|
|
|
SMS based 2FA overcomes password laziness |
|
|
Authentication
: 04 December, 2014 |
Silvio Kutic, CEO at Infobip examines the problem of a lazy approach to password security and explains how SMS based two-factor authentication could be the answer |
|
|
|
|
 |
|
|
The EU cyber taskforce should only be the beginning |
|
|
Data Protection
: 19 November, 2014 |
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals |
|
|
|
|
 |
|
|
Corporate data security trust restoration |
|
|
Data Protection
: 14 November, 2014 |
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Safe at Any Speed - Best Practices for the Era of 100G |
|
|
Network Security, Routers and Data Centres
: 27 October, 2014 |
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks |
|
|
|
|
 |
|
|
|
|
UK law governing protection of lone workers |
|
|
Lone Worker Protection and Personal Alarms
: 16 October, 2014 |
Mathew Colley of LoneALERT examines the need for UK companies to ensure they have protection in place for employees who work alone |
|
|
|
|
 |
|
|
|
|
Nine DDoS Assumptions That Must Be Put to Bed |
|
|
Anti-virus and anti-malware software
: 04 September, 2014 |
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks |
|
|
|
|
 |
|
|
|
|
|
|
Profile G of open video standard released |
|
|
Books, magazines, journals, analysis and reports
: 08 July, 2014 |
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities |
|
|
|
|
 |
|
|
E-mail spam reaches almost 70% during May |
|
|
Internet Security and Content Filtering
: 08 July, 2014 |
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant |
|
|
|
|
 |
|
|
|
|
|
|
An Intelligent Approach to Fighting Cyber Attacks |
|
|
Data Protection
: 19 June, 2014 |
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime |
|
|
|
|
 |
|
|
Operating in zero trust environments |
|
|
Network Security, Routers and Data Centres
: 30 May, 2014 |
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO |
|
|
|
|
 |
|
|
Heartbleed protection best practices |
|
|
Data encryption
: 22 May, 2014 |
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them |
|
|
|
|
 |
|
|
The information time bomb at the heart of M&As |
|
|
Data Protection
: 19 May, 2014 |
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions |
|
|
|
|
 |
|
|
Re-Thinking the Approach to Real-Time Network Security |
|
|
Network Security, Routers and Data Centres
: 30 April, 2014 |
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time |
|
|
|
|
 |
|
|
Turning the tides against cybercrime |
|
|
Data Protection
: 30 April, 2014 |
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime |
|
|
|
|
 |
|
|
Designing security into the cities of the future |
|
|
Installers, Integrators and Consultants
: 28 April, 2014 |
Frederic Dot, Global Industry Development Director, Dassault Systemes, looks at the effects of digitally modelling cities to improve efficiency, security and public services |
|
|
|
|
 |
|
|
|
|
|
|
Secure offline access to mobile devices |
|
|
Mobile computing security
: 04 April, 2014 |
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced |
|
|
|
|
 |
|
|
|
|
|
|
|
|
The dangers of the commute for sensitive data |
|
|
Data encryption
: 14 January, 2014 |
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees |
|
|
|
|
 |
|
|
|
|
|
|
Free file sanitization from the cloud |
|
|
Anti-virus and anti-malware software
: 03 December, 2013 |
Free cloud based sanitization service from Votiro enables users to upload suspicious files to the cloud for analysis |
|
|
|
|
 |
|
|
Two factor authentication for online identity management |
|
|
Authentication
: 02 December, 2013 |
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company |
|
|
|
|
 |
|
|
|
|
Online retail security best practice |
|
|
Data encryption
: 11 November, 2013 |
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security |
|
|
|
|
 |
|
|
Protecting identity when working remotely |
|
|
Authentication
: 08 November, 2013 |
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed |
|
|
|
|
 |
|
|
The Last Rites of Traditional IT Security |
|
|
Data Protection
: 24 October, 2013 |
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date |
|
|
|
|
 |
|
|
|
|
|
|
Planning outdoor event security |
|
|
Video Analytics and ANPR
: 25 September, 2013 |
Ian Graham, SVP & GM Video EMEA at Verint looks back on this year's outdoor event season and takes a look at the lessons to be learnt for securing them |
|
|
|
|
 |
|
|
|
|
|
|
Web safety needs training as well as technology |
|
|
Training courses, Seminars and Conferences
: 16 September, 2013 |
Bill Walker of QA comments on the recent MP porn scandal and discusses the need for appropriate training in web safety as well as the technology of web filtering |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Understanding risk in virtualized environments |
|
|
Cloud Computing Security
: 16 August, 2013 |
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management |
|
|
|
|
|
|
First | Prev | 1 | 2 | 3 | 4 | 5 | 6 | 7 | Next | Last |