RSA, The Security Division of EMC, recently released the results of two new research initiatives that explore log management priorities for mid-sized organizations.
CDW LLC recently announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 IT security managers and decision makers at medium and large businesses across the United States.
CA Inc. and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently announced a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization.
From prowling social networking sites at work, to overriding their company's installed security so they can access restricted websites, most employees were found to be generally imprudent and ambivalent when it comes to their company's overall security health, according to the 2010 Trend Micro survey on corporate and small business end users.
SenSage recently announced the results of an industry survey on security management practices taken during the RSA Conference in March.
A majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey released recently. Approximately one in five U.S. citizens said they were unaware of whether their personal or corporate data is being held “in the cloud,” and 60 percent said they did not know what “in the cloud” means.
The use of video surveillance in business began with the introduction of CCTV in the early 1960s. Throughout the years, we have witnessed the rapid uptake of some technologies, while others showed promise but never experienced widespread adoption. Today, there are four trends that are shaping the video industry.
- By Elan Moriah
- May 01, 2010
According to recent research conducted by Unisys Corp., the majority of mobile device users worldwide feel safe using their mobile devices for applications, including airline boarding passes; as payments in stores for low-cost items; or to access online banking.
Lockheed Martin and its Cyber Security Alliance partners recently announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption."
Nearly half of U.S. IT professionals say that the risks of cloud computing outweigh the benefits, according to the 2010 ISACA IT Risk/Reward Barometer survey.
Symantec Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure.
Wireless has been in the physical security space for years, especially with point-to-point bridges. But the newcomers—especially in the field of wireless mesh—are changing the game. Will wireless be as ubiquitous for outdoor deployments as cable or fiber?
- By Ksenia Coffman
- Apr 01, 2010
Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the nation’s top 10 cities most vulnerable to cybercrime.
A new Fiberlink Poll published recently showed that more than one in 10 U.S. workers admit to knowingly violating the policies put in place by their companies' IT departments in order to get their work done.
The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), today released the 2009 annual report about fraudulent activity on the Internet.
AVG Technologies recently unveiled the results of a research study which shows that -- contrary to popular opinion -- most malicious Web sites are hosted on U.S. servers and not in other countries like China.
Motorola AirDefense performed wireless security monitoring at the RSA 2010 conference. Leveraging its Wireless Intrusion Prevention System platform and wireless security expertise, Motorola AirDefense collected and analyzed the security of the wireless networks present at the show.
It's no surprise that for data industry leaders, when addressing the questions of physical access control, the overwhelming answer has been biometric technology, which provides a level of security beyond that of conventional card systems by verifying the identity of the person.
- By Jon Mooney
- Mar 03, 2010
In order to address the shortcomings of traditional security systems, integrators and manufacturers have developed piecemeal solutions by creating interfaces between devices. When these interfaces are used, separate subsystems can work in conjunction.
- By Jumbi Edulbehram, Peter Jankowski
- Mar 01, 2010
M86 Security, a provider of Web and messaging security products, recently unveiled its latest Security Labs Report, detailing a massive increase in spam volumes and recent vulnerabilities in applications including Adobe products and attacks via social networking sites such as Twitter.