IT Security


Generation Next

Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.

Study: Web Browsers Becoming Favorite Vulnerability For Hackers

Vital to everyday business operations, the Web browser must be protected from malware lurking on a fast-growing number of infected Web sites, according to Enterprise Management Associates.

IT Security Skills In High Demand, Short Supply, Survey Reveals

There is a wide gap between the IT security skills that organizations want and the corresponding skills that workers bring to the job, according to a new survey commissioned by the Computing Technology Industry Association (CompTIA).

New Computer Attacks Compromise ‘Secure’ Contents Of Memory Systems

A team of academic, industry and independent researchers has demonstrated a new class of computer attacks that compromise the contents of "secure" memory systems, particularly in laptops.

Report: Underground Cyber Economy Growth To Increase

According to research from Trend Micro's TrendLabs, hackers are intensifying their attacks on legitimate Web sites. The number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals.

Report: Hacker Attacks Against Healthcare Organizations Up 85 Percent

SecureWorks has seen an 85 percent increase in the number of attempted attacks directed toward its healthcare clients by Internet hackers. Attempted attacks have increased from an average of 11,146 per healthcare client per day in the first half of 2007 to an average of 20,630 per healthcare client per day in the last half of 2007 through January.

Making IT Your Business

Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.

Security Software Industry Takes Steps To Form Anti-Malware Testing Standards Organization

More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO.



Computer Security Group Releases Top 10 Cyber Menaces For 2008

The SANS Institute recently worked with 12 cyber security experts and released a list of the attacks most likely to cause substantial damage during 2008.

To IT and Beyond

When many industry observers talk about how IT is changing security, the discussion typically reverts to the concept of hanging 30-year-old panel technology onto 10-year-old Ethernet backbones.

Leaving a Legacy

The security industry is clearly ready for IP video surveillance. Network cameras have been around for more than a decade, and they can now be found everywhere. Furthermore, the latest megapixel cameras offer image quality that is not available with standard analog cameras. Network bandwidth is already faster today than it was just a few years ago. Processing speeds on PCs continue to get faster while hard drives and other storage options continue to get bigger— all with the cost of computers, generally, decreasing.

Report: Number Of Legitimate Web Sites Compromised By Hackers Skyrockets

Websense recently released a new report that reveals that -- for the first time -- the number of legitimate Web sites compromised by attackers has surpassed those purposefully created by attackers.

Organizations Using SAML 2.0 For Digital Identity Management

Liberty Alliance, the global identity consortium working to build a more trusted Internet for consumers, governments and businesses worldwide, recently released highlights of SAML 2.0-based digital identity management applications that are delivering real world value to users and organizations around the globe.

Ethical Hacker Training Focus Of Institute

In response to a growing need to combat illegal hacking, Halock Security Labs announces the opening of the Institute 4 Ethical Hacking (I4EH).

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

Report: Botnet-Infected Computers To Increase Sharply In 2008

The latest Internet Security Outlook Report issued recently by CA Inc. forewarns that online gamers, social networks and high-profile events like the U.S. presidential election and the Beijing Olympics are among the top potential targets for online attacks in 2008.

United Kingdom Banks Choose IBM Intrusion Protection Technology

IBM recently announced that the Bank of London and The Middle East plc have selected intrusion prevention technology from IBM’s Internet Security Systems (ISS) division to help reinforce its existing security controls and further protect its customer and corporate data.

Engineer Developing Cyber Technology To Find Online Criminals

Yong Guan had scribbled 12 arrows across his office whiteboard, each black line going from one little box he had drawn to another little box. He had written five long formulas up there, too. And that was bad news for cyber criminals.

Where Security Fits In

Deemed the rum capital of the world and the birthplace of salsa music, Puerto Rico has reason to celebrate.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3