CDW Government Inc. recently released its 2009 Federal Cybersecurity Report, which found that across federal civilian and Department of Defense agencies, the number and severity of cybersecurity incidents has stayed the same or increased in the last year, with nearly one-third of Federal agencies experiencing a cybersecurity incident daily.
SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, and LEGIC Identsystems, a manufacturer of contactless smart card technology for personal identification, announced recently that they have formed a strategic partnership to create new products that support integrated physical and logical access.
Corporate security has evolved over the years to recognize that physical security and information security are linked, and both need to be considered if a corporation is to succeed. However, while physical security management has evolved to embrace proactive risk management, information risk management remains oddly reactive. Only a comprehensive, proactive and appropriate information risk management plan will help keep the company secure and in turn provide other benefits.
- By John B. Harris
- Nov 11, 2009
Only 22 percent of Americans fully trust government agencies to keep personal information secure and private, and the proportion is only slightly better (29 percent) with regard to trust in data protection by financial institutions such as banks, according to research conducted in September by Unisys Corp.
Behind all the glamour and glitz, casinos are a lot like other businesses, yet they face a number of unique challenges. Casinos are required to adhere to numerous regulations and must secure their assets without causing inconvenience to customers. Casinos must protect against physical heists, but just as important, if not more so, casinos must protect their networks. Although it may not play as well on the big screen, a network breach could cost millions of dollars.
- By Matt Neely
- Nov 06, 2009
Microsoft Corp. recently released the seventh volume of the Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over the preceding six months.
INPUT recently announced the release of its report: Defining the Federal Information Security Mission: 2009-2014 Forecast, which indicates that federal spending is on the rise to counter the growing threat of cyber attacks on federal computer networks and the national infrastructure.
Today, most organization officials understand they can use their IP network to connect physical security devices together. In some cases, the capital and operational cost savings from using a single communications infrastructure is enough to motivate them. But for others, further justification and additional benefits may be needed to drive convergence between the physical and the cyber worlds.
- By Bob Beliles
- Oct 19, 2009
Apple's App Store currently holds about 85,000 applications for you to download to your iPhone or iPod Touch. Of course, about 84,900 of those programs consist of free and 99-cent games that your seven-year-old would probably find more compelling than you do. So we've scoured reviews, App Store search sites, and recommendation directories to compile this concise list of some of the best security apps currently available.
The Department of State is tagging 10,000 mission critical IT assets with passive RFID to save money, increase security and reduce administrative burden.
There are typically two different approaches to storing data in an IP video system: using a centralized architecture with a master database located in the central control room or head office and using a distributed architecture that spreads the data around the security management system, keeping it close to where it is produced or needed.
- By Barry Keepence
- Oct 05, 2009
Symantec Corp. recently announced the findings of its 2009 SMB Disaster Preparedness Survey, reflecting the attitudes and practices of small and mid-sized businesses and customers toward technology disaster preparedness.
Sentillion recently announced that IASIS Healthcare, a owner and operator of acute care hospitals, has implemented its enterprise single sign-on (SSO) solution to provide caregivers with improved access to the health system’s electronic health record (EHR) system.
According to an online poll recently conducted by Unisys Corp., security and data privacy concerns remain the most significant impediment to the adoption of cloud computing among enterprise users.
Technology plays a dichotomous role in the
security of an organization's information
assets. While it enables us to protect assets in
ways we never imagined, it also can enable the very
threats that leave those assets vulnerable.
- By B. Scott Haroff
- Sep 10, 2009
The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.
- By Fredrik Wallberg
- Sep 04, 2009
Nikon Corp. one of Japan’s leading manufacturers of optical imaging and processing equipment, has selected Verizon Business to provide new monitoring and security measures to protect Nikon’s global network infrastructure.
In its sixth annual study of outbound e-mail and data loss prevention issues, Proofpoint, Inc. found that U.S. companies are increasingly concerned about a growing number of data leaks caused by employee misuse of e-mail, blogs, social networks, multimedia channels and even text messages.
Military operations threatened by persistent cyber attacks will benefit from mission assurance and resilience through cyber security solutions being developed by Lockheed Martin.
Paramount Pictures has released many great movies, but the studio is not as bestowing when it comes to privacy and security.
- By Ralph C. Jensen
- Aug 07, 2009