IT Security


Report: Nearly One-Third Of Federal Agencies Experience Daily Cybersecurity Incident

CDW Government Inc. recently released its 2009 Federal Cybersecurity Report, which found that across federal civilian and Department of Defense agencies, the number and severity of cybersecurity incidents has stayed the same or increased in the last year, with nearly one-third of Federal agencies experiencing a cybersecurity incident daily.

SCM Microsystems, LEGIC Identsystems To Create USB Tokens For Converged Physical, Logical Access

SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, and LEGIC Identsystems, a manufacturer of contactless smart card technology for personal identification, announced recently that they have formed a strategic partnership to create new products that support integrated physical and logical access.

Conquering The Risks

Corporate security has evolved over the years to recognize that physical security and information security are linked, and both need to be considered if a corporation is to succeed. However, while physical security management has evolved to embrace proactive risk management, information risk management remains oddly reactive. Only a comprehensive, proactive and appropriate information risk management plan will help keep the company secure and in turn provide other benefits.

Survey: Only 22 Percent Of Americans Fully Trust Government Agencies To Keep Personal Information Secure, Private

Only 22 percent of Americans fully trust government agencies to keep personal information secure and private, and the proportion is only slightly better (29 percent) with regard to trust in data protection by financial institutions such as banks, according to research conducted in September by Unisys Corp.

Big Business

Behind all the glamour and glitz, casinos are a lot like other businesses, yet they face a number of unique challenges. Casinos are required to adhere to numerous regulations and must secure their assets without causing inconvenience to customers. Casinos must protect against physical heists, but just as important, if not more so, casinos must protect their networks. Although it may not play as well on the big screen, a network breach could cost millions of dollars.

Report: Worms Jump Back Onto Scene, But Rogue Security Software Still Top Threat

Microsoft Corp. recently released the seventh volume of the Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over the preceding six months.

Federal Information Security Spending Will Continue To Grow, According To Forecast

INPUT recently announced the release of its report: Defining the Federal Information Security Mission: 2009-2014 Forecast, which indicates that federal spending is on the rise to counter the growing threat of cyber attacks on federal computer networks and the national infrastructure.

Extending Trust And Security

Today, most organization officials understand they can use their IP network to connect physical security devices together. In some cases, the capital and operational cost savings from using a single communications infrastructure is enough to motivate them. But for others, further justification and additional benefits may be needed to drive convergence between the physical and the cyber worlds.



campus security, school security, mobile security apps, best security apps for iphone, 10 best security apps for apple iphone, best security software for iphone, mobile security apps, best mobile security apps

10 Best Security Apps for Your iPhone

Apple's App Store currently holds about 85,000 applications for you to download to your iPhone or iPod Touch. Of course, about 84,900 of those programs consist of free and 99-cent games that your seven-year-old would probably find more compelling than you do. So we've scoured reviews, App Store search sites, and recommendation directories to compile this concise list of some of the best security apps currently available.

Department Of State Uses RFID Asset Tracking Solution

The Department of State is tagging 10,000 mission critical IT assets with passive RFID to save money, increase security and reduce administrative burden.

Safe Storage

There are typically two different approaches to storing data in an IP video system: using a centralized architecture with a master database located in the central control room or head office and using a distributed architecture that spreads the data around the security management system, keeping it close to where it is produced or needed.

Study: Discrepancy Between Disaster Preparedness Perception, Reality In SMBs

Symantec Corp. recently announced the findings of its 2009 SMB Disaster Preparedness Survey, reflecting the attitudes and practices of small and mid-sized businesses and customers toward technology disaster preparedness.

Single Sign-On Solution Helps Simplify Access To Records For Healthcare Organization

Sentillion recently announced that IASIS Healthcare, a owner and operator of acute care hospitals, has implemented its enterprise single sign-on (SSO) solution to provide caregivers with improved access to the health system’s electronic health record (EHR) system.

Poll: Security, Data Privacy Top Concerns Of Cloud Computing For Businesses

According to an online poll recently conducted by Unisys Corp., security and data privacy concerns remain the most significant impediment to the adoption of cloud computing among enterprise users.

Thinking Beyond the Product

Technology plays a dichotomous role in the security of an organization's information assets. While it enables us to protect assets in ways we never imagined, it also can enable the very threats that leave those assets vulnerable.

IT Speak

The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.

Verizon Business Enhances Network Security For Nikon

Nikon Corp. one of Japan’s leading manufacturers of optical imaging and processing equipment, has selected Verizon Business to provide new monitoring and security measures to protect Nikon’s global network infrastructure.

Survey: State Of Economy Leading To Increased Data Loss For Companies

In its sixth annual study of outbound e-mail and data loss prevention issues, Proofpoint, Inc. found that U.S. companies are increasingly concerned about a growing number of data leaks caused by employee misuse of e-mail, blogs, social networks, multimedia channels and even text messages.

Lockheed Martin Develops Mission Maker Cyber Security Solutions for Warfighters

Military operations threatened by persistent cyber attacks will benefit from mission assurance and resilience through cyber security solutions being developed by Lockheed Martin.

There's More the Paramount Than Pictures

Paramount Pictures has released many great movies, but the studio is not as bestowing when it comes to privacy and security.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3