Search This Blog

Thursday, May 10, 2007

Security Park newsletter - 10 May 2007


  Newsletter - 10 May 2007


You will find underneath a selection of articles recently posted on Security Park - the leading online news site for the Security Industry with over 300,000 readers every month (far ahead of other security publications - online or in print).

SECURITY NEWS FROM SECURITY PARK

Debugging Application Security Vulnerabilities in Web.config Files
As networks have become more secure, vulnerabilities in applications have attracted the attention of hackers, both criminal and recreational, who have devised techniques to exploit these holes...

Unipath headquarters protected by Chubb Electronic Security
Unipath required a comprehensive security solution to deter intruders and restrict access to laboratories...

Convicted shoplifters should not walk free
Retailers and their staff need to be reassured that serious persistent offenders will go to prison for enough time to provide respite to victims and deliver proper rehabilitation for the criminal...

Sonnenschein law firm implements pre-emptive integrated security technologies from IBM ISS
Sonnenschein chose IBM ISS for the proactive nature of its security, which is designed to protect organisations from software vulnerabilities before they are exploited by online attackers...

Protecting data in stolen laptops
Marks and Spencer has confirmed that a laptop containing personal details, addresses, dates of birth, national insurance and phone numbers of some 26,000 employees has been stolen...

IndigoVision IP CCTV installed at Senai International Airport
Senai International Airport has installed IndigoVision's IP Video technology to provide site-wide CCTV surveillance...

Macquarie acquires secure digital communications network Airwave
Macquarie has committed to retain ownership of the Airwave business for a minimum of 10 years...


Guide to Spyware, Data Leakage, and Spyware Recovery

Malware causes sensitive data not only to be lost, but also placed into the hands of those with malicious intent. To prevent spyware and adware there must be several layers of protection in place that include support from both users and administrators.
This E-Guide examines the most effective ways to deal with spyware through a compilation of articles and white papers.

Download the Guide to Spyware, Data Leakage, and Spyware Recovery.

COE X-Net video system monitors high speed rail systems in Spain
COE Ltd has completed two major rail upgrade projects in Spain with its X-Net transmission system...

Assa Abloy OMNIKEY smart card reader allows authentication via card, pin and fingerprint
The OMNIKEY CardMan 7121 allows threefold authentication via card, pin and fingerprint. It is compatible to a broad range of fingerprint recognition and access control systems and can be integrated into existing biometric access security solutions...

Swiss Telco Offers Managed DDoS protection to Enterprise Customers with Arbor Peakflow SP
Sunrise has deployed the entire suite of Arbor Peakflow SP products for improved network security, traffic engineering and managed security services...

Reducing the risk of burglary
Despite the threat of prosecution, British homeowners are prepared to protect their homes and family from burglars using extreme measures...

Thinking SAFE secures Tenon Group corporate data
The backup solution maximises the firm's data availability and delivers an integrated disaster recovery solution...

Corporations need to ensure they are complying with Corporate Manslaughter Bill
Under the reformed Corporate Manslaughter Bill, organisations and government bodies will be guilty of corporate manslaughter if an employee dies in their care when in the office or on company business overseas...

This newsletter is distributed at no charge from www.SecurityPark.co.uk. Your are receiving this newsletter because you signed up for it in the past. If you no longer wish to receive it, all you have to do is go to this page.

copyright Security Park - All rights reserved. Any mention of products or services in this newsletter does not constitute an endorsement by Security Park.

You may re-use Security Park's copy, provided that 1) you acknowledge the source of this copy and provide a hyperlink back to http://www.securitypark.co.uk, and 2) do not charge for this content.
To prevent this newsletter from getting blocked by your anti-spam filter, please add our "From" address (editor@securitypark.co.uk) to your address book.

No comments: