 |
Call for cloud-based digital signature recognition in EU standards
|
|
Cryptomathic is calling on the EU to incorporate a recognition of cloud-based e-signature management within the electronic identification and trust services mandate |
|
 |
Forensic traceability to protect London households
|
|
The Metropolitan police will provide London home-owners with packs of traceable liquids to use as markers for valuable items |
|
 |
Insider threat protection to increase during 2015
|
|
Research from IS Decisions shows that existing levels of just of 40 percent for insider threat protection will increase within the UK during this year |
|
 |
IP surveillance protects Tehran metro construction project
|
|
Vivotek has supplied IP video surveillance equipment and video management software to provide protection for a construction project on the Tehran underground transport system |
|
 |
Financial services compliance expansion
|
|
Additional functions available on Proofpoint Enterprise Archive for improving compliance of financial services companies to regulatory requirements |
|
 |
Centre for Secure Information Technologies investment award
|
|
The EPSRC has awarded an investment of 5 million pounds for cyber security research at the Centre for Secure Information Technologies |
|
 |
Improved parking security for Finnish truckers
|
|
An overnight rest area on a major route through Finland is protecting its community of truck drivers with the use of Sony surveillance equipment |
|
 |
Surveillance and access control protect cycling brand HQ
|
|
The UK head office of Specialized cycling has made use of security systems from Mobotix for the protection of its premises |
|
 |
Three key IT security focus areas identified
|
|
Rise of the cybermen - a guide to neutralising 2015’s most dangerous IT security threats by Wieland Alge, VP and GM, EMEA at Barracuda Networks |
|
 |
Security company makes tendering process carbon neutral
|
|
Part of its corporate social responisbility objectives, the new tendering process at Corps Security will have minimal impact on the environment |
|
 |
Laptop lockers improve security at Lincoln College
|
|
Three lockers provide security and asset management capabilities for 80 laptops at educational institute in the UK |
|
 |
Virtualised cloud communication security
|
|
The virtualised real-time communications system from Sonus Networks brings enhanced security and intelligence |
|
 |
Biometrics facilitate remote identification in Pinellas County
|
|
Local police in Pinellas County now have mobile access to fingerprint records enabling biometric finger identification whilst in the field |
|
 |
Unified Security Management for card payment system provider
|
|
Crosskey has chosen Unified Security Management from AlienVault for increased security visibility in its card payment processing operations |
|
 |
Secure data on the move for TfL using hardware encrypted flash memory
|
|
Hardware encrypted secure USB storage devices by iStorage are being used by Transport for London to help prevent loss of mobile data |
|
 |
New malware bypasses CAPTCHA
|
|
Android malware targets Russian social network users with method to overcome CAPTCHA codes in attempts to extort money |
|
 |
Embedded video analytics cooperation agreement
|
|
The Savvi analytics engine from Agent Vi will be available pre-installed on Hikvision cameras as part of a new strategic agreement between the two companies |
|
 |
Mini backscatter system introduced to UK market
|
|
The handheld Z Backscatter image scanner for portable drug, explosive and organic threat detection makes its debut on the UK market |
|
 |
RFID based access control protects London student accommodation
|
|
The use of RFID escutcheons in student accommodation development in central London provides secure access with reduced building wiring |
|
 |
Key actions needed to ensure digital safety
|
|
John Swanson, Head of Security Offerings and Strategy in UK & Ireland at Fujitsu, examines the route that businesses need to take to ensure they can become digitally safe |
|
 |
Natural language processing for preventing spear phishing
|
|
OpenDNS develops new model of making real-time detections of targetted phishing campaigns using natural language processing |
|
 |
New wave of Cryptowall ransomware attacks
|
|
Bitdefender uncovers new distribution mechanism for the Cryptowall ransomware through spam campaign |
|
 |
Console provides real time social media threat information
|
|
Proofpoint is now supplying its Nexgate Social Threat Centre, a console for providing administrators with up to date information on social media threats |
|
 |
On-demand web penetration testing available to security suppliers
|
|
The ImmuniWeb on-demand web application penetration testing tool is available under different pricing models for security suppliers to use under new partner programme |
|
 |
More models added to network camera range
|
|
Featuring advanced lens technology, the new Canon surveillance camera range features new dome, box and 360 degree cameras |
|
 |
