How’s this for a nightmare scenario? Stealthy bad hats sneak up on an IP video camera attached to a remote fence and unplug it from its Ethernet cable. In its place, they jack in a laptop computer and -- voila! -- they’re now inside that surveillance network where they can manipulate other cameras, reprogram door locks, fiddle with access credentials and perhaps wreak havoc all over the target organization’s intranet.
- By John W. Verity
- Apr 23, 2008
SanDisk Corp. recently announced the results of a new study demonstrating the risks of unsecured USB flash drive usage within enterprise organizations.
Recently at the RSA conference, the National Cyber Security Alliance (NCSA) announced study findings that 71 percent of consumers lack the knowledge on cyber criminals' weapon of choice and the Internet's fastest growing threat -- botnets.
As Americans do their taxes, a majority are unaware that they may be putting personal and financial information required on tax returns in jeopardy.
Despite most network security vendors establishing operations in Latin America in early 2000, the region started investing significantly in security solutions only since 2002. New research shows that the market earned revenues of $186.1 million in 2007 and estimates this to reach $598.4 million in 2013.
Secure Computing Corp., a enterprise gateway security company, recently announced that University of Minnesota has selected the company's Secure SafeWord (formerly known as SafeWord) as a two-factor authentication solution for 8,000 staff and faculty members.
Despite the blustery cold and windy weather in San Francisco on Wednesday, information security of all kinds is the hot topic at RSA 2008 -- the largest event in the world dedicated to the field.
- By Brent Dirks
- Apr 10, 2008
In spite of the growing convergence of network security and physical security, it’s clear that many organizations have no plans to combine their IT and corporate security functions under a single CSO. That doesn’t mean those of us in non-converged businesses shouldn’t -- or aren’t expected to -- provide unified oversight of risks.
- By Bob Pappagianopoulos
- Apr 07, 2008
Securing an entire network at a finite number of ingress points simply does not offer the risk mitigation companies need.
- By Kevin Prince
- Apr 02, 2008
Many organizations now require that CCTV video images are recorded and archived continuously from all cameras for 90 days or more. In large systems, this can create a significant storage requirement. The issue is compounded by users wanting to store video at the highest quality and maximum frame rate, particularly in homeland security and law enforcement applications where CCTV footage is required for evidential purposes.
- By Barry Keepence
- Apr 02, 2008
With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.
- By Koen Geirnaert
- Apr 01, 2008
PGP Corp. recently announced the results from a second annual study by The Ponemon Institute identifying key areas of focus in enterprise encryption use, planning strategies, budgeting and spending, deployment methodologies and impact on data breach incidents.
WhiteHat Security, a provider of Web site security services, recently released the fourth installment of the WhiteHat Web site Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a vertical industry breakdown based on attacks.
IT departments are under pressure to make corporate networks more accessible to remote workers and a range of external users despite fears over the increased threat of data leaks, malicious content and hacking that this entails, according to new research.
ActivIdentity Corp. recently announced that Deloitte Ireland is facilitating secure remote and office-based access through the use of a strong certificate-based, two-factor authentication solution.
Construction sites are fiercely regulated environments in the United Kingdom, under a program called the Construction Skills Certification Scheme. At these sites, CSCS accreditation is tied to employee biometric details. At many construction sites, only workers with a CSCS card can be employed. The Olympic venues in London fall into this group.
- By Jon Mooney
- Mar 18, 2008
Video management systems have evolved considerably since the analog tape-based VCRs that were prevalent nearly 10 years ago. Then, analog CCTV cameras with coaxial cable typically were connected to a multiplexer so multiple video images could be displayed on a video monitor simultaneously. These signals then were recorded for review and archiving.
- By Matt Barnette, Adam Shane
- Mar 18, 2008
Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
Siber Systems Inc. recently announced the results of a poll on password use involving more than 600 U.S. IT professionals. The survey, administered through business data company eMedia, found that U.S. workers, managers and IT staffs alike are increasingly confronted with difficulties arising from computer passwords.
Quest Software Inc. recently announced the results of its Identity Management Government Survey of federal, state, local and municipal government IT professionals.