Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Special Report
From fiction to reality: tackling the cyber threats of tomorrow
Anti-virus and anti-malware software : 15 December, 2014
Kirill Slavin, general manager at Kaspersky Lab UK&I examines the future of IT security and the rise in significance of the internet of things
SMS based 2FA overcomes password laziness
Authentication : 04 December, 2014
Silvio Kutic, CEO at Infobip examines the problem of a lazy approach to password security and explains how SMS based two-factor authentication could be the answer
The EU cyber taskforce should only be the beginning
Data Protection : 19 November, 2014
Rob Lay, Solutions Architect for Enterprise and Cyber Security, UK & Ireland for Fujitsu explains why the Europol cyber task force is not enough for companies to rely on for protection against cyber criminals
Corporate data security trust restoration
Data Protection : 14 November, 2014
Paul Hampton, Payment & Crypto management expert at SafeNet explains the four steps required to restore trust in corporate data security
Use the Power of the Pyramid to Protect Critical Data
Data Protection : 13 November, 2014
Steve Martino, Chief Information Security Officer, Vice President, Information Security at Cisco explains the prioritization requirements of data protection
Office worker survey shows high levels of complacency over data loss
Data Protection : 12 November, 2014
Imation has performed a study into company employee views on data risk and the vulnerability of confidential data in the hands of remote workers
Avoiding the pitfalls of authentication based IT security
Authentication : 10 November, 2014
David Hald, co-founder and chief relation officer, SMS PASSCODE provides a step-by-step guide to understanding the common pitfalls of authentication-based security
Safe at Any Speed - Best Practices for the Era of 100G
Network Security, Routers and Data Centres : 27 October, 2014
Dan Joe Barry, vice president of marketing at Napatech, explains the best practices in providing protection for the latest generation of high speed networks
Measuring success in threat management programmes
Data Protection : 16 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco continue their examination of unified security metrics programmes by discussing success measurement
UK law governing protection of lone workers
Lone Worker Protection and Personal Alarms : 16 October, 2014
Mathew Colley of LoneALERT examines the need for UK companies to ensure they have protection in place for employees who work alone
Creating an IT Metrics programme to Safeguard the Network
Data Protection : 14 October, 2014
Sujata Ramamoorthy and Hessel Heerebout of Cisco Systems explain the importance of setting up a unified IT security metrics programme
Nine DDoS Assumptions That Must Be Put to Bed
Anti-virus and anti-malware software : 04 September, 2014
Xuhua Bao, Hai Hong and Zhihua Cao of NSFOCUS dispel nine popular myths that surround Distributed Denial of Service attacks
Corporate data risks through mixing personal and business applications on one device
Data Protection : 31 July, 2014
Florian Malecki, international product and marketing director, Dell Security examines the corporate security problems associated with the BYOD culture
Safe mobile connectivity in an age of industrialized hacking
Mobile computing security : 22 July, 2014
Cisco Security Strategist, Sean Newman, discusses the increased use of employee-owned devices and how to stay safe during a corresponding increase in mobile malware
Profile G of open video standard released
Books, magazines, journals, analysis and reports : 08 July, 2014
Open network video standard organisation, ONVIF, has released Profile G to cater for storage, search and retrieval capabilities
E-mail spam reaches almost 70% during May
Internet Security and Content Filtering : 08 July, 2014
May saw a small reduction in e-mail spam with mass educational mailings offering distance learning being predominant
Reducing Risk With Effective Encryption Management
Data encryption : 02 July, 2014
Jason Thompson, Director of Global Marketing at SSH Communications Security discusses the role of encryption management in risk reduction
Securing Third-Party Access of IT Systems in the Public Sector
Authentication : 02 July, 2014
Matt Middleton-Leal, Regional Director, UK and Ireland at CyberArk discussing the security challenge surrounding the emerging trend of smaller companies gaining privileged access to Government IT resources
An Intelligent Approach to Fighting Cyber Attacks
Data Protection : 19 June, 2014
Greg Akers, Senior Vice President, Advanced Security Initiatives Group – Threat Response Intelligence and Development, Cisco examines the use of intelligence in fighting cyber crime
Operating in zero trust environments
Network Security, Routers and Data Centres : 30 May, 2014
Dr Wieland Alge, Vice President and General Manager EMEA Barracuda Networks discusses zero trust environment infrastructures and the role of the CIO
Heartbleed protection best practices
Data encryption : 22 May, 2014
Kalle Jääskeläinen of SSH Communications Security explains the seriousness of the consequences of Heartbleed and best practices for protecting against them
The information time bomb at the heart of M&As
Data Protection : 19 May, 2014
Charlotte Marshall, Managing Director of Iron Mountain in the UK, Ireland and Norway examines the need for integrated information security during mergers and acquisitions
Re-Thinking the Approach to Real-Time Network Security
Network Security, Routers and Data Centres : 30 April, 2014
Dan Joe Barry, vice president of marketing at Napatech explains how multiple attack vectors are causing a change of approach to securing networks in real time
Turning the tides against cybercrime
Data Protection : 30 April, 2014
Kalyan Kumar, Chief Technologist, HCL Technologies explains the measures companies can take to protect themselves from the rising tide of cyber crime
Designing security into the cities of the future
Installers, Integrators and Consultants : 28 April, 2014
Frederic Dot, Global Industry Development Director, Dassault Systemes, looks at the effects of digitally modelling cities to improve efficiency, security and public services
Retail industry suffers rise in cyber crime
Data Protection : 25 April, 2014
David Robinson, chief security officer at Fujitsu UK & Ireland discusses the recent rise in cyber-crime in the retail industry
The evolution of technology platforms – what does this mean for businesses?
