IT Security


Upcoming Report Will Help Protect Businesses Against Identity Theft, Fraud

With the holiday shopping season in full swing, banks, card issuers and retailers, among others, are mindful of the dangers of identity theft and the importance of protecting their customers’ personal financial data. A report coming in January will help businesses and other organizations arm themselves from the theft and fraudulent use of such information.

Survey: 40 Percent Of Executives Believe Company Networks Not Secure

Despite having anti-virus and anti-spam software as well as a firewall installed, four in 10 executives from small and medium sized companies in the United States still do not believe their networks are secure, a new survey shows.

Survey: Organizations Using Actual Customer Data To Develop, Test Applications

A survey recently released by Compuware Corp. and the Ponemon Institute showed an overwhelming majority of organizations surveyed risk compromising critical information by using actual customer data for the development and testing of applications.

Research: Content-Based Threats Top List Of Security Concerns In 2008

Websense Inc. has issued its annual security predictions for 2008 with content-based threats topping the list.

Survey Finds Well-Meaning Insiders Pose Security Threats

RSA, The Security Division of EMC, recently announced the findings of its recent insider threat survey.

Survey: 24 Percent Of Small Business Owners Unconcerned About Online Data Security

AT&T has announced that although the majority of small businesses secure its computer systems, one-fourth (24 percent) are unconcerned about computer and online data security.

Survey: Companies Not Following Data Security Policies

Companies are not following simple data security procedures in seven high-risk scenarios, according to new research announced recently by the Ponemon Institute, a privacy and information management research firm.



Study: Rise In International Cyber Spying Will Pose Biggest Security Threat In 2008

McAfee Inc. recently announced findings from its annual cyber security study in which experts warned that the rise in international cyber spying will pose the single biggest security threat in 2008.

FBI Nets Eight In Second Round Of Cyber Investigation

The FBI recently announced the results of the second phase of its continuing investigation into a growing and serious problem involving criminal use of botnets.

Study: Internet Security Risks Of 2007 Point To Two Major Transformations In Attacker Targets

The cyber arms race continues. Cyber criminals and cyber spies have shifted their focus again, successfully evading the countermeasures that most companies and government agencies have worked for years to put into place.

Ziff Davis Enterprise Announces Secure Mobility Virtual Tradeshow

The one-day, live and interactive online event, slated for Nov. 28, focuses on integrating mobile security technology, policy and practices to defend against threats in the enterprise.

Small Businesses to Spend $2.8b on IT Security In Asia-Pacific In 2008

The four key markets in the region - Australia, South Korea, India, and China - will account for more than 75% of Asia's total '08 security spending.

Survey: 62 Percent Of Companies Believe Missing Computers Go Unnoticed

Absolute Software Corp. recently polled its customers about their attitudes toward computer and data security.

Survey Finds Wireless Data Security Vulnerabilities In Retail Stores

AirDefense recently unveiled results from its comprehensive “2007 Retail Shopping Wireless Security Survey” of wireless data security and physical security practices in place at more than 3,000 stores nationwide and also in parts of Europe.

Research: Web, Windows Vista Threats To Rise While Adware Declines In 2008

McAfee Inc. recently released its Top 10 predictions for security threats in 2008. Researchers at McAfee Avert Labs expect an increase in Web dangers and threats targeting Microsoft Corp.'s Windows Vista operating system, among other new or increased threats

New Scoring System Protects Credit Card Transactions

As this year’s holiday season approaches, credit card transactions may be a little more secure thanks to standards adopted by the payment card industry.

Survey: 65 Percent Of Businesses To Enforce Web Surfing Restrictions In 2008

Barracuda Networks recently announced that an analysis of data contributed by thousands of its Barracuda Web Filter customers found that 50 percent of businesses using Barracuda Web Filters are blocking MySpace or Facebook, two social networking Web sites.

Study: Smaller Data Breaches Have Higher Misuse Rate

ID Analytics Inc. recently announced the results of a new study on the harm resulting from data breaches. The study analyzed more than 10 million identities spanning more than a dozen data breaches.

High-Tech Hackers

Driven by the age-old lure of easy money, many of today’s criminals are using high-tech cyber crimes and sophisticated building entry methods to commit crimes.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3