New infrastructure rules required March 2011 New rules for IT infrastructure security.
The need for organisations to closely guard private information has been highlighted by the recent exposures of classified information by WikiLeaks, says Martin ...
BitDefender warns that buying gifts on-line can be dangerous 1 March 2011 BitDefender, an award-winning provider of innovative Internet security solutions, offers a couple of tips meant to help computer users stay away from trouble while searching for the perfect gift for their ...
BitDefender arms small and mid-sized businesses against e-threats 1 March 2011 BitDefender Business Solution Version 3.5 delivers additional layers of proactive detection while reducing the cost and complexity of securing SMB networks against viruses and other malware.
Breaking ...
BitDefender moves to empower channel 1 March 2011 Internet security player boosts sales, marketing and technical support, and improves commissions and business terms, as expansion of channel business continues.
BitDefender has announced the launch of ...
Protecting the most vital business asset 24 February 2011 Access to data needs to be strictly controlled, both physically and electronically, with the right permissions in place to ensure that unauthorised access does not occur and organisations can see what is happening to information at all times
BitDefender Internet Security 2011 blocks 100% of malicious URLs February 2011 BitDefender detected all pieces of malware in a recent Real World Test by independent security firm AV-Test.org.
BitDefender Internet Security 2011 blocked 100% of the malicious URLS in AV-Test’s recent ...
BitDefender releases QuickScan to provide free security check for PCs 1 January 2011 Beta tests indicate 30% of users’ systems infected with malware; new detection tool gives users a quick and easy way to double-check for threats.
BitDefender has announced the full release of BitDefender ...
Biometrics and information security management systems Access & Identity Management Handbook 2011 Biometrics goes far beyond physical access control.
Charlie Stewart of biometric application specialists, SuperVision Biometric Systems, says that information security management systems (ISMS) and data ...
Fixing weak passwords Access & Identity Management Handbook 2011 Passwords have been with us for ages, administrators and users need to rethink password security policies if they are to be truly effective.
Passwords have been present in information technology since ...
G&D launches the Mobile Security Card VE 2.0 14 December 2010, Security Services & Risk Management Giesecke & Devrient (G&D) is introducing a new microSD card to prevent cellphone tapping