IT Security


South Dakota Library Network Uses Security Gateway Appliance To Protect Confidential Data

Proofpoint Inc., a provider of unified e-mail security and data loss prevention solutions, recently announced that South Dakota Library Network has deployed the Proofpoint Messaging Security Gateway appliance to prevent leaks of confidential information in outbound e-mail messages and to protect its e-mail users from incoming spam and viruses.

Survey: Mobile Devices, Remote Computing Posing New Security Challenges

Spyware, viruses and worms continue to plague most organizations, but security challenges tied to the use of handheld devices and mobile and remote computing are growing at a rapid pace, new research commissioned by the Computing Technology Industry Association (CompTIA) reveals.

Scientists Find Method To Automatically Detect Internet Worms

Scientists may have found a new way to combat the most dangerous form of computer virus. The method automatically detects within minutes when an Internet worm has infected a computer network. Network administrators can then isolate infected machines and hold them in quarantine for repairs.

Two-Factor Authentication Solution Provides Access To Fully Encrypted Disks

Gemalto and McAfee recently introduced a new integrated solution that enables PC and laptop users secure and convenient access to fully encrypted disks through strong, secure, hardware-based, two factor authentication.

Study: Risky Online Behavior More Likely To Happen At Small Companies

Trend Micro recently reported that in the U.S., U.K., Germany and Japan, employees in small companies took more online risks while on the company network compared to their counterparts in larger organizations, according to the results of a study that explores corporate computer users' perceptions of and experiences with security threats.

Breach In Delivery

To avoid becoming the next media headline, healthcare organizations now must demonstrate that they know where their mobile computers are

The Data Defenders

Twenty-five million records containing personal information lost by the U.K. tax authority. Personal and confidential health records found on a USB stick by a university student. NATO secrets on a USB stick found in a Stockholm library. Sensitive personal information lost on a flash drive by the Iowa Department of Natural Resources. Fertility treatment information on 3,100 patients lost.

Majority Of IT Directors Believe Insiders Pose Bigger Risk To Security According To Survey

Secure Computing Corp. recently announced the results of an IT director survey that uncovers a rising concern of insider threats and widespread acknowledgement of being unprepared for emerging Web-based attacks.



Survey Finds 45 Percent Of Businesses More Concerned About Data Breaches

A recent national survey of more than 1,500 business leaders conducted by Zogby International on behalf of Identity Theft 911 found that business decision makers possess an alarming “air of invincibility” when it comes to their companies’ potential exposure to a data breach

Study: Outbound E-Mail Remains Greatest Source Of Risk For Enterprises

In its fifth-annual study of outbound e-mail and content security issues, Proofpoint Inc. found that large enterprises continue to incur risk from -- and take action against -- information leaks over outbound e-mail, as well as newer communications media such as blogs, message boards, media sharing sites and mobile devices.

Survey: Orphaned Accounts Remain Problem For Organizations

Symark International recently announced the results of a survey of more than 850 security, IT, HR and C-level executives across all industries. Conducted by eMediaUSA, the survey focused on orphaned accounts -- user accounts that remain active after an employee has left a company -- and the processes organizations have in place to locate and terminate them.

Report: Web-Based Malware Increases In April

In its Global Threat Report issued recently, ScanSafe reported a 35 percent increase in Web-based malware in April.

Survey: Majority Of IT Professionals Concerned About Compliance With Specific Mandates

A new survey of IT professionals revealed that new regulatory compliance requirements -- for implementing satisfactory technology solutions to address security vulnerabilities, data leakage and compliance -- remain difficult for enterprise organizations to effectively achieve.

Simple Security Questions

It is a conundrum that enterprises and organizations that need to protect their customers’ secure information often must access that secure information to authenticate the identity of a customer. In other words, to prevent a breach, they must risk a breach.

Study: Competition Set To Drive Network Access Control Market

Network access control technologies, a combination of network infrastructure components and security products, are set to become an extension of the network. As common misperceptions are dispelled and NAC gains acceptance as a key part of network security, these technologies become the center of a highly competitive and lucrative market.

Rise of the Digital Certificates

Securely exchanging and storing documents and emails has become a necessity across multiple industries. An increasing number of businesses need to exchange data internally as well as with business partners and customers. The question is: How do you do exchange information easily, efficiently, and securely?

Scram, Spam

Imagine if 100 people knocked on your front door each day, but fewer than 10 of them were trustworthy. The rest were crooks, con artists and aspiring criminals. That’s the situation facing today’s Internet users. Some skeptics believe there is no stopping bot networks, phishing schemes and digital scams.

Technology Detects, Blocks Cell Phone Usage In Sensitive Areas

AirPatrol Corp. recently launched a cell phone detection and location solution to help businesses and governments protect against the unique threats posed by the use of cell phones for fraud, crime and interference with business operations.

Study: Worries Regarding Corporate Reputation Making Information Security Top Priority Worldwide

Avoiding reputation damage to the organization was viewed as a top priority for security programs by three-quarters of information security professionals surveyed in a worldwide study launched recently by (ISC)².

Survey: Access Is Top IT Security Concern In Healthcare

According to a survey conducted at the HIMSS 2008 Annual Conference and Exhibition, 64 percent of respondents cited “access” as their number one IT security concern, highlighting the importance of controlling user access to clinical systems and applications in healthcare environments.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3