Thales, leader in information systems and communications security announces that eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to Encryption in the Cloud, a global study of 4,000 business and IT managers conducted by the Ponemon Institute and commissioned by Thales.
A new report from Juniper Research has found that the number of employee owned smartphones and tablets used in the enterprise will more than double by 2014, reaching 350 million by 2017, compared to almost 150 million this year.
Harris Corporation (NYSE:HRS), an international communications and information technology company, has received a $5 million order to provide a Latin American country’s armed forces with high-performance tactical communications for drug interdiction, anti-terrorism and illegal immigration missions.
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
- By Jeff Whitney
- Jul 01, 2012
Kizi, an online gaming company, has selected Porticor's Virtual Private Data™ (Porticor VPD™) system to protect its private information stored in the cloud, while keeping customer information confidential.
Stream Data Centers, a data center developer specializing in secure, independent, highly efficient Private Data Centers for corporate users, has started construction of a fully-commissioned Private Data Center development in The Woodlands, Texas, a master-planned community 35 miles north of downtown Houston.
Jericho systems' Enterspace Exchange PatientPortal was named Best Privacy Technology of 2012 during the Second International Summit on the Future of Health Privacy in Washington, D.C.
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
Northrop Grumman, global security company, will acquire privately held M5 Network Security Pty Ltd, a Canberra, Australia-based provider of cybersecurity and secure mobile communications products and services to Australian military and intelligence organizations.
MorphoTrak recently introduced MorphoIDent, a mobile terminal for police officers that fits into a shirt pocket.
Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.
GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.
Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.
Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.
- By Lee Caswell
- Apr 01, 2012
The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.
Yonjo Quiroa, 28, of Comstock Park, Mich., was arrested Wed., Feb. 1, charged with criminal copyright infringement related to a website operation that illegally streamed live sporting event telecasts and pay-per-view events via Internet.
CLEFIA was adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography.
While the majority of dating websites do a good job of managing the privacy of their users, a class research project at the University of Colorado Boulder’s Leeds School of Business found that 21 of 90 dating websites the class examined did not properly remove location data from pictures uploaded by their users.