IT Security


CACI to Support U.S. Navy's Single Supply Solution Program

CACI International Inc. announced recently that it has been awarded an estimated $47.5 million to provide technical support services to the Naval Supply Systems Command.

Nokia, Check Point, Intel to Improve Security for Corporate Networks

Nokia has teamed up with Check Point and Intel to enhance corporate network security in the face of rising threats.

Survey Reveals Growing Awareness of Need for De-Perimeterization Solutions

Jericho Forum recently released a survey its CISO members on the encroaching problem of de-perimeterization.

Study: Businesses to Increase Network Security Spending in 2008

Cisco recently released a set of results from an additional international study examining mobile workers' security behavior with regard to corporate security and its impact on businesses.



The Power of One

ORGANIZATIONS are under attack, not from competitors, federal regulations or consumer outrage, although those are concerns. But enterprises—and subsequently their client base—have become targets.

Building A Better Toolset

IN the last year, information security researchers have warned black hat activity had shifted from digital vandalism to financially motivated attacks. Once motivated by curiosity or the desire to gain notoriety, attackers are now driven by profit. Today’s most ominous threats are designed to gather financial information.

The Big Picture

UNFORTUNATELY, security breaches are not uncommon in today’s world. Internet viruses, data tampering and information theft top the list of nightmares IT departments face worldwide.

Plugging Holes

IN the global economy, it’s imperative that organizations are able to provide secure access to information for employees, citizens and suppliers around the world. This presents a monumental challenge considering today’s range of Internet security threats. Attacks are increasingly driven by financial gain—hackers are no longer motivated by notoriety.

No Time to Rest

PROVIDING a high level of protection for sensitive information is one of the most significant challenges faced by today’s enterprise network and security engineering groups. The traditional perimeter network security methods — passwords, firewalls and anti-virus — provide important protection, but cannot combat all threats present in today’s enterprise network environments.

Ready and Waiting

THICK, dusty, three-ring binders are no place to keep school emergency response protocols. In the event of an emergency, information and time is critical. Precious time can be lost in locating the binder, flipping through the tabs to find the correct section and finally finding the vital information. And what if an evacuation is necessary? Lug the binder out and start the information search all over again during different stages of the emergency? Even then, its contents are only as good as the people who wrote the information, limited to how much the binder can hold and only accessible to those on site.

It's Been a Privilege

ONE of today's biggest IT headaches is managing privileged passwords, the super-powerful codes such as administrator on a Windows® server, Root on a UNIX server, Cisco Enable on a Cisco device, as well as embedded passwords found in applications and scripts.

Featured

  • New Gas Monkey Garage Venue Uses AI-Enhanced Video Technology

    Gas Monkey Garage, the automotive custom shop and entertainment brand founded by Richard Rawlings of Fast N’ Loud TV fame, has opened a vibrant new restaurant and bar in South Dakota, equipped with advanced, AI-enhanced video tech from IDIS Americas. Read Now

  • Data Driven, Proactive Response

    As cities face rising demands for smarter policing and faster emergency response, Real Time Crime Centers (RTCCs) are emerging as essential hubs for data-driven public safety. In this interview, two experts with deep field experience — Ross Bourgeois of New Orleans and Dean Cunningham of Axis Communications — draw on decades of operational, leadership and technology expertise to share how RTCCs are transforming public safety through innovation, interagency collaboration and a relentless focus on community impact. Read Now

  • Integration Imagination: The Future of Connected Operations

    Security teams that collaborate cross-functionally and apply imagination and creativity to envision and design their ideal integrated ecosystem will have the biggest upside to corporate security and operational benefits. Read Now

  • Smarter Access Starts with Flexibility

    Today’s workplaces are undergoing a rapid evolution, driven by hybrid work models, emerging smart technologies, and flexible work schedules. To keep pace with growing workplace demands, buildings are becoming more dynamic – capable of adapting to how people move, work, and interact in real-time. Read Now

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.