IT Security


HP Acquires ArcSight For $1.5 Billion

HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.

Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Study: Cybercrime Strikes More Than Two-Thirds Of Internet Users

The next time you surf the Internet, consider this: You might be just one click away from becoming the next cybercrime victim.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Study: 25 Percent Of New Worms Designed To Spread Through USB Devices

PandaLabs, Panda Security's antimalware laboratory, has discovered that in 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers. These types of threats can copy themselves to any device capable of storing information such as cell phones, external hard drives, DVDs, flash memories and MP3/4 players.

Study: Mobile Application Security One Of Top Concerns For Organizations

According to a new study commissioned by Entrust Inc., many of today's mobile applications have limited functionality from a lack of overall security. And for mobile applications that feature transaction-based capabilities, the requirement for security is even greater, highlighting a key area of concern for deploying organizations.

Cameron Diaz Is Web’s Most Dangerous Celebrity Search

Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee Inc. For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web.



Intel To Acquire McAfee For $7.68 Billion

Intel Corp. has entered into a definitive agreement to acquire McAfee Inc., through the purchase of all of the company’s common stock at $48 per share in cash, for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which is expected to close after McAfee shareholder approval, regulatory clearances and other customary conditions specified in the agreement.

Brivo Earns TRUSTe's Stamp of Approval

The TRUSTe EU Safe Harbor Seal communicates that a website has committed to protecting the privacy of visitors through compliance with the EU-U.S. Safe Harbor Framework and participation in TRUSTe’s Watchdog Consumer Dispute Resolution service.

NIST Report: Securing Critical Computer Systems Starts At Beginning

Nothing beats the feeling of starting up a new computer -- be it a laptop, desktop or a major, custom-designed computing system. A new system is a blank slate with no worry of botnets, viruses or any other cybersecurity hazards. Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for Federal Information Systems. Information systems and components are under attack throughout the supply chain from the design phase -- including specification and acquisition of custom products -- through disposal.

IQinVision Centralizes Marketing under Nazarenus, Expands Sales

The addition of new distribution organizations and the augmentation of sales operations with four new personnel will help ensure the company is set up for continued rapid sales growth, the company said.

Pictured from left are Ken King, President of ‘The Strategy King’; Dr. Greg Winter, CVTC Superintendent; Haley Pitre, Executive Assistant, HSI Sensing; Ryan Posey, VP Operations, HSI Sensing; Angela Lewis, CVTC BIS Director; George Tiner, CVTC Assistant Superintendent; and Dick Lowe, CVTC Industrial Coordinator.

HSI Sensing Recognized with Partners for Progress Award

“Partnerships like this strengthen our communities and serve as the foundation for future growth and prosperity,” said CVTC’s Angie Lewis of HSI, an ISO 9001:2008-registered company that designs, develops, and makes reed switches, proximity sensors, and other sensing products.

Survey: Accessing Corporate Data On Vacation Has Serious Implications For IT Security

With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead these stressed out individuals, a whopping 95 percent of our sample, will be taking their mobiles and smartphones abroad with them with the expectation of working.

Research: Majority Of Business Leaders Underestimate Risk Of Advanced Cyberthreats

NetWitness Corp. recently announced the results of a research study by the Ponemon Institute on advanced threat prevalence, impact and preparedness. The study demonstrates that a vast majority of enterprises of all sizes regularly fall victim to advanced cyber threats, at the same time, more than half of these organizations recognize their defensive technologies, personnel and budget as "inadequate."

Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

National Initiative For Cybersecurity Education Spreading Across Country

Cybersecurity training is spreading from high-tech and government offices into high schools, libraries and workplaces near you. Called the National Initiative for Cybersecurity Education (NICE) and coordinated by the National Institute of Standards and Technology (NIST) , the new interagency program aims to promote cybersecurity awareness and know-how across the country and among citizens of all ages.

Smart Business Communications

How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.

Research: Smart Grid Cybersecurity Market To Reach $3.7 Billion By 2015

As governments and utilities invest in smart grid deployments, the need for robust security measures has become increasingly apparent. Those requirements will drive major investments in smart grid cybersecurity over the next several years, according to a recent report from Pike Research.

House Leaders Announce Support For Cybersecurity Bill

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Senator Thomas Carper, D-Del., last week hailed the bipartisan support of prominent members of the House of Representatives for comprehensive cybersecurity legislation introduced last week by the three Senators.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.