Top Stories


Survey Highlights Webmasters' Struggles with Hacked Sites

StopBadware and Commtouch recently published a joint report titled "Compromised Websites: An Owner's Perspective" that chronicles webmasters' experiences with hacked websites. The report presents statistics and opinions on how site owners navigate the process of learning their sites have been hacked and repairing the damage.

NQ Mobile

Report Identifies Top Three Malware Threats for 2012

A new report from NQ Mobile Inc., indicates that from 2010 to 2011, Android officially overtook Symbian as the most targeted mobile platform in the world by cyber criminals.

Damballa Discovers Advanced Evasion Techniques Being Used by Six Crimeware Families

Damballa Inc. recently released results of its discovery of advanced stealth techniques used by six crimeware families to carry out global cyber attacks.

Unintentional Exposure of Corporate Data Through Theft, Loss of Removable Devices Examined in Survey

Imation Corp. recently revealed the results of a recent survey of 302 IT decision makers in the U.S. and Canada, which was conducted by Harris Interactive on behalf of Imation. According to the survey, 37 percent of IT decision makers reported that their business had unintentionally exposed corporate data through theft or loss of removable devices in the past two years.

Alta dt Data Technologies

IntervalZero and Alta Data Technologies Form Avionics Partnership

The partnership will allow customers to easily develop real-time MIL-STD-1553 and ARINC applications for Windows platforms.

Registration Now Open for ESX 2012 in Nashville

Security industry members anxious to attend the 2012 Electronic Security Expo (ESX) event in Nashville, Tenn., now have the opportunity to lock-in early bird rates. Members of the industry can register here for the event, being held June 25-29.

Shawnee County Department of Corrections Deploys High-Definition Surveillance System

The Shawnee County Department of Corrections (SNDOC) in Topeka, Kan., deployed a new high-definition surveillance system to heighten security, expedite investigations, and ultimately, improve inmate behavior.



White Paper Examines Certificate Management Challenges and Entrust

With the constant evolution of security threats, forward-thinking companies must closely scrutinize their security framework. Key components in an organization's security infrastructure are digital certificates, which not only provide identification assurances, but also support secure data transfer.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

DHS and The Netherlands Sign Cybersecurity Agreement

Secretary of Homeland Security Janet Napolitano, Dutch Minister of Security and Justice Ivo Opstelten recently signed a Letter of Intent to build upon cooperative cybersecurity initiatives to promote a safe, secure and resilient cyber environment.

Milestone Announces Partner Achievements

It’s always a pleasure to attend the Milestone Integration Platform Symposium, and is an eye-opening experience to see what’s happening in the networked world.

Skechers Secures Flagship Distribution Facility with IP Surveillance

Skechers footwear will secure its new $250 million, flagship distribution facility in Rancho Belago, Calif. with American Dynamics video surveillance solution.

Using Advanced Security Technology to Comply with the Food Safety Modernization Act

Last year, the Food Safety Modernization Act (FSMA), was implemented to prevent food-borne disease caused by both intentional and unintentional sources, and to improve detection and response when an outbreak occurs.

DHS Announces Grant Guidance for Fiscal Year 2012 Preparedness Grants

DHS Secretary of Homeland Security Janet Napolitano recently announced the release of FY 2012 grant guidance and application kits for seven DHS preparedness grant programs totaling over $1.3 billion.

Anthrax Killing Foam Proves Effective in Meth Lab Cleanup

Sandia’s decontamination foam, developed more than a decade ago and used to decontaminate federal office buildings and mailrooms during the 2001 anthrax attacks, is now being used to decontaminate illegal methamphetamine labs.

Virtual Communities Tap Satellite Technologies for Disaster Response

The United Nations Office for Outer Space Affairs’ Space-based Information for Disaster Management and Emergency Response (UN-SPIDER) recently matched the power of satellite technology to disaster risk reduction and emergency respense here on Earth.

Connecticut School Rebuilds Fire Alarm System After Mother Nature's Fury

A Connecticut school system damaged by two natural disasters continue to receive aid from an integrator.

