : 25 October, 2012
Enterprise Random Password Manager has been updated to provide privileged identity management to users of McAfee's ePolicy Orchestrator
 
Application control based on source of downloaded material
Data Protection : 25 October, 2012
Privilege Guard has undergone a dot release to enhance functionality with new feature enabling the control of application based on download source
 
SAP certification for privileged identity management
Data Protection : 23 October, 2012
Enterprise Random Password Manager from Lieberman Software provides privileged identity management on SAP NetWeaver platform
 
Managing The Social Impact of Least Privilege Security
Data Protection : 15 October, 2012
Paul Kenyon, COO of Avecto explains how desktop lockdown doesn’t mean taking the personal out of PC
 
First | Prev  | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo