IT Security


SonicWALL Positioned as a Visionary in 2010 SSL VPN Magic Quadrant

SonicWALL Inc., a provider of intelligent network security and data protection solutions, announced that it has been positioned in the "Visionaries" quadrant of the December 2010 Magic Quadrant for SSL VPNs by Gartner Inc.

UnboundID Expands Senior Management Team

UnboundID Corp., a developer of identity management software for Internet-driven, consumer-facing architectures, has named former Zag.com and Motive executive Jeff Bolke vice president of sales. In addition, UnboundID promoted Andy Land to the position of vice president of marketing.

A Conversation with Chris Wooten

We recently sat down with Chris Wooten, president of NICE Security America, to talk about IT departments’ increasing involvement in deploying security systems and how that affects the movement toward open architecture.

A Conversation with Todd Lattanzi

AdTran recently made its move into the Unified Threat Management (UTM) market with the introduction of several UTM appliances. We sat down with Todd Lattanzi, the company’s senior product manager, to ask him about AdTran’s new direction.

Financial Services Sector Signs Cybersecurity Research Agreement With NIST, DHS

The National Institute of Standards and Technology (NIST) has joined in a new public-private partnership to spur cybersecurity innovation in the financial services sector.

Cloud Computing, Virtualization Will Increase Security Demands On Service Providers, According To Trend Micro

With the growing diversity of operating systems among companies, as well as the growing use of mobile devices, cybercriminals should have a very profitable 2011. Their tactic will be to put a new spin on social engineering by way of "malware campaigns," by bombarding recipients with e-mail that drop downloaders containing malware.

Report: Trojans Continue To Dominate Malware Threat Landscape

GFI Software recently announced the top 10 most prevalent malware threats for the month of November. The report, compiled from monthly scans performed by GFI's anti-malware solution, VIPRE Antivirus, and its antispyware tool, CounterSpy, is a service of GFI Labs.



Study: Growth In Social Networking, Mobile and Infrastructure Attacks Threaten Corporate Security In 2011

IID (Internet Identity), a provider of technology and services that help organizations secure Internet presence, recently released its list of the top enterprise security trends for 2011.

State Government Of Ohio Expands Encrypted E-Mail

Zix Corp. recently announced that it will offer secure e-mail to an additional 10,000 state government employees in a new contract with Ohio.

NitroSecurity, Waterfall Security Solutions Integrate Physical and Enterprise Management

Security information and event management solutions now can report over unidirectional gateways and collect logs and events.

The Best of Both Worlds

Dell’s first step into the realm of solutions grabs the best parts of two encryption schemes.

Report: Cybercriminals Continue To Diversify Attack Tactics To Sustain Spam, Malware Levels

Symantec Corp. recently announced the launch of its MessageLabs Intelligence 2010 Security Report. The annual report details how cyber criminals have diversified their attack tactics to sustain spam and malware at high levels throughout 2010.

Trace3 Finds New CTO Within its Ranks

Trace3 has promoted Practice Manager David Hekimian to chief technology officer.

Research: Increasing Threats, Federal Resource Shortages Drive $13 Billion Investment In Cybersecurity

Driven by a 445 percent increase in cybersecurity incidents since 2006, the shortage of qualified security professionals, and an increasingly complex and interconnected technology environment, INPUT forecasts federal investment in information security to increase to $13.3 billion by 2015 at a compound annual growth rate of 9.1 percent, nearly twice the rate of overall federal IT spending.

Survey: Increasing Usage Of USB Drives Leaves Corporate Information At Risk

An online survey has found that USB flash drive ownership has exploded with 100 percent of the 229 respondents having at least one such device -- 54 percent possessing between 3 and 6 -- and more than 21 percent owning as many as 10 or more.

Two New Cloud Computing Whitepapers Available From CompTIA

CompTIA, the non-profit association for the information technology (IT) industry, announced recently the availability of two new whitepapers on important cloud computing topics.

Cybercriminals Shopping For Consumers During Holiday Season

Cyber Monday is a term originally coined in 2005, when upon returning to the office after the extended Thanksgiving break, consumers hit their company’s high-speed Internet to start online shopping for the holidays. While most consumers these days now have high-speed Internet available to them at home (or on their phone, or at their local coffee house) Cyber Monday has quickly become its own “holiday of shopping.”

ERIS, L-3 STRATIS and Virginia Tech Launch Management Initiative

The platform will offer users broad situational awareness through its real-time single interface that will display relevant information about critical systems in buildings and campus infrastructures, including extensive tactical information.

Research: Consumerization Of IT Will Drive Investments In Remote, Mobile Security

Increasing levels of cyber crime, numerous regulatory and compliance requirements, and an explosion in usage of consumer devices and applications in the workplace will drive organizational investments in security solutions in 2011, according to Unisys security experts.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3