IT Security


Study: Information Theft At Global Companies Surpasses All Other Forms Of Fraud For First Time

Theft of information and electronic data at global companies has overtaken physical theft for the first time, according to the latest edition of the Kroll Annual Global Fraud Report. This year’s study shows that the amount lost by businesses to fraud rose from $1.4 million to $1.7 million per billion dollars of sales in the past 12 months – an increase of more than 20 percent.

Lunarline Hires Cyber Operations Expert Thomas Augustine

Augustine will direct Cyber Security Education at the company.

WhiteHat Security Introduces Threat Research Center

WhiteHat Security engineers improve enterprise website security with operational efficiency and threat intelligence.

NIST Sponsors Second Cloud Computing Forum, Workshop In November

On November 4 and 5, the National Institute of Standards and Technology (NIST) will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.

Research: More Than Half Of Mid-Sized Companies Have Seen Increase In Hacker Attacks Since Last Year

McAfee, Inc. recently released new research, finding that mid-sized organizations have seen increased attacks on their networks and systems since last year, according to the McAfee report The Security Paradox.

AmIHackerproof.com Gets Record Hits after CNN Appearance

The online web service had over 205,128 people who performed vulnerability scans and out of those scans over 40,221 registered in a 4 day period.

BLADE Software Eliminates 'Drive-By Downloads' From Malicious Websites

Insecure Web browsers and the growing number of complex applets and browser plug-in applications are allowing malicious software to spread faster than ever on the Internet. Some websites are installing malicious code, such as spyware, on computers without the user’s knowledge or consent.

DHS Launches Cybersecurity Awareness Campaign

The Department of Homeland Security recently launched the “Stop. Think. Connect.” public cybersecurity awareness campaign -- a national initiative that promotes simple steps the public can take to increase their safety and security online.



Report: More Than 50 Percent Of Malware Infections Occurred In Education Sector In First Half Of 2010

During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April.

The New Warfighters

As we go about our day, preoccupied with work, family, friends and activities, many of us have the luxury of never thinking about cyberwarfare. But know that right this second, more than 100 foreign intelligence organizations are trying to hack into our military networks. A scary thought, isn’t it? To defend our nation against this threat, the Pentagon is partnering with NATO allies and the private sector.

Survey: Federal Executives Believe Cybersecurity Measures Hurting Agency Productivity

Citrix Systems Inc. recently announced key findings from a recently conducted survey on the impact of government cybersecurity measures on federal managers.

Going Virtual

Most people in the industry are familiar with how the NVR has changed the face of security video projects worldwide. As security hardware professionals, you may have been asked, “Aren’t NVRs just servers?” or “Can we use one of our extra e-mail machines as an NVR?” You might answer with a reserved, “Yes, but....”

Report: Trojans Constituted More Than Half Of All New Threats In Third Quarter

PandaLabs, Panda Security's antimalware laboratory, recently published its Q3 Quarterly Report on global malware activity, covering security events and incidents from July to September. Continuing the theme from the last report, PandaLabs once again found Trojans in the spotlight, comprising 55 percent of all new threats. Infection via e-mail, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook "Like" button, fake Web pages positioned on search engines (BlackHat SEO) and zero-day vulnerability exploits.

DHS Announces Start Of Cyber Storm III Exercise

Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.

Poll: Businesses Express Confidence In IT Network Resilience, But Experiences Reveal Otherwise

CDW LLC, a provider of technology solutions to business, government, education and healthcare, recentlyannounced the results of its Business Continuity Straw Poll, based on a survey of 200 Information Technology (IT) decision makers at medium and large U.S. businesses, each of which experienced significant network disruptions since July 2009.

Brigadier General Antonino

Brazilian Army Joins Forces with Panda Security to Combat Cyber-Warfare

Panda will train the Army's operational agents in the fight against cyber terrorism, digital crime and strategic preparation for cyber-warfare.

Report: Security Concerns Hinder Adoption Of Web 2.0, Social Networking In Business

McAfee Inc. recently revealed that business leaders worldwide see the value of Web 2.0 in supporting productivity and driving new revenue -- but remain deeply concerned about security threats associated with deploying the technology.

Independent Lab Tests Show Security In Virtualized Data Center, Cloud Computing Is Possible, Measurable

Independent test lab, Broadband Testing, and test and measurement leader, Spirent Communications, achieved a significant breakthrough in securing virtual environments and allaying user fears about cloud based applications.

Waterfall Security Solutions Passes INL Cyber Security Assessment

Waterfall Security Solutions, provider of Unidirectional Security Gateways, announced recently the successful completion of a security assessment, undertaken by the Idaho National Laboratory, of Waterfall's Unidirectional Security Gateway's technology and products. The assessment was conducted as part of the Department of Homeland Security Control Systems Security Program (CSSP).

New Report Highlights Most Significant IT Security Risks Facing Enterprises

Qualys Inc., provider of on demand IT security risk and compliance management solutions, recently announced the release of the “Top Cyber Security Risks Report.” This second annual report features new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, helping companies understand the latest security threats and implement security policies and technologies to protect company data.

Featured

  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3