Network Security, Routers and Data Centres : 16 April, 2014
Wieland Alge, VP and general manager for EMEA, Barracuda Networks examines the evolution of technology to the "3rd platform"
Secure offline access to mobile devices
Mobile computing security : 04 April, 2014
Mobile Helix explains the risks associated with offline access on mobile devices and how vulnerabilities can be reduced
Securing big data from the latest threats
Data Protection : 03 April, 2014
Jonathan Lewis of SSH Communications Security examines the growth in big data and the implications for ensuring security
Vulnerabilities in a brave new world of the internet of things
SCADA and ICS protection : 07 March, 2014
Richard Moulds, VP Strategy at Thales e-Security examines the internet of things, how it affects peoples' daily lives and the vulnerabilities that it introduces
Securing the future with multi-factor authentication
Authentication : 17 February, 2014
Claus Rosendal of SMS PASSCODE examines multi-factor authentication as a means of providing stronger security across the IT spectrum
The dangers of the commute for sensitive data
Data encryption : 14 January, 2014
Iron Mountain's head of Information Risk, Christian Toon, discusses the vulnerability of sensitive company data during the daily commute of company employees
Today’s Core Network Security Requires a New Approach to Prevent against Destructive SQL Attacks
Data Protection : 20 December, 2013
Michael Sabo, VP of Marketing at DB Networks explains the continued prominence of SQL injection attacks and the approaches needed for their prevention
Combatting Cyber-Attacks Takes more than Incident Detection
Network Security, Routers and Data Centres : 06 December, 2013
Mike Horn of NetCitadel examines new approach to cyber threat management connecting threat detection to appropriate and timely responses
Free file sanitization from the cloud
Anti-virus and anti-malware software : 03 December, 2013
Free cloud based sanitization service from Votiro enables users to upload suspicious files to the cloud for analysis
Two factor authentication for online identity management
Authentication : 02 December, 2013
SecurEnvoy explains how to reduce the risk of unauthorized data access using a variety of two-factor authentication that doesn't rely on seed records being held by the authentication company
Is there such a thing as a silver bullet for web application security?
Internet Security and Content Filtering : 29 November, 2013
Jerome Clauzade of Bee Ware examines web application security and an effective structure for implementing it using a combined resource approach
Online retail security best practice
Data encryption : 11 November, 2013
Dave Anderson of Voltage Security explains best practices for online retailers to ensure high levels of security
Protecting identity when working remotely
Authentication : 08 November, 2013
SecurEnvoy's Steve Watts explains the variants of two-factor authentication and how companies can prevent their data from being accessed
The Last Rites of Traditional IT Security
Data Protection : 24 October, 2013
Anti-Virus (AV) software, along with its Firewall side-kick, has been the standard weapon against Internet borne threats for the past two decades. But in a changing threat landscape AV is fast beginning to look past its sell-by date
Non-human identity management in process automation
Identity Management : 21 October, 2013
Jonathan Lewis of SSH Communications Security discusses the role of Secure Shell for the authentication of non-human identities in M2M networks
Your CMS is the path of least resistance for industrial hackers
Data Protection : 09 October, 2013
Imperva's Director of Cyber Security, Barry Shteiman explains how content management systems and their plug-ins are an easy route to mischief for modern industrial hackers
Planning outdoor event security
Video Analytics and ANPR : 25 September, 2013
Ian Graham, SVP & GM Video EMEA at Verint looks back on this year's outdoor event season and takes a look at the lessons to be learnt for securing them
Balancing staff acquisition with IT security requirements
Data Protection : 24 September, 2013
Raj Samani of McAfee explains the steps needed to secure information assets in small businesses from insider threats when recruiting new staff
Cybercrime-as-a-service: SMEs can’t compete with lucrative trade
Data Protection : 20 September, 2013
Raj Samani, VP Chief Technology Officer at McAfee EMEA reveals how cybercriminals take advantage of small business websites
Web safety needs training as well as technology
Training courses, Seminars and Conferences : 16 September, 2013
Bill Walker of QA comments on the recent MP porn scandal and discusses the need for appropriate training in web safety as well as the technology of web filtering
Small organizations just as vulnerable as corporates
Data Protection : 06 September, 2013
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
Hybrid analogue and IP surveillance network benefits
IP and Megapixel cameras : 02 September, 2013
Samsung Techwin provides insight into the benefits to be gained from using IP surveillance cameras with analogue outputs on hybrid camera networks
Mobile forensics vital in finding honour killing victim
Computer Forensics and Data Forensics : 28 August, 2013
Cellebrite explains the important role of forensic investigations of mobile devices in finding the body of honour killing victim, Banaz Mahmod
Understanding risk in virtualized environments
Cloud Computing Security : 16 August, 2013
Frederik Bijlsma of Red Hat explores virtualization and how reducing uncertainty and understanding exposures can bring about improvements in risk management
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo