Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
Data Protection
Advisory board to provide guidance on IT security directions
Data Protection : 18 November, 2016
A group of experts has been formed to create an advisory board to LightCyber on security analytics and future technical and market directions
 
User behaviour visibility increases attack detection
Data Protection : 09 November, 2016
Latest release of behavioural attack detection platform increases user behaviour visibility and adds VPN granularity
 
Majority release code without security testing
Data Protection : 30 September, 2016
Survey from Veracode reveals the extent to which code is issued without the resolution of security issues or adequate testing
 
Security for virtual car locking system
Data Protection : 23 September, 2016
A virtual car key system for remote control using smartphones has been secured through partnership deal between Valeo and Gemalto
 
Behavioural attack detection for data centres
Data Protection : 20 September, 2016
LightCyber extends its behaviour based attack detection technology to cloud and hybrid cloud data centres
 
Film studio takes data access security product
Data Protection : 19 August, 2016
Varonis has supplied Miramax with the means to set and enforce data access policies to protect the film studio's most valuable data
 
Endpoint security for Microsoft Azure users
Data Protection : 08 August, 2016
Remote administration capabilities enable administrators to manage security problems within the Microsoft Azure environment
 
Attack path vulnerability assessment
Data Protection : 05 August, 2016
Black Hat sees the launch of ThreatMatrix Deception and Response Platform from Attivo for assessing attack path vulnerabilities
 
Security sandbox for software developers
Data Protection : 05 August, 2016
Veracode is helping software developers to incorporate security into their designs with the use of the Veracode Developer Sandbox
 
Ransomware defence collaboration
Data Protection : 05 August, 2016
LightCyber is integrating its Magna platform with Ayehu eyeShare to improve defences against the spread of ransomware
 
Electronic signatures for EU trust services providers
Data Protection : 14 July, 2016
eSignLive from Vasco provides EU organisations with eIDAS-compliant electronic signature capabilities
 
White paper on healthcare cyber security
Data Protection : 07 July, 2016
Panda Security releases Cyber-Pandemic whitepaper providing advice to IT users in the healthcare industry.
 
Industry experts join IT security company
Data Protection : 22 June, 2016
BeyondTrust has taken on five industry leaders in a recruitment spree to fill a wide range of roles within the company
 
Data breaches lower protection confidence levels
Data Protection : 13 June, 2016
Research by Gemalto has shown that organisations which suffer data breaches lack confidence in their ability to protect data
 
Cyber attack impact on brand loyalty
Data Protection : 16 May, 2016
FireEye survey reveals the impact of high profile cyber attacks on the loyalty of consumers towards the products of the victims
 
Bank protects data from insider threats
Data Protection : 29 March, 2016
Union Bank is using DatAdvantage from Varonis as part of its protective measures to secure sensitive data from insider threats
 
Lack of high level trust in data sharing security
Data Protection : 10 March, 2016
Survey amongst senior IT professionals has found that there is little confidence in the security of data sharing processes
 
Survey measures cyber attack detection confidence
Data Protection : 15 February, 2016
Tripwire looks at the responses to a survey that looked at endpoint cyber attack detection using seven key security controls
 
Survey sheds light on working practices in IT
Data Protection : 09 February, 2016
AlienVault has conducted a survey into the working lives of IT professionals and the way in which they're treated in the workplace
 
Advice on addressing EU Data Protection Regulation challenges
Data Protection : 29 January, 2016
Iron Mountain provides details of the new EU Data Protection Regulation and what businesses need to do in order to address the associated challenges
 
Agentless security for VMware environments
Data Protection : 25 January, 2016
Virtualization security provides agentless protection in VMware vShield applications
 
Survey indicates vulnerability of NHS data
Data Protection : 21 January, 2016
IT security levels in the NHS are less than perceived with mobile healthcare technology stretching existing measures in the industry
 
Ready access to information causes digital amnesia
Data Protection : 27 November, 2015
Kaspersky Lab researches global attitudes towards information retention and the easy availability to digital memory sources
 
Two-thirds of workers break security rules to work remotely
Data Protection : 27 November, 2015
Survey shows the vast majority of organisations now support home working despite the risks associated with employees taking security shortcuts
 
CISO panel initiative for expertise sharing
Data Protection : 23 November, 2015
CyberArk initiates a CISO panel for sharing experience and expertise in overcoming the challenges of privileged access control
 
Research reveals extent of senior management data loss
Data Protection : 09 November, 2015
A survey by Imation indicates nearly half of organisations have suffered theft or loss of senior management held devices containing corporate data
 
