|
|
|
|
|
|
|
|
|
|
|
First Hour Critical For Phishing Attacks |
|
|
Anti-virus and anti-malware software
: 03 December, 2010 |
Study from Trusteer reveals that the first 5 hours of existence of a phishing campaign are when most of the damage is done with as much as 50% of phished credentials having been harvested within the first hour |
|
|
|
|
 |
|
|
Kazakhstan 1000 Tenge Commemorative Banknote Wins Security Award |
|
|
Trade Organisations, User Groups and Pressure Groups
: 03 December, 2010 |
Innovative micro-lenticular patch containing hologram image used on the new 1000 tenge banknote to commemorate the holding of the 7th OSCE Summit in Astana takes technology award for best hologram security product |
|
|
|
|
 |
|
|
|
|
SeeTec 5 VMS Supports Basler Range of IP Cameras |
|
|
IP and Megapixel cameras
: 03 December, 2010 |
Basler has completed integration work with SeeTec to integrate the company's range of IP box and fixed dome cameras into the SeeTec 5 video management software |
|
|
|
|
 |
|
|
|
|
Link Scanning Software Included In MailSecurity 2011 |
|
|
Anti-virus and anti-malware software
: 03 December, 2010 |
GFI Software includes improved malware detection through the use of sandbox technology as well as the detection of links which route to malware loaded sites through Link Scanner as part of MailSecurity 2011 |
|
|
|
|
 |
|
|
|
|
Remain Compliant During The Implementation Of IT Changes |
|
|
Software Asset Management and Compliance
: 03 December, 2010 |
Maya Malevich and Michael Hamelin of Tufin Technologies examine the importance of change management in IT implementations and provide a guide on how to perform change successfully without losing control |
|
|
|
|
 |
|
|
Major POS Integration Win For March Networks |
|
|
Security Management Systems and PSIM
: 03 December, 2010 |
March Networks will supply a US fast food franchise with video surveillance and retail loss prevention system linking to POS terminals at the chain's outlets in a deal worth over $8 million |
|
|
|
|
 |
|
|
|
|
Safer Workplace Award Received By Connexion2 |
|
|
Lone Worker Protection and Personal Alarms
: 02 December, 2010 |
The Identicom lone worker protection system has received the Suzy Lamplugh award for its use within the NHS Security Management System |
|
|
|
|
 |
|
|
|
|
|
|
First Irish Licensing Year A Success |
|
|
Trade Organisations, User Groups and Pressure Groups
: 02 December, 2010 |
Over 9000 licences have been issued during the last year to security professionals in Ireland after licensing rules became applicable in the country |
|
|
|
|
 |
|
|
Russia Takes Top Spot In Spam Distribution |
|
|
Anti-virus and anti-malware software
: 02 December, 2010 |
Global spam activity study from Kaspersky Lab has identified Russia as taking the top spot away from the USA as the world's largest distributor of spam |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Advanced Evasion Techniques Should Not Be Ignored |
|
|
Network Security, Routers and Data Centres
: 02 December, 2010 |
Stonesoft explains the threat of Advanced Evasion Techniques being increasingly used by hackers and why the industry should not ignore this emerging threat |
|
|
|
|
 |
|
|
|
|
Cross Border Secure Delivery Of Electronic Documents |
|
|
Trade Organisations, User Groups and Pressure Groups
: 01 December, 2010 |
The STORK electronic identity pilot scheme has introduced another module with eDelivery now live enabling electronic documents to be delivered securely across borders |
|
|
|
|
 |
|
|
|
|
Story Removed |
|
|
Alarm signalling, transmission and notification
: 01 December, 2010 |
|
|
|
|
|
 |
|
|
|
|
|
|
Addressing The Challenges Of Network Security |
|
|
Network Security, Routers and Data Centres
: 01 December, 2010 |
Dan Barry of Napatech discusses the challenges presented to the security industry as higher speeds and increased volume of attacks threaten networks |
|
|
|
|
 |
|
|
|
|
|
|
|
|
Compliance-Themenabend an der DUW |
|
|
Ausbildung, Training und freiberufliche Dienstleistungen (Education, Training and Professional Services)
: 01 December, 2010 |
Experten aus Wissenschaft und Praxis diskutieren über Felder des rechtskonformen Verhaltens in Unternehmen. Korruption und Wirtschaftsspionage richten jährlich wirtschaftliche Schäden in Millionenhöhe an |
|
|
|
|
 |
|
|
|
|
|
|
|
|
IM Worm Drives Users To Malicious Websites |
|
|
Anti-virus and anti-malware software
: 30 November, 2010 |
ESET has produced some guidelines to Instant Messaging users to help them prevent themselves from becoming a victim of the latest aggressive worm affecting IM services |
|
|
|
|
 |
|
|
Smartphone Camera Used For Document Authentication |
|
|
Software Asset Management and Compliance
: 30 November, 2010 |
Pelta from Pagemark Technology is a security system for document workflow employing barcodes and smartphone cameras for tracking and tracing documents |
|
|
|
|
 |
|
|
School Security Webinar Series |
|
|
Electronic Locking Systems
: 30 November, 2010 |
Videx is running a series of webinars in January on how to employ low cost school security systems using the company's CyberLock |
|
|
|
|
 |
|
|
|
|
Gamewell-FCI Becomes A GSA Approved Supplier |
|
|
Alarm signalling, transmission and notification
: 30 November, 2010 |
Fire alarm and mass notification supplier gains General Services Administration approvals for supplying to US Government departments |
|
|
|
|
 |
|
|
Change Of Address Pilot Live On eID Scheme |
|
|
Trade Organisations, User Groups and Pressure Groups
: 30 November, 2010 |
Electronic identity pilot scheme now has change of address facilities for member moving within the boundaries of the affected region |
|
|
|
|
 |
|
|
Hybrid Surveillance System Safeguards Walsall School |
|
|
Video Management Systems
: 30 November, 2010 |
The Walsall Academy has upgraded its surveillance system using Control Center Enterprise from Avigilon creating a hybrid analogue and IP surveillance network for non-intrusive protection of the school environment |
|
|
|
|
 |
|
|
Penetration Testing vs Ethical Hacking |
|
|
Data Protection
: 30 November, 2010 |
Anthony Haywood of Idappcom explains the flaws in the use of bounty seeking ethical hackers to test your applications rather than application testing at the design stage |
|
|
|
|
 |
|
|
|
|
|
|
|
|
First | Prev | 1 | 2 | Next | Last |