Data Security


Survey Finds Majority of Businesses Risk Sensitive Data in Cloud

Thales, leader in information systems and communications security announces that eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to Encryption in the Cloud, a global study of 4,000 business and IT managers conducted by the Ponemon Institute and commissioned by Thales.

Security Issues to Escalate as BYOD Trend Continues

A new report from Juniper Research has found that the number of employee owned smartphones and tablets used in the enterprise will more than double by 2014, reaching 350 million by 2017, compared to almost 150 million this year.

Harris Corp. to Provide Latin American Country With Falcon Tactical Radios

Harris Corporation (NYSE:HRS), an international communications and information technology company, has received a $5 million order to provide a Latin American country’s armed forces with high-performance tactical communications for drug interdiction, anti-terrorism and illegal immigration missions.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Kizi Gaming Company Selects Porticor to Protect Private Information

Kizi, an online gaming company, has selected Porticor's Virtual Private Data™ (Porticor VPD™) system to protect its private information stored in the cloud, while keeping customer information confidential.

Stream Data Centers Breaks Ground on Private Data Center in Houston

Stream Data Centers, a data center developer specializing in secure, independent, highly efficient Private Data Centers for corporate users, has started construction of a fully-commissioned Private Data Center development in The Woodlands, Texas, a master-planned community 35 miles north of downtown Houston.

Jericho Systems Named Best Privacy Technology of 2012

Jericho systems' Enterspace Exchange PatientPortal was named Best Privacy Technology of 2012 during the Second International Summit on the Future of Health Privacy in Washington, D.C.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.



Northrop Grumman to Acquire M5 Network Security

Northrop Grumman, global security company, will acquire privately held M5 Network Security Pty Ltd, a Canberra, Australia-based provider of cybersecurity and secure mobile communications products and services to Australian military and intelligence organizations.

MorphoTrak Introduces MorphoIDent for Police Officers

MorphoTrak recently introduced MorphoIDent, a mobile terminal for police officers that fits into a shirt pocket.

Threat Intelligence System Helps Share Malware Data

Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.

Report Says Cybercriminals Targeted Users of Major Social Networking Sites in April

GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

In A Flash

Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

Michigan Man Arrested for Illegally Streaming Live Sporting Events Over the Internet

Yonjo Quiroa, 28, of Comstock Park, Mich., was arrested Wed., Feb. 1, charged with criminal copyright infringement related to a website operation that illegally streamed live sporting event telecasts and pay-per-view events via Internet.

Sony's CLEFIA Encryption Technology Adopted as International Standard

CLEFIA was adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography.

Some Dating Websites Do Not Remove Location Data From Pictures

While the majority of dating websites do a good job of managing the privacy of their users, a class research project at the University of Colorado Boulder’s Leeds School of Business found that 21 of 90 dating websites the class examined did not properly remove location data from pictures uploaded by their users.

Featured

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3