IT Security


Survey Looks At Gaps In Web Security

Purewire Inc., a Web security SaaS vendor, recently announced end-user survey results illustrating severe vulnerabilities to corporate networks due to malware-infected Web applications, remote workers and shrinking IT budgets.

Report: Critical Infrastructure Prime Targets For Cyber Criminals In 2009

The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign’s iDefense Security Intelligence Services.

Survey: 96 Percent Of Databases Export Sensitive Data To Other Systems

Independent research organization Unisphere Research and Vormetric, Inc., recently announced results of the Special Research Report: Data Security and Encryption, including that 96 percent of databases export sensitive data to other systems, including backups, file servers and application log files.

Forecast Looks At Top IT Security Issues In 2009

As 2008 -- a year in which a record number of data breaches occurred and over 22 million records were compromised -- comes to a close, Utimaco has unveiled the top economic, legislative and technical trends that it feels will drive the IT security market in 2009.

Survey: Downturn In Economy Leading To More Employees Downloading Sensitive Company Data

It would seem desperate times call for desperate measures, as a survey released recently shows that workers will do almost anything to keep their jobs -- but at a cost to the employer.

Survey: 70 Percent Of Small/Medium-Sized Enterprises At Risk Of Network Security Breach

Napera Networks recently issued the results of an online Network Test that asked 200 small and medium-sized enterprises a series of questions to determine if the corporate networks of the companies are secure and protected from potential threats.

All In Shreds

When you think of the NFL, shredding papers and documents is the last thing that comes to mind, unless your former quarterback is moving to a new team. You’re more likely to think of an oversized lineman sacking the quarterback or a fullback rushing for 3 yards in a cloud of dust.

Study: 42 Percent Of Organizations Report Unauthorized Active Directory Access

According to a study conducted by Osterman Research and sponsored by Imanami, 42 percent of organizations report unauthorized access of information through Active Directory.



One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Survey: Half Of U.S. Companies At Risk Of Sensitive Information Leaks By Employee E-Mail

Mimecast has found that 50 percent of U.S. companies are at risk of sensitive information leaks by employee e-mails, based on a survey of 500 IT professionals regarding their e-mail archiving and continuity policies.

Survey: More Than 45 Percent Of Business Internet Users Continue Risky Behavior Online

Palo Alto Networks recently announced the results of a study by the Ponemon Institute examining behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling discovery was that when confronted with a security or privacy breach as a direct result of using an Internet application, 45 percent of employees did nothing and continued using the product.

Georgian Bank Deploys Network Security Appliance To Protect Network, Prevent File Leaks

Mi5 Networks recently announced that Georgian Bank, the second-largest bank headquartered in Atlanta, has selected its Mi5 Webgate appliance to provide gateway protection against Web malware, control Web usage and prevent confidential files from leaking out of the network.

California County Ramps Up IT Security

Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products.

Conference Tackles Identity, Cybersecurity Programs In Next Administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?

UMB Financial Corp. Secures IT Infrastructure With Identity Management Solution

One of the largest independent banks in America, UMB Financial Corp., (UMB) is implementing Novell identity management solutions on SUSE Linux Enterprise Real Time to streamline user access and increase data security

ANSI, ISA Release Action Guide To Help Organizations Prepare For Cyber Attacks

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) recently released a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack.

Marine Corps Taps BearingPoint For Identity And Access Management Solution

BearingPoint Inc. recently announced that the United States Marine Corps Systems Command has awarded the firm a fixed price contract for an Identity and Access Management (IAM) solution.

National Bank Of Kuwait Leverages Solution To Prevent Unauthorized Database Changes By 'Super Users'

Guardium and StarLink, Middle East provider of security and compliance solutions, recently announced that the National Bank of Kuwait (NBK) has successfully implemented Guardium’s enterprise security platform to continuously monitor all database transactions in real-time.

Forecast Looks At Emerging Cyber Threats For 2009

The Georgia Tech Information Security Center (GTISC) recently announced the release of the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.

Employees' Everyday Behavior Puts Sensitive Business Information At Risk

RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.

Featured

  • Study: Nearly Half of Companies Exclude Cybersecurity Teams When Developing, Onboarding and Implementing AI Solutions

    Only 35 percent of cybersecurity professionals or teams are involved in the development of policy governing the use of AI technology in their enterprise, and nearly half (45 percent) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from ISACA, a global professional association advancing trust in technology. Read Now

  • New Report Series Highlights E-Commerce Threats, Fraud Against Retailers

    Trustwave, a cybersecurity and managed security services provider, recently released a series of reports detailing the threats facing the retail sector, marking the second year of its ongoing research into these critical security issues. Read Now

  • Stay Secure in 2024: Updated Cybersecurity Tips for the Office and at Home

    Cyber criminals get more inventive every year. Cybersecurity threats continue to evolve and are a moving target for business owners in 2024. Companies large and small need to employ cybersecurity best practices throughout their organization. That includes security integrators, manufacturers, and end users. Read Now

  • Survey Finds Human Error is Cybersecurity Weakest Link

    Kaseya, provider of AI-powered cybersecurity and IT management software, recently released the results of its 2024 Kaseya Security Survey. IT professionals reported user behavior as their biggest cybersecurity challenge. Another important finding relates to the widespread adoption of artificial intelligence by both threat actors and defenders. The survey found that feelings are mixed as IT professionals learn to navigate this new industry game-changer. The results of the survey are featured in the Cybersecurity Survey Report 2024: Navigating the New Frontier of Cyber Challenges. Read Now

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3