IT Security


NIST Sponsors Second Cloud Computing Forum, Workshop In November

On November 4 and 5, the National Institute of Standards and Technology (NIST) will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.

Research: More Than Half Of Mid-Sized Companies Have Seen Increase In Hacker Attacks Since Last Year

McAfee, Inc. recently released new research, finding that mid-sized organizations have seen increased attacks on their networks and systems since last year, according to the McAfee report The Security Paradox.

AmIHackerproof.com Gets Record Hits after CNN Appearance

The online web service had over 205,128 people who performed vulnerability scans and out of those scans over 40,221 registered in a 4 day period.

BLADE Software Eliminates 'Drive-By Downloads' From Malicious Websites

Insecure Web browsers and the growing number of complex applets and browser plug-in applications are allowing malicious software to spread faster than ever on the Internet. Some websites are installing malicious code, such as spyware, on computers without the user’s knowledge or consent.

DHS Launches Cybersecurity Awareness Campaign

The Department of Homeland Security recently launched the “Stop. Think. Connect.” public cybersecurity awareness campaign -- a national initiative that promotes simple steps the public can take to increase their safety and security online.

Report: More Than 50 Percent Of Malware Infections Occurred In Education Sector In First Half Of 2010

During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April.

The New Warfighters

As we go about our day, preoccupied with work, family, friends and activities, many of us have the luxury of never thinking about cyberwarfare. But know that right this second, more than 100 foreign intelligence organizations are trying to hack into our military networks. A scary thought, isn’t it? To defend our nation against this threat, the Pentagon is partnering with NATO allies and the private sector.

Survey: Federal Executives Believe Cybersecurity Measures Hurting Agency Productivity

Citrix Systems Inc. recently announced key findings from a recently conducted survey on the impact of government cybersecurity measures on federal managers.



Going Virtual

Most people in the industry are familiar with how the NVR has changed the face of security video projects worldwide. As security hardware professionals, you may have been asked, “Aren’t NVRs just servers?” or “Can we use one of our extra e-mail machines as an NVR?” You might answer with a reserved, “Yes, but....”

Report: Trojans Constituted More Than Half Of All New Threats In Third Quarter

PandaLabs, Panda Security's antimalware laboratory, recently published its Q3 Quarterly Report on global malware activity, covering security events and incidents from July to September. Continuing the theme from the last report, PandaLabs once again found Trojans in the spotlight, comprising 55 percent of all new threats. Infection via e-mail, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook "Like" button, fake Web pages positioned on search engines (BlackHat SEO) and zero-day vulnerability exploits.

DHS Announces Start Of Cyber Storm III Exercise

Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.

Poll: Businesses Express Confidence In IT Network Resilience, But Experiences Reveal Otherwise

CDW LLC, a provider of technology solutions to business, government, education and healthcare, recentlyannounced the results of its Business Continuity Straw Poll, based on a survey of 200 Information Technology (IT) decision makers at medium and large U.S. businesses, each of which experienced significant network disruptions since July 2009.

Brigadier General Antonino

Brazilian Army Joins Forces with Panda Security to Combat Cyber-Warfare

Panda will train the Army's operational agents in the fight against cyber terrorism, digital crime and strategic preparation for cyber-warfare.

Report: Security Concerns Hinder Adoption Of Web 2.0, Social Networking In Business

McAfee Inc. recently revealed that business leaders worldwide see the value of Web 2.0 in supporting productivity and driving new revenue -- but remain deeply concerned about security threats associated with deploying the technology.

Independent Lab Tests Show Security In Virtualized Data Center, Cloud Computing Is Possible, Measurable

Independent test lab, Broadband Testing, and test and measurement leader, Spirent Communications, achieved a significant breakthrough in securing virtual environments and allaying user fears about cloud based applications.

Waterfall Security Solutions Passes INL Cyber Security Assessment

Waterfall Security Solutions, provider of Unidirectional Security Gateways, announced recently the successful completion of a security assessment, undertaken by the Idaho National Laboratory, of Waterfall's Unidirectional Security Gateway's technology and products. The assessment was conducted as part of the Department of Homeland Security Control Systems Security Program (CSSP).

New Report Highlights Most Significant IT Security Risks Facing Enterprises

Qualys Inc., provider of on demand IT security risk and compliance management solutions, recently announced the release of the “Top Cyber Security Risks Report.” This second annual report features new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, helping companies understand the latest security threats and implement security policies and technologies to protect company data.

HP Acquires ArcSight For $1.5 Billion

HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.

Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Digital Access in the Workplace

    It is simple to set up a unified, robust access control solution for one tenant leasing one building. It is even easier if the tenant owns the property. But what is involved when multiple companies lease space in a building? And what about companies that have multiple buildings in the same city or locations across various regions in the country and the world? Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3