Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.
- By Ken Hertzler
- Mar 03, 2008
Vital to everyday business operations, the Web browser must be protected from malware lurking on a fast-growing number of infected Web sites, according to Enterprise Management Associates.
There is a wide gap between the IT security skills that organizations want and the corresponding skills that workers bring to the job, according to a new survey commissioned by the Computing Technology Industry Association (CompTIA).
A team of academic, industry and independent researchers has demonstrated a new class of computer attacks that compromise the contents of "secure" memory systems, particularly in laptops.
According to research from Trend Micro's TrendLabs, hackers are intensifying their attacks on legitimate Web sites. The number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals.
SecureWorks has seen an 85 percent increase in the number of attempted attacks directed toward its healthcare clients by Internet hackers. Attempted attacks have increased from an average of 11,146 per healthcare client per day in the first half of 2007 to an average of 20,630 per healthcare client per day in the last half of 2007 through January.
Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.
- By Monte Robertson
- Feb 14, 2008
More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO.
The SANS Institute recently worked with 12 cyber security experts and released a list of the attacks most likely to cause substantial damage during 2008.
When many industry observers talk about how IT is changing security, the discussion typically reverts to the concept of hanging 30-year-old panel technology onto 10-year-old Ethernet backbones.
- By Martin Huddart
- Feb 01, 2008
The security industry is clearly ready for IP video surveillance. Network cameras have been around for more than a decade, and they can now be found everywhere. Furthermore, the latest megapixel cameras offer image quality that is not available with standard analog cameras. Network bandwidth is already faster today than it was just a few years ago. Processing speeds on PCs continue to get faster while hard drives and other storage options continue to get bigger— all with the cost of computers, generally, decreasing.
- By Dave Underwood
- Feb 01, 2008
Websense recently released a new report that reveals that -- for the first time -- the number of legitimate Web sites compromised by attackers has surpassed those purposefully created by attackers.
Liberty Alliance, the global identity consortium working to build a more trusted Internet for consumers, governments and businesses worldwide, recently released highlights of SAML 2.0-based digital identity management applications that are delivering real world value to users and organizations around the globe.
In response to a growing need to combat illegal hacking, Halock Security Labs announces the opening of the Institute 4 Ethical Hacking (I4EH).
The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.
McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.
The latest Internet Security Outlook Report issued recently by CA Inc. forewarns that online gamers, social networks and high-profile events like the U.S. presidential election and the Beijing Olympics are among the top potential targets for online attacks in 2008.
IBM recently announced that the Bank of London and The Middle East plc have selected intrusion prevention technology from IBM’s Internet Security Systems (ISS) division to help reinforce its existing security controls and further protect its customer and corporate data.
Yong Guan had scribbled 12 arrows across his office whiteboard, each black line going from one little box he had drawn to another little box. He had written five long formulas up there, too. And that was bad news for cyber criminals.
Deemed the rum capital of the world and the birthplace of salsa music, Puerto Rico has reason to celebrate.
- By Karina Sanchez
- Jan 03, 2008