Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
News By Date
Rapid7 survey shows insecure corporate data in Amazon buckets
Data Protection : 28 March, 2013
Amazon's simple storage service has been discovered to be used by businesses for storing critical or personal data in an insecure way
Pro-active security system used in crime prevention
IP and Megapixel cameras : 28 March, 2013
A Dutch security vision company is using Sony vision systems as part of innovative pro-active crime prevention technology that takes surveillance beyond the role of crime solving
CISP launch to provide critical threat intelligence
Data Protection : 28 March, 2013
BAE Systems Detica comments on the launch of the Cyber Information Sharing Partnership in the UK and its potential benefit as a gatherer of threat intelligence
Mini PCI express video capture board for field data gathering
Optics and components : 28 March, 2013
An 8 channel video capture device from AMP provides rugged performance capabilities for use in defence, law enforcement and traffic management applications
SANS Institute supporting Security B-Sides event
Training courses, Seminars and Conferences : 28 March, 2013
Community driven IT security event in London gains wide industry support including from Cyber-security education specialist SANS Institute
Cyber Security Challenge gains support from British Computer Society
Trade Organisations, User Groups and Pressure Groups : 28 March, 2013
The UK's BCS responds to shortage of IT security professionals with sponsorship of Cyber Security Challenge which highlights talent within the IT security industry
A defensive approach to staying in control of data security
Data Protection : 28 March, 2013
Rob Sobers of Varonis comments on the plain text password goof of GCHQ and the wider issue of staying in control of who has access to what data
Megapixel surveillance provides improvement to Connecticut public housing
IP and Megapixel cameras : 28 March, 2013
IQinVision has supplied around 300 IP megapixel cameras to a housing authority in Milford, Connecticut to improve safety for public housing residents
High 2012 growth rate for Opengear
Mobile computing security : 27 March, 2013
Demand for secure cellular out of band management systems resulted in an exceptional year for Opengear during 2012
Forensic application gains explicit image detection
Computer Forensics and Data Forensics : 27 March, 2013
Guidance Software has formed an alliance with Image Analyser to incorporate explicit image detection capability into the EnCase digital forensics software
Malware in South Korea makes use of stolen user IDs
Anti-virus and anti-malware software : 27 March, 2013
Cyber-Ark comments on privileged account vulnerabilities as exploited in South Korean data-wiping malware attack
Security system for Exchange and SharePoint Servers
Anti-virus and anti-malware software : 27 March, 2013
New security systems from ESET provide protection for Microsoft Exchange Server as well as SharePoint Server at the latest versions
DDoS attack mitigation at US hosting company
Anti-virus and anti-malware software : 27 March, 2013
Multi-vectored distributed denial of service attack on US develope and hosting provider mitigated by Prolexic
Backup software now supports Hyper-V hypervisor
Backup, Data Recovery and Disaster Recovery : 27 March, 2013
Microsoft's Hyper-V multi-hypervisor environment gains support in Alike backup and disaster recovery software
Android malware makes first targeted attack
Mobile computing security : 27 March, 2013
Software designed to steal messages and contacts from Android smartphones in use by Chines activists
Cloud camera for home surveillance
IP and Megapixel cameras : 27 March, 2013
High definition, low cost surveillance camera operates in the cloud for home owners to remotely monitor
Auctioneer deploys IP cameras for live bidding
Fixed and PTZ dome cameras : 26 March, 2013
Innovative move at Bonhams auctioneers involves the use of PTZ IP dome cameras to bring remote bidders closer to the atmosphere of the auction
Cloud based 2FA demonstration at UK IT security event
Authentication : 26 March, 2013
Signify is attending Infosecurity Europe in April with demonstrations of the advantages of cloud based two-factor authentication (2FA) over in-house solutions
Secure licences and tachograph cards for Sweden
Biometric passports, ID and licenses : 26 March, 2013
Morpho will ensure the security of driving licence administration and the use of digital tachographs with its biometric security features to reduce fraud
Vandal resistant half profile cylinders
Locks, shotbolts, solenoids and actuators : 26 March, 2013
Installing vandal resistance into access control systems is possible using the range of hardware from EMKA
IP emergency notification over analogue speakers
Alarm signalling, transmission and notification : 26 March, 2013
Barix has enabled existing analogue systems to be usable with the latest IP networking technology for voice communications and emergency notification
IP access control for luxury Chelsea development
ID cards and smart cards : 26 March, 2013
A luxurious riverside development in London's Chelsea district gains door entry and access control from Urmet Domus for state of the art security
IT staff don't believe end users take security seriously
Data Protection : 26 March, 2013
Survey of IT professionals reveals a belief that most end users are complacent towards security in the workplace
Gaming code exploits investigated at GDC 2013
Anti-virus and anti-malware software : 26 March, 2013
Arxan Technologies is attending GDC 2013 to run conference on the increasing problem of game code exploits and the threat to the gaming community
ISACA event to focus on business technology integration
Training courses, Seminars and Conferences : 25 March, 2013
The Insights 2013 conference run by ISACA will take place in Berlin during June to examine the integration of technology and business
Targeted malware on servers biggest concern for IT professionals
Anti-virus and anti-malware software : 25 March, 2013
Survey by Bit9 reveals the highest priorities for IT and security professionals regarding server security
Surveillance and access control integration module
Video Management Systems : 25 March, 2013
Control Center from IndigoVision gains new integration module for use with Paxton access control systems
Cargo inspection systems for Middle East
Bomb and explosives detection : 25 March, 2013
Rapiscan will supply Eagle cargo screening systems for use in threat detection applications in the Middle East
Agenda available for digital investigations conference
Computer Forensics and Data Forensics : 25 March, 2013
Guidance Software is hosting the CEIC 2013 conference covering digital forensics, investigations and cyber security
Digital door viewer wins security award
Security in the Home : 25 March, 2013
A full colour digital door viewer for use in residential properties has received a Plus X Award for technology innovation
2FA now available on consumer cloud application
Network Security, Routers and Data Centres : 25 March, 2013
Users of the Apple iCloud function gain security advantage with the introduction of two factor authentication (2FA) technology
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo