Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.
- By Doug Powell
- Aug 16, 2012
InformationWeek Reports, a service provider for peer-based IT research and analysis, announced the release of its latest research report.
Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.
- By Mike Green
- Aug 01, 2012
A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.
Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.
- By Jeff Whitney
- Jul 01, 2012
Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.
The U.S. General Services Administration (GSA) has announced an important benchmark that will pave the way for agencies across the federal government to accelerate adoption of cloud computing.
Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.
Almost 40 percent of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products, according to a new report from IMS Research.
Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.
AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.
Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.
This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.
Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to the Data Loss Straw Poll, a national survey published today by CDW LLC.
SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.
New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months
With mobile technology becoming an important trend in the security industry, HID Global showcased its NFC access control technology in action during a lunch Thursday at ISC West.
- By Brent Dirks
- Mar 30, 2012
All attendees and exhibitors were introduced to “The Future of Security” early Wednesday morning; yet, many exhibitors came to Las Vegas armed with the mobile technology know-how to take on the new wave of mobile communication.
- By Christina Miralla
- Mar 29, 2012
The future of security is always on the minds of industry leaders and developers. As a welcome to all attendees at this year’s ISC West Conference in Las Vegas, an early morning session devoted to the future of the security industry addressed how IT and security convergence in the cloud will create better end-user operability.
- By Christina Miralla
- Mar 29, 2012
In today's "post-PC" world, businesses of all sizes, as well as policy makers at all levels, need to be ready to address and manage increasing security and privacy challenges, found a panel of experts at CompTIA's mobile security briefing. Several dozen Hill staff, policy makers, security and privacy experts and technology advocates participated in the discussion.