Preventing data breaches with predictive threat models
Data Protection : 09 November, 2015
Metadata Framework platform enhanced with new set of predictive threat models to provide greater ability to prevent data breaches
 
Security company to provide advice to EU utility companies
Data Protection : 06 November, 2015
The European Network for Cyber Security gains Gemalto as a partner to provide expertise to utilities in the region
 
Decryption key repository means an end to cyber ransom payments
Data Protection : 06 November, 2015
Kaspersky Lab creates respository of decryption keys to enable victims of Bitcryptor and CoinVault ransomware to avoid paying to access their data
 
App helps administrators validate patch installations
Data Protection : 16 October, 2015
Dynamic software reconciliation app from Tripwire provides a means of visualising legitimate system changes after installing security patches
 
Gaps identified in healthcare cyber security
Data Protection : 16 October, 2015
A new report from Trustwave shows the state of IT security in the healthcare industry with more than 9 out of 10 professionals seeing an increase in cybercrime activities in the sector
 
Managed endpoint milestone for privileged access management
Data Protection : 12 October, 2015
Enterprise Random Password Manager reaches deployment milestone with installation managing over a million endpoints
 
Software licensing contributing to increased IT complexity
Data Protection : 12 October, 2015
Survey of high level IT professionals shows perception of increased complexity in IT due to cloud computing, licensing and legacy technology
 
Threat sharing attitudes for life critical applications revealed
Data Protection : 29 September, 2015
Survey conducted by AlienVault demonstrates the shift in public opinion concerning the disclosure of threat information for life threatening circumstances
 
Cyber essentials certification for Intel Security
Data Protection : 29 September, 2015
Intel Security gains UK Government certification against its Cyber Essentials Scheme
 
Handling end user privacy expectations
Data Protection : 28 September, 2015
Agathe Caffier, Senior Counsel of International Operations & Privacy Specialist at DMI explains privace expectations of users and how best to handle them in policies and software design
 
Increasing interest in secure portable storage devices
Data Protection : 25 September, 2015
With Windows to Go on board, the IronKey bootable USB device is seeing increasing popularity as an alternative to equipping employees with laptops
 
Printers with built-in security protection
Data Protection : 23 September, 2015
The latest generation of laser printers from HP have security features built into them with BIOS protection
 
EU data regulation preparations
Data Protection : 21 September, 2015
Rob Norris, Director of Enterprise and Cyber Security for UK and Ireland at Fujitsu discusses the development of cyber resilience required by companies to meet the 2017 requirements of the new EU data regulations
 
Rugged secure USB workspace
Data Protection : 10 September, 2015
The W200 from Imation is the latest IronKey with Windows-to-go embedded to provide portable workspace security
 
Secure tamper proof USB 3.0 flash drive
Data Protection : 10 September, 2015
Secure flash drive from iStorage for the storage of sensitive data is accredited to FIPS 140-2 level 3.
 
Untrustworthy certificate authority survey results
Data Protection : 10 September, 2015
Venafi releases its survey results into vulnerability remediation for untrustworthy CAs amongst security professionals at Black Hat USA
 
Breach level index report for 1H2015
Data Protection : 09 September, 2015
Gemalto releases its latest Breach Level Index report covering data breaches globally in the first half of 2015
 
Security conference sees new product launches
Data Protection : 07 September, 2015
HP has released a number of new data security and compliance related products at its HP Protect conference for security professionals
 
Intelligent approach to change detection
Data Protection : 03 September, 2015
Latest version of NNT Change Tracker provides more intelligence in system integrity monitoring and change tracking to prevent security breaches
 
IT security analytics products released at conference
Data Protection : 03 September, 2015
HP has released new products at the HP Protect event focused on shifting the emphasis of IT security towards an analytics approach
 
Online identity risks overwhelm UK consumers
Data Protection : 03 September, 2015
Study from Kaspersky Lab reveals privacy paralysis in the UK with consumers feeling overwhelmed with IT security risks
 
Security breach impact on virtual infrastructure
Data Protection : 01 September, 2015
Report shows companies running virtual infrastructures suffer higher costs resulting from security breaches
 
Young people lack trust in digital security
Data Protection : 27 August, 2015
Survey of millennials on both sides of the Atlantic reveals a lack of faith in the ability of security practices in protecting digital identity
 
Survey shows increase in targeted attacks
Data Protection : 19 August, 2015
A survey conducted by Tripwire at Black Hat USA gauges the feelings of IT security professionals on the potential for nation-state cyber attacks
 
First | Prev  | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo