Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Special Report
Improve productivity with the elimination of internet abuse
Exhibitions and Trade Shows : 02 April, 2009
Eamonn Doyle of internet filtering specialists, Bloxx discusses the scope of internet abuse in the workplace and the resulting impacts on employee productivity
 
Budget cuts and continued IT Security
Exhibitions and Trade Shows : 01 April, 2009
Andrew Fourie of Astaro looks at the paradox of maintaining effective IT security systems whilst undergoing budgetary restrictions
 
Securing against insider threats
Exhibitions and Trade Shows : 01 April, 2009
Sacha Chahrvin of DeviceLock explains the extent of insider threats to data security and how to mitigate against them
 
Protecting company data from prying eyes
Exhibitions and Trade Shows : 16 March, 2009
Colin Tankard of Digital Pathways discusses the significance of the internal threat as part of a corporate IT security strategy
 
Maintaining network security in the face of growing challenges
Exhibitions and Trade Shows : 16 March, 2009
Anton Grashion of Juniper Networks takes a look at network security protection and the changing approaches required
 
Managing internet usage without locking users out
Exhibitions and Trade Shows : 16 March, 2009
Greg Day of McAfee International examines the tasks of the IT Manager in controlling IT resource usage with growing user demands
 
Insider threats and the increasing ease of data theft
Exhibitions and Trade Shows : 16 March, 2009
Sacha Chahrvin of DeviceLock explains the need for internal controls of user data to prevent accidental leakage or deliberate sabotage
 
A look at the risks of outsourcing IT
Exhibitions and Trade Shows : 12 March, 2009
Rob Rachwald of Fortify Software offers advice on how to tackle the tricky decision as to whether and how to achieve secure outsourcing
 
Virtualisation and security
Exhibitions and Trade Shows : 09 March, 2009
Bill Beverley of F5 Networks examines the security implications of working in a virtualized environment
 
Security in the cloud examined for 2009
Exhibitions and Trade Shows : 09 March, 2009
Pravin Mirchandani of Syphan Technologies cuts through the hype of cloud computing and examines whether 2009 will truly be the year when security as a service takes off
 
Fuzzing helps reveal hidden flaws
Exhibitions and Trade Shows : 09 March, 2009
Ari Takanen of Codenomicon explains a technology which can be used to bring out the flaws in commercial software that are often kept from the public eye
 
Sifting through unknown vulnerabilities
Exhibitions and Trade Shows : 09 March, 2009
Chris Schwartzbauer of Shavlik Technologies provides some background into intelligent discovery of hidden vulnerabilities
 
How to merge firewall real estates
Exhibitions and Trade Shows : 09 March, 2009
David Amnizade of Tufin Technologies clears the path to achieving merged network security during mergers and acquisitions
 
A softly-softly approach to online access management
Exhibitions and Trade Shows : 09 March, 2009
Asa Davidson of WebSpy provides some advice on managing internet and e-mail usage in the workplace without alienating the workforce
 
Comparison between public and private sector data classification
Exhibitions and Trade Shows : 09 March, 2009
Dr Bernard Parsons from BeCrypt looks at the history of public sector data classification and how private sector companies can learn from their experience
 
Payment Card Industry DSS mistakes
Exhibitions and Trade Shows : 09 March, 2009
Protegrity's Ian Schenkel highlights the top ten slip-ups made in attempts to become PCI compliant
 
A peak into the future of IT Security
Trade Organisations, User Groups and Pressure Groups : 04 March, 2009
Mike Small of Computer Associates assesses the changes taking place in the IT Security industry and takes a glimpse into what the future may hold
 
Advice on prevention of data leakage
Data Protection : 02 March, 2009
As the recession presents further opportunities for the hacking community, Mark Fullbrook of Cyber-Ark Software examines how to make their lives more difficult
 
Cloud computing security survey results
Exhibitions and Trade Shows : 19 February, 2009
Large proportion of organisations expect to increase their security budgets to co-incide with planned moves into Cloud Computing applications
 
Automated Risk and Compliance Management
Exhibitions and Trade Shows : 19 February, 2009
Gidi Cohen of Skybox Security examine IT Risk and Compliance Management and how it can be managed in a more automated fashion
 
Building information assurance into core business processes
Exhibitions and Trade Shows : 19 February, 2009
Stephen Lewis of AEP Networks examines ways that organizations can help in the protection of personal data through improved business processes
 
Choosing an approach to software security
Exhibitions and Trade Shows : 19 February, 2009
Mano Paul, a security advisor at (ISC)2 explains the details of achieving comprehensive software security
 
Understanding open source security risks
Exhibitions and Trade Shows : 18 February, 2009
Rob Rachwald of Fortify Software explains the risks associated with Open Source Software and provides tips on optimising security
 
Preview of E-Crime Parliamentary Advisory Forum
Exhibitions and Trade Shows : 18 February, 2009
Positive moves are being expected from the annual parliamentary forum on e-crime which is due to take place in the UK next week
 
Achieving Web 2.0 security
Exhibitions and Trade Shows : 13 February, 2009
Roger Thornton of Fortify and Jennifer Bayuk provide insight into operating a Web 2.0 environment securely
 
An overview of Data Loss Prevention
Exhibitions and Trade Shows : 13 February, 2009
Stephen Midgley of Absolute Software provides a mechanism for preventing data from leaking out of the organization from many points
 
Best practice guide to the protection of personal data
Exhibitions and Trade Shows : 13 February, 2009
Gordon Rapkin of Protegrity provides a best practice guide to protecting personally identifiable information
 
Using the advantages of logging and reporting systems
Exhibitions and Trade Shows : 13 February, 2009
Lagis Zavros of Webspy examines how log data can help an organisation and provides advice on pro-active logging and reporting
 
Profile of Internet security innovator and entrepreneur Melih Abdulhayoglu
Data Protection : 04 February, 2009
Energetic entrepreneur and Comodo founder profile reveals the difference between trust and security and provide some analogous real world food for thought!
 
Code review and WAP firewalls for PCI Compliance
Payment cards and e-commerce security : 29 January, 2009
Ulf Mattsson, Chief Technology Office at Protegrity provides a detailed review of attaining PCI compliance using Web Application Firewalls and Code Reviews
 
Are virtual desktops just a return to mainframe computing?
Exhibitions and Trade Shows : 29 January, 2009
David Ting of Impravata discusses hosted virtual desktops and takes a balanced view of the advantages and disadvantages
 
The developing trend towards secure software as a service
Exhibitions and Trade Shows : 29 January, 2009
Javier Peralta of Optenet takes a look at the advantages of using secure web gateways in Software-as-a-Service mode
 
Growth in transient drive-by infections
Anti-virus and anti-malware software : 28 January, 2009
AVG provides detailed insight into the changing trends of malware infection mechanisms using transience and stealth to automatically deliver malicious software payloads with minimal detection risk
 
Making the choice between hardware and software encryption
Data Protection : 28 January, 2009
Ulf Mattson, CTO of Protegrity offers a thorough insight into making the difficult choice between hardware and software-based encryption
 
USB flash drive security from two directions
Data Protection : 28 January, 2009
Jason Holloway of SanDisk Enterprise Division examines the methods of preventing data from leaking out and viruses from seeping in through USB devices
 
The principles of solid encryption key management
Data Protection : 27 January, 2009
Ulf Mattson, the Chief Technology Officer of Protegrity, answers questions on critical aspection of managing the encryption key security chain
 
The pros and cons of corporate use of Web 2.0
Exhibitions and Trade Shows : 19 December, 2008
Alan Calder of IT Governance explains the growing use of Web 2.0 in the world of commerce and how its security exposures can be mitigated
 
Leaving your digital fingerprints lying around
Exhibitions and Trade Shows : 19 December, 2008
Greg Day of McAfee International looks at digital fingerprints and examines how identity thieves can use them to their advantage
 
Understanding the myths of data security
Exhibitions and Trade Shows : 15 December, 2008
Gordon Rapkin of Protegrity gives a breakdown of the 10 most common myths associated with data protection
 
Making security policies work for you
Exhibitions and Trade Shows : 15 December, 2008
David Aminzade of Tufin Software explains the need for more than just an IT Policy within an organisation and how to achieve full protection
 
Getting the IT security message through to the board
Data Protection : 12 November, 2008
Fortify Software's European Director, Richard Kirk explains the art of providing management justifications for changes that may need to be made to keep ahead of the game.
 
Policies without supporting technology are futile
Data Protection : 04 November, 2008
Calum MacLeod of Cyber-Ark reinforces the importance of installing information security technologies to support policies and standards
 
Prevention of administrative account abuse
Data Protection : 30 October, 2008
Staphane Fymat, Business Development and Strategy VP of Passlogix discusses the avoidance of the kind of privileged account abuse which recently brought down San Francisco's FibreWAN network
 
Compelling reasons for not using counterfeit software
Anti Counterfeiting : 14 August, 2008
Andrew McLennan from Metaforic explains in very simple terms how software piracy affects everyone and what the consequences are of subscribing to counterfeit IT products
 
H.264, the new compression standard for megapixel cameras
IP and Megapixel cameras : 04 June, 2008
Milestone Systems' CTO, John Blem, gives a balanced view of the compression standard everyone's talking about, H.264
 
The Anvil Group provides details of the Corporate Manslaughter and Corporate Homicide Act.
Legal, insurance and recruitment : 21 April, 2008
With the advent of new UK legislation covering corporate manslaughter and homicide, the Anvil Group shares its insightful white paper on the subject exclusively with ProSecurityZone readers.
 
Skills for Security to take prominent role in IFSEC 2008
Training courses, Seminars and Conferences : 10 April, 2008
With a series of not-to-miss seminars, the popular Apprenticeship Challenge and a conference covering a wide area of topics, Skills for Security will be taking a significant position in Europe's largest security exhibition.
 
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo