Archive | Security Books and Resources RSS feed for this section

Book review : Elsevier releases 6 new Physical Security titles

News in the Physical Security business, 6 new titles have been released from Elsevier. Conflict Management for Security Professionals by Andrew A. Tufano Effectively resolving conflict prevents violence, reduces incidents, improves productivity, and contributes to the overall health of an organization. Unlike the traditionally reactive law enforcement approach to resolving conflict, this book provides a […]

Read more

ESMA clarifies boundary of CRA Regulation

The European Securities and Markets Authority (ESMA) has published its Guidelines and Recommendations on the Scope of the CRA Regulation. The Guidelines clarify certain aspects of the scope of the Credit Rating Agencies (CRA) Regulation for registered CRAs, market participants operating on the perimeter of this sector and national securities markets regulators. The Guidelines focus […]

Read more

ESMA and the EBA publish final principles on benchmarks

The European Securities and Markets Authority (ESMA) and the European Banking Authority (EBA) have published their final report setting out their Principles for Benchmark-Setting Processes in the EU. The Principles are designed to address the problems identified with benchmark-setting processes and will provide benchmark users, administrators, calculation agents, publishers and data submitters with a common […]

Read more

Avecto Awarded Innovative Company of the Year (Security) at Global Excellence Awards

Avecto announced yesterday that Info Security Products Guide has named them as 'Innovative Company of the Year' in security as part of the 2012 Global Excellence Awards program. The award, announced at RSA Conference 2012, recognizes a company that has delivered significant innovation in the market in the past year. 'Being named Innovative Security Company […]

Read more

NitroSecurity makes it simple for new partners to get started

To help channel partners leverage this market opportunity and effectively deliver strategic security solutions built on its NitroView SIEM platform, NitroSecurity, Inc. has enhanced its NitroConnect Partner Programme to further engage and empower value added resellers and systems integrators.NitroSecurity's NitroConnect Partner Programme now features the following elements: Single Authorisation Level – NitroSecurity makes it simple […]

Read more

Credant Technologies provides Dell with encryption and data protection for its commercial client systems

Credant Technologies now provides Dell with encryption and data protection for its commercial client systems. Dell customers may select the Credant Mobile Guardian Dell Edition security encryption solution factory installed on Dell Precision™ workstations, Latitude™ laptops and OptiPlex™ desktops, along with other Credant solutions through Dell's Software and Peripheral (S&P) store with commercial laptop and […]

Read more

Name.com joins VeriSign Identity Protection Network

In the wake of some recent high-profile hacker attempts to steal the passwords of millions of customers, businesses, including domain name service providers, are exploring options for added protection to ensure that Web site administrators and domain name registrants can manage their Web-based property with confidence. Name.com LLC, is leading the way by offering its […]

Read more

Selecting an Application Security Assurance Approach

This case study from company ABC discusses ways to develop and maintain secure systems and applications, including selecting suitable static-analysis code scanning tools for application development. ABC is implementing web application firewalls to protect web based applications and acknowledges that secure development will take a long time to implement partly based on expensive and time-consuming […]

Read more

Adobe Reader vulnerability could be exploited to gain access to vulnerable systems

Adobe Reader is arguably the world's most ubiquitous electronic document sharing application. The software can be used to view, search, digitally sign, verify, print, and collaborate on Adobe PDF files, and includes scripting functionality to allow for extended customization and extensibility.Core Security Technologies, provider of CORE IMPACT, have issued an advisory disclosing a vulnerability that […]

Read more