IT Security


Report: Nearly One-Third Of Federal Agencies Experience Daily Cybersecurity Incident

CDW Government Inc. recently released its 2009 Federal Cybersecurity Report, which found that across federal civilian and Department of Defense agencies, the number and severity of cybersecurity incidents has stayed the same or increased in the last year, with nearly one-third of Federal agencies experiencing a cybersecurity incident daily.

SCM Microsystems, LEGIC Identsystems To Create USB Tokens For Converged Physical, Logical Access

SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, and LEGIC Identsystems, a manufacturer of contactless smart card technology for personal identification, announced recently that they have formed a strategic partnership to create new products that support integrated physical and logical access.

Conquering The Risks

Corporate security has evolved over the years to recognize that physical security and information security are linked, and both need to be considered if a corporation is to succeed. However, while physical security management has evolved to embrace proactive risk management, information risk management remains oddly reactive. Only a comprehensive, proactive and appropriate information risk management plan will help keep the company secure and in turn provide other benefits.

Survey: Only 22 Percent Of Americans Fully Trust Government Agencies To Keep Personal Information Secure, Private

Only 22 percent of Americans fully trust government agencies to keep personal information secure and private, and the proportion is only slightly better (29 percent) with regard to trust in data protection by financial institutions such as banks, according to research conducted in September by Unisys Corp.

Big Business

Behind all the glamour and glitz, casinos are a lot like other businesses, yet they face a number of unique challenges. Casinos are required to adhere to numerous regulations and must secure their assets without causing inconvenience to customers. Casinos must protect against physical heists, but just as important, if not more so, casinos must protect their networks. Although it may not play as well on the big screen, a network breach could cost millions of dollars.

Report: Worms Jump Back Onto Scene, But Rogue Security Software Still Top Threat

Microsoft Corp. recently released the seventh volume of the Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over the preceding six months.

Federal Information Security Spending Will Continue To Grow, According To Forecast

INPUT recently announced the release of its report: Defining the Federal Information Security Mission: 2009-2014 Forecast, which indicates that federal spending is on the rise to counter the growing threat of cyber attacks on federal computer networks and the national infrastructure.

Extending Trust And Security

Today, most organization officials understand they can use their IP network to connect physical security devices together. In some cases, the capital and operational cost savings from using a single communications infrastructure is enough to motivate them. But for others, further justification and additional benefits may be needed to drive convergence between the physical and the cyber worlds.



campus security, school security, mobile security apps, best security apps for iphone, 10 best security apps for apple iphone, best security software for iphone, mobile security apps, best mobile security apps

10 Best Security Apps for Your iPhone

Apple's App Store currently holds about 85,000 applications for you to download to your iPhone or iPod Touch. Of course, about 84,900 of those programs consist of free and 99-cent games that your seven-year-old would probably find more compelling than you do. So we've scoured reviews, App Store search sites, and recommendation directories to compile this concise list of some of the best security apps currently available.

Department Of State Uses RFID Asset Tracking Solution

The Department of State is tagging 10,000 mission critical IT assets with passive RFID to save money, increase security and reduce administrative burden.

Safe Storage

There are typically two different approaches to storing data in an IP video system: using a centralized architecture with a master database located in the central control room or head office and using a distributed architecture that spreads the data around the security management system, keeping it close to where it is produced or needed.

Study: Discrepancy Between Disaster Preparedness Perception, Reality In SMBs

Symantec Corp. recently announced the findings of its 2009 SMB Disaster Preparedness Survey, reflecting the attitudes and practices of small and mid-sized businesses and customers toward technology disaster preparedness.

Single Sign-On Solution Helps Simplify Access To Records For Healthcare Organization

Sentillion recently announced that IASIS Healthcare, a owner and operator of acute care hospitals, has implemented its enterprise single sign-on (SSO) solution to provide caregivers with improved access to the health system’s electronic health record (EHR) system.

Poll: Security, Data Privacy Top Concerns Of Cloud Computing For Businesses

According to an online poll recently conducted by Unisys Corp., security and data privacy concerns remain the most significant impediment to the adoption of cloud computing among enterprise users.

Thinking Beyond the Product

Technology plays a dichotomous role in the security of an organization's information assets. While it enables us to protect assets in ways we never imagined, it also can enable the very threats that leave those assets vulnerable.

IT Speak

The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.

Verizon Business Enhances Network Security For Nikon

Nikon Corp. one of Japan’s leading manufacturers of optical imaging and processing equipment, has selected Verizon Business to provide new monitoring and security measures to protect Nikon’s global network infrastructure.

Survey: State Of Economy Leading To Increased Data Loss For Companies

In its sixth annual study of outbound e-mail and data loss prevention issues, Proofpoint, Inc. found that U.S. companies are increasingly concerned about a growing number of data leaks caused by employee misuse of e-mail, blogs, social networks, multimedia channels and even text messages.

Lockheed Martin Develops Mission Maker Cyber Security Solutions for Warfighters

Military operations threatened by persistent cyber attacks will benefit from mission assurance and resilience through cyber security solutions being developed by Lockheed Martin.

There's More the Paramount Than Pictures

Paramount Pictures has released many great movies, but the studio is not as bestowing when it comes to privacy and security.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3