IT Security


Integrating Physical and Cyber Security: Strategies that Work

Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.

Report: Government IT Pros Think Cybersecurity is Very Important

InformationWeek Reports, a service provider for peer-based IT research and analysis, announced the release of its latest research report.

From the IT Perspective

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.

Study: Many IT Professionals Believe Cyber Security Has Increased

A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.

GSA Launches Effort to Transition Federal Government to Cloud Computing

The U.S. General Services Administration (GSA) has announced an important benchmark that will pave the way for agencies across the federal government to accelerate adoption of cloud computing.

Threat Intelligence System Helps Share Malware Data

Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.



Security Systems Integrators Unsure About IT Distributors

Almost 40 percent of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products, according to a new report from IMS Research.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.

Military Explores Expansion of Open Source Technology

Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.

Linsanity, Whitney's Death, New Android Threats Dominate Cybercrime in First Quarter

This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.

Research: Personal Information Top Target of Cyber Attacks

Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to the Data Loss Straw Poll, a national survey published today by CDW LLC.

Mobile Security Survey: Lack of Awareness Chaos Pervades BYOD

SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.

Mobile Device Vulnerability Management Top Concern for Security Professionals in 2012

New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months

HID Global Shows off NFC Access Control Technology in Action at ISC West

With mobile technology becoming an important trend in the security industry, HID Global showcased its NFC access control technology in action during a lunch Thursday at ISC West.

Mobile Takeover at ISC West

All attendees and exhibitors were introduced to “The Future of Security” early Wednesday morning; yet, many exhibitors came to Las Vegas armed with the mobile technology know-how to take on the new wave of mobile communication.

The Future of Security

The future of security is always on the minds of industry leaders and developers. As a welcome to all attendees at this year’s ISC West Conference in Las Vegas, an early morning session devoted to the future of the security industry addressed how IT and security convergence in the cloud will create better end-user operability.

CompTIA, Cybersecurity Experts Call For Best Practices with Increased Adoption of Mobile Technologies

In today's "post-PC" world, businesses of all sizes, as well as policy makers at all levels, need to be ready to address and manage increasing security and privacy challenges, found a panel of experts at CompTIA's mobile security briefing. Several dozen Hill staff, policy makers, security and privacy experts and technology advocates participated in the discussion.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3