InformationWeek Analytics, a service for peer-based IT research and analysis, recently announced the release of its latest research report; Cloud Storage: Changing Dynamics Beyond Services encompasses analysis of our first-ever public cloud storage survey results and guides readers in making smart cloud storage decisions.
Multi-technology smart cards are meeting government ID needs.
The Picture Perfect and FC Wnx product lines are now supported.
3VR, Inc., the video intelligence company, announced that three credit unions across the state of Washington installed 3VR's video intelligence platform to reduce fraud and solve crimes. 3VR integrator Cook Security Group led the deployments at O Bee Credit Union, Our Community Credit Union and the Washington State Employees Credit Union (WSECU).
According to a new study from ABI Research, the worldwide market for hosted virtual desktops is forecast to grow from about $500 million in 2009 to a cumulative total of nearly $5 billion in 2016. North America and Europe will comprise the majority of the market for virtual desktops throughout the forecast period.
Lookout’s application helps protect devices from malware and recover information if lost or stolen.
The Anti-Phishing Working Group (APWG) is reporting this week that more than one-third of respondents to a new Web Vulnerabilities Survey were repeat victims of phishing attacks that resulted in a successful establishment of phishing or spoofing websites on their web server platforms.
Most enterprises face apprehension over adopting cloud computing, and with good reason: Nearly half (43 percent) of enterprise IT decision makers reported a security lapse or issue with their cloud provider within the last 12 months, according to a recent global cloud security survey conducted by Trend Micro.
McAfee recently announced the results of a commissioned study conducted by Network World on behalf of McAfee and Brocade. The study, which surveyed 100 IT professionals and security decision makers in North American companies with 500 or more employees, found that IT departments are now turning to virtualization, with half of the respondents having either implemented or are planning to deploy private clouds.
Twenty-eight percent of U.S. organizations are using cloud computing today, a CDW poll found, with most reporting (73 percent) that their first step into the cloud was implementation of a single cloud application.
McAfee recently released “Mobility and Security: Dazzling Opportunities, Profound Challenges," a global report focused on the consumerization of IT and its impact on security. The report looks at mobility from two perspectives -- that of the company’s senior IT professional and that of the general end users of mobile devices in the workplace.
EnerNex, prime contractor for the U.S. Department of Energy (DOE) funded Lemnos project, announces cybersecurity interoperability testing, June 1-2 at the Electric Power Research Institute Smart Grid Substation Lab in Knoxville, Tenn.
New products include the EventTracker Security Center, Operation Center and PULSE.
A group of researchers at the American University in Beirut have come up with an unusual biometric that could be used as for that second factor: your typing pattern.
- By Laura Williams
- May 24, 2011
Internet Security Awareness Training (ISAT) firm KnowBe4 has released new cybercrime statistics that identify the nation's most Phish-prone industry sectors, which are those most susceptible to cybercrime ploys. The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services.
Western Digital released a 3 terabyte AV hard drive May 16 aimed at storing video from surveillance systems. We sat down with WD’s marketing director, Ed Strong, to learn more about the new product.
In a global mobile threat study released recently, Juniper Networks found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks.
The General Services Administration released an RFQ for cloud computing services. Do you have what they are looking for?
- By Alice Lipowicz
- May 11, 2011
The acquisition will enable the company to meet demands for complete, layered security protection.
The report, produced from research led by eEye cofounder and CTO Marc Maiffret, reveals that simple configuration changes and software version upgrades could mitigate many application vulnerabilities before patches are available.