Samsung

Samsung Plans Two-Day IP Training Sessions Across U.S. and Canada

Samsung plans to address the growing channel need for IP technical expertise by hosting an IP Institute for industry professionals.

Security 5K Mission 500 Charity Run at ISC West

Get ready to lace up the ol' sneakers. The annual 5K/Mission 500 Charity Run has become a fun and lasting tradition on the second day of ISC West and the tradition continues this year in Las Vegas.

The Jones Group Expands Access Control Management

The Jones Group Inc., home to popular retail brand Nine West, is known as designer, marketer and wholesaler of branded apparel, footwear and accessories, but recently deployed Brivo ACS WebService in many of its facilities and is continuing to roll out Brivo access control management to other company properties.

Genetics Inspired Research Prevents Cyber Attacks

Cyber security is an ever changing and growing concern. Nearly twice as much cyber security funding proposed in the 2013 budget underscores the need for improved computer network defenses. Inadequate security configurations are blamed for 80 percent of the United States Air Force network vulnerabilities.

U.K. Council Reduces Crime with Latest IP Technology

Thurrock Council, a unitary authority in Essex, U.K., recently reduced the amount of time council staff and local police need to spend reviewing footage thanks to state-of-the-art IndigoVision IP technology. As a result a number of crimes, from theft to anti-social behavior, have been detected.

Megapixel Cameras Aid in Fight Against Small Business Crime

For small business owner Marjan Kostomaj, running the family commercial printing business is filled with everyday challenges that range from marketing to production issues to equipment maintenance. One issue he no longer has to worry about is the building’s video surveillance system.

Counterfeit Perfume Seizures Total $51 Million

U.S. Customs and Border Protection (CBP) seized imports of counterfeit perfume valued at nearly $51 million during fiscal year 2011.

Secretary Napolitano Announces Fiscal Year 2013 Budget Request

Secretary of Homeland Security Janet Napolitano recently unveiled the Department of Homeland Security’s (DHS) fiscal year (FY) 2013 budget request of $39.5 billion in net discretionary funding.

Report: Biometric ID Card For U.S. Workers Could Cost $40 Billion

A mandatory biometric employment verification card for all U.S. workers could cost at least $40 billion, infringe on Americans’ civil liberties and fail to stop the employment of undocumented immigrants, according to a new report. Hard to BELIEVE: The High Cost of a Biometric Identity Card finds that a biometric ID card would not only have a hefty initial price tag, but it will also cost $3 billion in ongoing annual expenditures.

MasterCard Combats Online Fraud

MasterCard Worldwide connects users through global payments and technology, but the company is now taking a proactive approach to online fraud by teaming up with Silver Tail Systems. The web session intelligence provider willl focus on leveraging and creating innovative solutions to help combat online fraud at MasterCard.

Port of Tacoma Selects AMAG Technology's Symmetry Homeland Security Management System

The Port of Tacoma will heighten security thanks to a new partnership with AMAG Technology.

Featured

  • The Business Case for Video Analytics: Understanding the Real ROI

    For security professionals who may be hesitant to invest in video analytics, now's the time to reconsider. In a newly released Omdia report commissioned by BriefCam (now Milestone Systems), the research firm uncovered a compelling story: more than 85% of North American and European organizations that use video analytics achieve a return on investment within just one year. The study, which surveyed 140 end users across multiple industries, demonstrates that security technology is no longer just for security — it's a cross-organizational tool that delivers measurable business value far beyond traditional safety applications. Read Now

  • Survey: 54% of Organizations Cite Technical Debt as Top Hurdle to Identity System Modernization

    Modernizing identity systems is proving difficult for organizations due to two key challenges: decades of accumulated Identity and Access Management (IAM) technical debt and the complexity of managing access across multiple identity providers (IDPs). These findings come from the new Strata Identity-commissioned report, State of Multi-Cloud Identity: Insights and Trends for 2025. The report, based on survey data from the Cloud Security Alliance (CSA), highlights trends and challenges in securing cloud environments. The CSA is the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Study: Only 35 Percent of Companies Include Cybersecurity Teams When Implementing AI

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

Webinars

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3