IT Security


Research Indicates IT Security Needs Of Mid-Sized Organizations Becoming More Sophisticated

RSA, The Security Division of EMC, recently released the results of two new research initiatives that explore log management priorities for mid-sized organizations.

Poll: Data Loss Is Top Corporate Security Threat

CDW LLC recently announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 IT security managers and decision makers at medium and large businesses across the United States.

Less Than Half Of Cloud Services Vetted For Security, According To Study

CA Inc. and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently announced a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization.

Survey: Employees More Focused On Individual Concerns Than Overall Company IT Security

From prowling social networking sites at work, to overriding their company's installed security so they can access restricted websites, most employees were found to be generally imprudent and ambivalent when it comes to their company's overall security health, according to the 2010 Trend Micro survey on corporate and small business end users.

Survey Looks At Security Management Practices, Compliance Weaknesses

SenSage recently announced the results of an industry survey on security management practices taken during the RSA Conference in March.

Survey: Majority Of Americans Unaware Of Cloud Computing

A majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey released recently. Approximately one in five U.S. citizens said they were unaware of whether their personal or corporate data is being held “in the cloud,” and 60 percent said they did not know what “in the cloud” means.

Market Trends

Trends in the Market

The use of video surveillance in business began with the introduction of CCTV in the early 1960s. Throughout the years, we have witnessed the rapid uptake of some technologies, while others showed promise but never experienced widespread adoption. Today, there are four trends that are shaping the video industry.

Consumers Confident In Security Of Mobile Devices, According To Research

According to recent research conducted by Unisys Corp., the majority of mobile device users worldwide feel safe using their mobile devices for applications, including airline boarding passes; as payments in stores for low-cost items; or to access online banking.



Survey: Data Security In The Cloud Top Concern For Government Officials

Lockheed Martin and its Cyber Security Alliance partners recently announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption."

Survey: Almost Half Of IT Professionals Say Cloud Computing Risks Outweigh Benefits

Nearly half of U.S. IT professionals say that the risks of cloud computing outweigh the benefits, according to the 2010 ISACA IT Risk/Reward Barometer survey.

Survey: Companies Lack Adequate Policies To Protect Information In The Cloud

Symantec Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure.

Wireless mesh

Challenge or Opportunity?

Wireless has been in the physical security space for years, especially with point-to-point bridges. But the newcomers—especially in the field of wireless mesh—are changing the game. Will wireless be as ubiquitous for outdoor deployments as cable or fiber?

Seattle Tops Report As U.S. City Most Vulnerable To Cyber Crime

Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the nation’s top 10 cities most vulnerable to cybercrime.

Poll: One In 10 Employees Knowingly Violate Company IT Policy

A new Fiberlink Poll published recently showed that more than one in 10 U.S. workers admit to knowingly violating the policies put in place by their companies' IT departments in order to get their work done.

Report: Total Loss Linked To Online Fraud More Than Doubles In 2009

The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), today released the 2009 annual report about fraudulent activity on the Internet.

Research: Majority Of Malicious Web Sites Hosted On U.S.-Based Servers

AVG Technologies recently unveiled the results of a research study which shows that -- contrary to popular opinion -- most malicious Web sites are hosted on U.S. servers and not in other countries like China.

Study Examines Wireless Network Security At RSA

Motorola AirDefense performed wireless security monitoring at the RSA 2010 conference. Leveraging its Wireless Intrusion Prevention System platform and wireless security expertise, Motorola AirDefense collected and analyzed the security of the wireless networks present at the show.

securing data centers

Identity: Authenticated

It's no surprise that for data industry leaders, when addressing the questions of physical access control, the overwhelming answer has been biometric technology, which provides a level of security beyond that of conventional card systems by verifying the identity of the person.

IP video integration

Integrated at the Next Level

In order to address the shortcomings of traditional security systems, integrators and manufacturers have developed piecemeal solutions by creating interfaces between devices. When these interfaces are used, separate subsystems can work in conjunction.

Report: Malicious Spam, Social Engineering Attacks Rising

M86 Security, a provider of Web and messaging security products, recently unveiled its latest Security Labs Report, detailing a massive increase in spam volumes and recent vulnerabilities in applications including Adobe products and attacks via social networking sites such as Twitter.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Webinars

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3