IT Security


Survey: Mobile Devices, Remote Computing Posing New Security Challenges

Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.

Scientists Find Method To Automatically Detect Internet Worms

Scientists may have found a new way to combat the most dangerous form of computer virus. The method automatically detects within minutes when an Internet worm has infected a computer network. Network administrators can then isolate infected machines and hold them in quarantine for repairs.

Two-Factor Authentication Solution Provides Access To Fully Encrypted Disks

Gemalto and McAfee recently introduced a new integrated solution that enables PC and laptop users secure and convenient access to fully encrypted disks through strong, secure, hardware-based, two factor authentication.

Study: Risky Online Behavior More Likely To Happen At Small Companies

Trend Micro recently reported that in the U.S., U.K., Germany and Japan, employees in small companies took more online risks while on the company network compared to their counterparts in larger organizations, according to the results of a study that explores corporate computer users' perceptions of and experiences with security threats.

Breach In Delivery

To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are

The Data Defenders

Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.

Majority Of IT Directors Believe Insiders Pose Bigger Risk To Security According To Survey

Secure Computing Corp. recently announced the results of an IT director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for emerging Web-based attacks.

Survey Finds 45 Percent Of Businesses More Concerned About Data Breaches

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an alarming “air of invincibility” when it comes to their companies’ potential exposure to a data breach



Study: Outbound E-Mail Remains Greatest Source Of Risk For Enterprises

In its fifth-annual study of outbound e-mail and content security issues, Proofpoint Inc. found that large enterprises continue to incur risk from -- and take action against -- information leaks over outbound e-mail, as well as newer communications media such as blogs, message boards, media sharing sites and mobile devices.

Survey: Orphaned Accounts Remain Problem For Organizations

Symark International recently announced the results of a survey of more than 850 security, IT, HR and C-level executives across all industries. Conducted by eMediaUSA, the survey focused on orphaned accounts -- user accounts that remain active after an employee has left a company -- and the processes organizations have in place to locate and terminate them.

Report: Web-Based Malware Increases In April

In its Global Threat Report issued recently, ScanSafe reported a 35 percent increase in Web-based malware in April.

Survey: Majority Of IT Professionals Concerned About Compliance With Specific Mandates

A new survey of IT professionals revealed that new regulatory compliance requirements -- for implementing satisfactory technology solutions to address security vulnerabilities, data leakage and compliance -- remain difficult for enterprise organizations to effectively achieve.

Simple Security Questions

It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.

Study: Competition Set To Drive Network Access Control Market

Network access control technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common misperceptions are dispelled and NAC gains acceptance as a key part of network security, these technologies become the center of a highly competitive and lucrative market.

Rise of the Digital Certificates

Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?

Scram, Spam

Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.

Technology Detects, Blocks Cell Phone Usage In Sensitive Areas

AirPatrol Corp. recently launched a cell phone detection and location solution to help businesses and governments protect against the unique threats posed by the use of cell phones for fraud, crime and interference with business operations.

Study: Worries Regarding Corporate Reputation Making Information Security Top Priority Worldwide

Avoiding reputation damage to the organization was viewed as a top priority for security programs by three-quarters of information security professionals surveyed in a worldwide study launched recently by (ISC)².

Survey: Access Is Top IT Security Concern In Healthcare

According to a survey conducted at the HIMSS 2008 Annual Conference and Exhibition, 64 percent of respondents cited “access” as their number one IT security concern, highlighting the importance of controlling user access to clinical systems and applications in healthcare environments.

Stop An IP Camera Hack

How’s this for a nightmare scenario? Stealthy bad hats sneak up on an IP video camera attached to a remote fence and unplug it from its Ethernet cable. In its place, they jack in a laptop computer and -- voila! -- they’re now inside that surveillance network where they can manipulate other cameras, reprogram door locks, fiddle with access credentials and perhaps wreak havoc all over the target organization’s intranet.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.