BIO-key International Inc. and its partner Sig-Tec recently announced the successful deployment of a fingerprint biometrics-based identity and access management system at the Mahoning County (Ohio) Sheriff's Office.
The operator of the world's eighth largest airport and Germany's largest employer, Fraport AG, has implemented Novell identity and security management solutions to achieve a single point of control for thousands of identities and secure IT resources at Frankfurt Airport.
Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.
- By Bill Bockwoldt
- Oct 02, 2008
Finjan Inc., a provider of secure Web gateway solutions for the enterprise market, recentlyannounced the findings of its Web security survey of 1387 IT/security professionals.
Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research Inc. on the first day of its Security Forum.
Quest Software Inc. recently announced the results from an Aberdeen Group benchmark study, "Strong User Authentication," which shows that 52 percent of organizations require only passwords for employees to access critical data, rather than augmenting passwords with stronger forms of authentication such as hardware tokens, digital certificates or risk-based scoring.
Mirage Networks recently announced results from a new study that revealed nearly half of the IT professionals who responded had endpoints connecting to their corporate networks without their knowledge.
To comply with HIPAA regulations, the Georgia-based Gwinnett Medical Center already was leveraging two-factor authentication via hardware tokens in order to protect patient files, sensitive medical data and clinical information.
Secure Computing Corp. recently published the company’s Q2 Internet Threat Report containing data and analysis from the Secure Computing research team.
Fidelis Security Systems, a producer of data leakage prevention (DLP) solutions recently announced that Frost & Sullivan, the Growth Partnership Company, has named the Fidelis Extrusion Prevention System, Fidelis XPS, winner of the 2008 Growth Excellence of the Year Award in Infrastructure Protection.
Antivirus software on your personal computer could become a thing of the past thanks to a new "cloud computing" approach to malicious software detection developed at the University of Michigan.
RSA Conference recently released the results of its recent survey of security professionals regarding the critical industry and infrastructure issues they currently face.
ID Analytics Inc. recently released the results of its internal data theft study which provides an analysis of the criminal behavior patterns associated with the misuse of identities stolen from the workplace by employees. The study's findings also provide a better understanding of the harm resulting from an internal versus external data breach.
Almost every day, a report of lost, stolen or missing notebook PCs and hard drives or of related data breaches shocks the global community, including those people whose data has been compromised. Protection of data on individual systems and drives, as well as in data centers, has become a necessity for corporations, universities, government agencies and other organizations.
- By Michael Willett
- Aug 01, 2008
The biggest trends in the security industry today reflect those of business in general.
- By Gadi Piran
- Aug 01, 2008
IdentiPHI Inc. recently announced one of the nation’s leading pharmacy benefit managers has selected IdentiPHI SAFsolution 5 Enterprise Edition to boost biometric authentication and security access across its network.
Mi5 Networks recently announced that the North Carolina State Ports Authority has deployed the Mi5 Webgate platform to defend its network and prevent access to unauthorized Web sites.
To help managers safeguard valuable information most efficiently, computer scientists at the National Institute of Standards and Technology (NIST) are applying security metrics to computer network pathways to assign a probable risk of attack to guide IT managers in securing their networks.
More than 75 percent of the bank Web sites surveyed in a University of Michigan study had at least one design flaw that could make customers vulnerable to cyber thieves after their money or even their identity.
Fortify Software Inc. recently released its Open Source Security Study which reveals that the most widely-used open source software packages for the enterprise are exposing users to significant and unnecessary business risk.