Camera location mapping included in latest VMS version
|
|
The Mirasys VMS has been re-released at version 7.3 with improved mapping features with GPS coordinates of cameras on the premises under surveillance |
|
 |
Centralised e-mail encryption
|
|
Simplified enterprise e-mail encryption includes flexible and configurable policy settings |
|
 |
Cloud surveillance system integrates with VMS
|
|
Technology alliance between mobiDEOS and OnSSI results in integration between video management system and cloud-based surveillance platform |
|
 |
End to end control for real time communications networks
|
|
Sonus IQ has been released to provide real time communications network operators with a security and intelligence platform |
|
 |
Biometric iris authentication for smartphones
|
|
Fujitsu bites the alternative authentication bullet and proves that non-fingerprint biometric technology is possible for the protection of smartphones |
|
 |
4G connected surveillance for home monitoring
|
|
Property without wf-fi connectivity can now be monitored using the latest Nubo camera with 4G connectivity from Panasonic |
|
 |
Intelligent protection combats grey route mobile messaging
|
|
Grey Route Protection service from AdaptiveMobile intercepts illegitimate messages which fraudulently use international mobile networks |
|
 |
Multi-factor authentication for wearable technology
|
|
Centrify is demonstrating its multi-factor authentication and single tap verification for wearable devices at Mobile World Congress |
|
 |
New CEO appointed at ForeScout Technologies
|
|
Network security company, ForeScout Technologies, recruits former Intel Security executive into the role of Chief Executive Officer |
|
 |
Cloud based real time communications demonstration at MWC
|
|
Sonus is attending Mobile World Congress in Barcelona with a demonstration of virtualisation as a tool for real time cloud-based communications |
|
 |
The most dangerous IT threats of the year and how to neutralise them
|
|
Wieland Alge of Barracuda Networks examines the rise of the "cybermen" and provides guidance on how to neutralise the most dangerous IT security threats of 2015 |
|
 |
Aggressive adware still being seen in Android apps
|
|
Google play is still hosting apps that are riddled with aggressive adware, warns Bitdefender |
|
 |
Research published on Security-as-a-Service for communication service providers
|
|
AdaptiveMobile research indicates the benefits that can be achieved by Communication Service Providers in providing security-as-a-service to clients |
|
 |
Nedap to organise welcome party at ASIS conference in Frankfurt
|
|
The ASIS European Security Conference and Exhibition in Frankfurt this March will be launched with a Nedap organised and sponsored welcome party |
|
 |
Surveillance camera SD card playback support
|
|
Video footage stored on SD cards on Samsung Techwin security cameras can now be played back directly on Android and iOS devices |
|
 |
Comprehensive security for mobile operator signalling infrastructure
|
|
SS7 Protection from AdaptiveMobile provides protection to the core networks of mobile operators against SS7 protocol based attacks |
|
 |
Wireless transmission system for all-weather radar
|
|
3G/4G transmission system connects all-wather radar perimeter protection system from Ogier for commercial and military applications |
|
 |
Host service provider strategies to defend against DDoS attacks
|
|
Rishi Agarwal, Director of Product Marketing at NSFOCUS, examines vulnerable online gaming and what the industry can do to protect itself |
|
 |
NCT CBRNe Europe 2015 - top three burning issues
|
|
Timely evaluation of Ebola Response, the Ukraine Crisis and Europe’s Response to Emerging Terrorism at European Defence Forum. |
|
 |
Cloud archiving features on VMS stand at ISC West
|
|
Genetec is attending the ISC West show this year with the latest version of the Security Center video management system featuring cloud archiving service |
|
 |
Dutch minister to open critical infrastructure protection conference
|
|
The Minister for Security and Justice of Holland will be addressing delegates of the Critical Infrastructure Protection and Resilience conference in Europe next week |
|
 |
Hardware encrypted flash drives now available as USB 3.0 devices
|
|
IronKey increases data read and write speeds to its latest addition to its secure flash memory storage with the adoption of USB 3.0 connectivity |
|
 |
Biometric protection for data centre cabinets
|
|
Cabinet locks with in-built biometric authentication technology are being supplied for the high security data centre industry |
|
 |
Arabic cyber espionage aims at high profile targets in Middle East
|
|
The Desert Falcons group has been discovered by Kaspersky Lab to be on a cyber espionage campaign that specifically targets high profile people and companies from the Middle East region |
|
 |
Five steps to secure iterative software delivery
|
|
Mark Warren of Perforce Software explains the security challenges surrounding iterative software delivery and offers five best practices for improving the process |
|