IT Security


SIA Reports IT Managers Getting More Involved In Physical Security Decision Making

IT managers are getting more involved in decisions regarding physical security solutions, according to a new report featured in the latest Quarterly Research Update from the Security Industry Association (SIA).

An Olympic Feat

After the staggering success of the 2008 Olympic Games in Beijing, you could argue that things have been changed forever.

Survey: Disparity Between IT Security Needs, Technology Purchases

RSA Conference recently released the results of a recent survey of security professionals regarding the critical security threats and infrastructure issues they currently face, including those exacerbated by the current economic climate. The study, “What Security Issues Are You Currently Facing?,” includes responses from nearly 150 C-level executives and professionals charged with directing, managing and engineering security infrastructures within their respective organizations.

Survey: 44 Percent Of SMBs Recently Infected By Internet Threats

Panda Security recently announced its worldwide barometer on the status of security at small and medium-sized businesses. According to the study, which surveyed 5,760 companies worldwide, 44 percent of the more than 1,400 United States respondents have recently been infected by Internet threats. Worldwide, 58 percent were affected, with Brazil showing the highest infection rate at 86 percent. Only 8 percent of SMBs in Germany reported infections.

ISACA Leader Calls For Fundamental Change To Information Security

At ISACA’s International Conference in Los Angeles recently, security professional John Pironti called for a sweeping change in how enterprises deal with information security.

Employees Possibly Putting Corporate Infrastructure At Risk By Sharing To Much Information On Social Networking Sites, According To Research

IT security and data protection firm Sophos has called upon social networking Web sites such as Twitter and Facebook to do more to protect their millions of users, as new research is published examining the first six months of cybercrime in 2009.

Survey: 85 Percent Of U.S. Organizations Hit By At Least One Data Breach In Last 12 Months

PGP Corp. recently announced the results from The Ponemon Institute's fourth annual study on encryption usage in the enterprise -- The 2009 Annual Study: U.S. Enterprise Encryption Trends. This year's study surveyed 997 IT and security practitioners and identifies the trends in enterprise encryption planning strategies, budgeting and spending, deployment methodologies and impact on data breach incidents.

Texas Passes Anti-Botnet Bill

On June 19, Gov.Rick Perry of Texas signed SB 28 into law, amending Texas’ Consumer Protection Against Spyware Act to include violations against the creation or use of computer “zombies” and “botnets.”



Negative Cash Flow

There is a growing and highly effective breed of bank robbers at work around the world. Money is not particularly safe and secure, and no city is immune.

Ask the Expert

Technology is moving at an incredible pace all around us, and the security industry is no exception. New systems require experience working with not only cameras and card readers but also with information and networking technology. The successful setup and installation of today’s access control systems is likely to require the use of corporate bandwidth, along with a system integrator that understands the IT world.

Survey: Employees Ignore, Evade Network Security Policies

There is a general lack of awareness and enforcement of security policies and procedures in companies today, according to new research announced by privacy and information management research firm, Ponemon Institute.

Milestone Takes Openness To The Next Level With Universal Driver

Milestone Systems, the open platform company within IP video management software, has announced the release of the Milestone Universal Driver for fast, basic device support of IP network cameras in XProtect solutions.

In The Zone

A delicate balance exists in the retail world as businesses try to ensure easy and seamless customer experiences while maintaining high security. This ranges from finalizing a transaction, down to information security controls and processes designed for data integrity.

Holistic Security

In the wake of undiscovered data breaches and subsequent public exposure, a layered approach to security is becoming even more important for protecting a company’s critical assets.

Knowledge Center Goes Live for NASCAR Pocono 500 Race

Knowledge Center™—a daily use incident and event management software application—went live in Pennsylvania's Northeast Counter-Terrorism Task Force (NE-CTTF) in May.

HID Global Creates Position To Address Simplifying IT Security For Mobile Workforce

HID Global recently announced that it has created a new position to proactively work with Dell to address simplifying IT security for the mobile workforce. Both HID and Dell recognize that the use of the physical access control card is converging with other applications, including providing secure access to the PC and IT network. To support growing interest in this area, HID Global has named Kami Schiller as director of strategic accounts, HID Connect, reporting to Debra Spitler, vice president of HID Connect.

Protecting the Cyber Side

Vandalism, theft and acts of terrorism in recent years have motivated the electric generation and transmission industry to seek viable security solutions. Companies must secure their facilities and protect their physical and electronic assets while managing access to their properties state-to-state over geographically widespread regions.

Command and Control

Although Web-based technology is new to fire communications, it was just what the St. Andrews School in Delaware needed. John Menter of Sentinel Service was tasked with updating an antiquated alarm system with a new addressable solution that would include fire protection for eight separate buildings and control future budget and maintenance costs.

Most Dangerous, Safest Web Searches Examined

Some of the riskiest searches on the Internet today are associated either with finding items for free, such as music or screensavers, or looking for work that can be done from home, according to Internet security company McAfee Inc.

Report: 90.4 Percent Of E-Mail Is Spam

Symantec Corp. recently announced the publication of its May 2009 MessageLabs Intelligence Report. The analysis highlights that spam experienced a further increase of 5.1 percent since last month, reaching heights of 90.4 percent.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3