IT Security


Survey Looks At Gaps In Web Security

Purewire Inc., a Web security SaaS vendor, recently announced end-user survey results illustrating severe vulnerabilities to corporate networks due to malware-infected Web applications, remote workers and shrinking IT budgets.

Report: Critical Infrastructure Prime Targets For Cyber Criminals In 2009

The year 2008 was a time security threats and malicious activity reached a tipping point, and 2009 stands to be the year critical infrastructure systems become prime targets for cyber criminals and the global financial crisis will be exploited for a variety of malicious activities, according to a new report recently released from VeriSign’s iDefense Security Intelligence Services.

Survey: 96 Percent Of Databases Export Sensitive Data To Other Systems

Independent research organization Unisphere Research and Vormetric, Inc., recently announced results of the Special Research Report: Data Security and Encryption, including that 96 percent of databases export sensitive data to other systems, including backups, file servers and application log files.

Forecast Looks At Top IT Security Issues In 2009

As 2008 -- a year in which a record number of data breaches occurred and over 22 million records were compromised -- comes to a close, Utimaco has unveiled the top economic, legislative and technical trends that it feels will drive the IT security market in 2009.

Survey: Downturn In Economy Leading To More Employees Downloading Sensitive Company Data

It would seem desperate times call for desperate measures, as a survey released recently shows that workers will do almost anything to keep their jobs -- but at a cost to the employer.

Survey: 70 Percent Of Small/Medium-Sized Enterprises At Risk Of Network Security Breach

Napera Networks recently issued the results of an online Network Test that asked 200 small and medium-sized enterprises a series of questions to determine if the corporate networks of the companies are secure and protected from potential threats.

All In Shreds

When you think of the NFL, shredding papers and documents is the last thing that comes to mind, unless your former quarterback is moving to a new team. You’re more likely to think of an oversized lineman sacking the quarterback or a fullback rushing for 3 yards in a cloud of dust.

Study: 42 Percent Of Organizations Report Unauthorized Active Directory Access

According to a study conducted by Osterman Research and sponsored by Imanami, 42 percent of organizations report unauthorized access of information through Active Directory.



One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Survey: Half Of U.S. Companies At Risk Of Sensitive Information Leaks By Employee E-Mail

Mimecast has found that 50 percent of U.S. companies are at risk of sensitive information leaks by employee e-mails, based on a survey of 500 IT professionals regarding their e-mail archiving and continuity policies.

Survey: More Than 45 Percent Of Business Internet Users Continue Risky Behavior Online

Palo Alto Networks recently announced the results of a study by the Ponemon Institute examining behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling discovery was that when confronted with a security or privacy breach as a direct result of using an Internet application, 45 percent of employees did nothing and continued using the product.

Georgian Bank Deploys Network Security Appliance To Protect Network, Prevent File Leaks

Mi5 Networks recently announced that Georgian Bank, the second-largest bank headquartered in Atlanta, has selected its Mi5 Webgate appliance to provide gateway protection against Web malware, control Web usage and prevent confidential files from leaking out of the network.

California County Ramps Up IT Security

Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products.

Conference Tackles Identity, Cybersecurity Programs In Next Administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?

UMB Financial Corp. Secures IT Infrastructure With Identity Management Solution

One of the largest independent banks in America, UMB Financial Corp., (UMB) is implementing Novell identity management solutions on SUSE Linux Enterprise Real Time to streamline user access and increase data security

ANSI, ISA Release Action Guide To Help Organizations Prepare For Cyber Attacks

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) recently released a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack.

Marine Corps Taps BearingPoint For Identity And Access Management Solution

BearingPoint Inc. recently announced that the United States Marine Corps Systems Command has awarded the firm a fixed price contract for an Identity and Access Management (IAM) solution.

National Bank Of Kuwait Leverages Solution To Prevent Unauthorized Database Changes By 'Super Users'

Guardium and StarLink, Middle East provider of security and compliance solutions, recently announced that the National Bank of Kuwait (NBK) has successfully implemented Guardium’s enterprise security platform to continuously monitor all database transactions in real-time.

Forecast Looks At Emerging Cyber Threats For 2009

The Georgia Tech Information Security Center (GTISC) recently announced the release of the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.

Employees' Everyday Behavior Puts Sensitive Business Information At Risk

RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3