IT Security


Survey Looks At Gaps In Web Security

Purewire Inc., a Web security SaaS vendor, recently announced end-user survey results illustrating severe vulnerabilities to corporate networks due to malware-infected Web applications, remote workers and shrinking IT budgets.

Report: Critical Infrastructure Prime Targets For Cyber Criminals In 2009

The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign’s iDefense Security Intelligence Services.

Survey: 96 Percent Of Databases Export Sensitive Data To Other Systems

Independent research organization Unisphere Research and Vormetric, Inc., recently announced results of the Special Research Report: Data Security and Encryption, including that 96 percent of databases export sensitive data to other systems, including backups, file servers and application log files.

Forecast Looks At Top IT Security Issues In 2009

As 2008 -- a year in which a record number of data breaches occurred and over 22 million records were compromised -- comes to a close, Utimaco has unveiled the top economic, legislative and technical trends that it feels will drive the IT security market in 2009.

Survey: Downturn In Economy Leading To More Employees Downloading Sensitive Company Data

It would seem desperate times call for desperate measures, as a survey released recently shows that workers will do almost anything to keep their jobs -- but at a cost to the employer.

Survey: 70 Percent Of Small/Medium-Sized Enterprises At Risk Of Network Security Breach

Napera Networks recently issued the results of an online Network Test that asked 200 small and medium-sized enterprises a series of questions to determine if the corporate networks of the companies are secure and protected from potential threats.

All In Shreds

When you think of the NFL, shredding papers and documents is the last thing that comes to mind, unless your former quarterback is moving to a new team. You’re more likely to think of an oversized lineman sacking the quarterback or a fullback rushing for 3 yards in a cloud of dust.

Study: 42 Percent Of Organizations Report Unauthorized Active Directory Access

According to a study conducted by Osterman Research and sponsored by Imanami, 42 percent of organizations report unauthorized access of information through Active Directory.



One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Survey: Half Of U.S. Companies At Risk Of Sensitive Information Leaks By Employee E-Mail

Mimecast has found that 50 percent of U.S. companies are at risk of sensitive information leaks by employee e-mails, based on a survey of 500 IT professionals regarding their e-mail archiving and continuity policies.

Survey: More Than 45 Percent Of Business Internet Users Continue Risky Behavior Online

Palo Alto Networks recently announced the results of a study by the Ponemon Institute examining behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling discovery was that when confronted with a security or privacy breach as a direct result of using an Internet application, 45 percent of employees did nothing and continued using the product.

Georgian Bank Deploys Network Security Appliance To Protect Network, Prevent File Leaks

Mi5 Networks recently announced that Georgian Bank, the second-largest bank headquartered in Atlanta, has selected its Mi5 Webgate appliance to provide gateway protection against Web malware, control Web usage and prevent confidential files from leaking out of the network.

California County Ramps Up IT Security

Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products.

Conference Tackles Identity, Cybersecurity Programs In Next Administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?

UMB Financial Corp. Secures IT Infrastructure With Identity Management Solution

One of the largest independent banks in America, UMB Financial Corp., (UMB) is implementing Novell identity management solutions on SUSE Linux Enterprise Real Time to streamline user access and increase data security

ANSI, ISA Release Action Guide To Help Organizations Prepare For Cyber Attacks

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) recently released a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack.

Marine Corps Taps BearingPoint For Identity And Access Management Solution

BearingPoint Inc. recently announced that the United States Marine Corps Systems Command has awarded the firm a fixed price contract for an Identity and Access Management (IAM) solution.

National Bank Of Kuwait Leverages Solution To Prevent Unauthorized Database Changes By 'Super Users'

Guardium and StarLink, Middle East provider of security and compliance solutions, recently announced that the National Bank of Kuwait (NBK) has successfully implemented Guardium’s enterprise security platform to continuously monitor all database transactions in real-time.

Forecast Looks At Emerging Cyber Threats For 2009

The Georgia Tech Information Security Center (GTISC) recently announced the release of the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.

Employees' Everyday Behavior Puts Sensitive Business Information At Risk

RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.

Featured

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

Webinars

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3