IT Security


Research Indicates IT Security Needs Of Mid-Sized Organizations Becoming More Sophisticated

RSA, The Security Division of EMC, recently released the results of two new research initiatives that explore log management priorities for mid-sized organizations.

Poll: Data Loss Is Top Corporate Security Threat

CDW LLC recently announced the results of its IT Threat Prevention Straw Poll, based on a survey of 200 IT security managers and decision makers at medium and large businesses across the United States.

Less Than Half Of Cloud Services Vetted For Security, According To Study

CA Inc. and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently announced a study analyzing significant cloud security concerns that persist among IT professionals when it comes to cloud services used within their organization.

Survey: Employees More Focused On Individual Concerns Than Overall Company IT Security

From prowling social networking sites at work, to overriding their company's installed security so they can access restricted websites, most employees were found to be generally imprudent and ambivalent when it comes to their company's overall security health, according to the 2010 Trend Micro survey on corporate and small business end users.

Survey Looks At Security Management Practices, Compliance Weaknesses

SenSage recently announced the results of an industry survey on security management practices taken during the RSA Conference in March.

Survey: Majority Of Americans Unaware Of Cloud Computing

A majority of U.S. citizens are unaware of how their online data is stored and who secures it, according to a Business Software Alliance (BSA) survey released recently. Approximately one in five U.S. citizens said they were unaware of whether their personal or corporate data is being held “in the cloud,” and 60 percent said they did not know what “in the cloud” means.

Market Trends

Trends in the Market

The use of video surveillance in business began with the introduction of CCTV in the early 1960s. Throughout the years, we have witnessed the rapid uptake of some technologies, while others showed promise but never experienced widespread adoption. Today, there are four trends that are shaping the video industry.

Consumers Confident In Security Of Mobile Devices, According To Research

According to recent research conducted by Unisys Corp., the majority of mobile device users worldwide feel safe using their mobile devices for applications, including airline boarding passes; as payments in stores for low-cost items; or to access online banking.



Survey: Data Security In The Cloud Top Concern For Government Officials

Lockheed Martin and its Cyber Security Alliance partners recently announced the results of a collaborative cloud computing and cyber security survey in a new white paper titled "Awareness, Trust, and Security to Shape Cloud Adoption."

Survey: Almost Half Of IT Professionals Say Cloud Computing Risks Outweigh Benefits

Nearly half of U.S. IT professionals say that the risks of cloud computing outweigh the benefits, according to the 2010 ISACA IT Risk/Reward Barometer survey.

Survey: Companies Lack Adequate Policies To Protect Information In The Cloud

Symantec Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced the findings of a joint survey of IT professionals. The survey revealed that most organizations lack the procedures, policies and tools to ensure that sensitive information they put in the cloud remains secure.

Wireless mesh

Challenge or Opportunity?

Wireless has been in the physical security space for years, especially with point-to-point bridges. But the newcomers—especially in the field of wireless mesh—are changing the game. Will wireless be as ubiquitous for outdoor deployments as cable or fiber?

Seattle Tops Report As U.S. City Most Vulnerable To Cyber Crime

Norton from Symantec teamed up with independent research firm Sperling’s BestPlaces to find and expose the nation’s top 10 cities most vulnerable to cybercrime.

Poll: One In 10 Employees Knowingly Violate Company IT Policy

A new Fiberlink Poll published recently showed that more than one in 10 U.S. workers admit to knowingly violating the policies put in place by their companies' IT departments in order to get their work done.

Report: Total Loss Linked To Online Fraud More Than Doubles In 2009

The Internet Crime Complaint Center (IC3), a partnership between the FBI and the National White Collar Crime Center (NW3C), today released the 2009 annual report about fraudulent activity on the Internet.

Research: Majority Of Malicious Web Sites Hosted On U.S.-Based Servers

AVG Technologies recently unveiled the results of a research study which shows that -- contrary to popular opinion -- most malicious Web sites are hosted on U.S. servers and not in other countries like China.

Study Examines Wireless Network Security At RSA

Motorola AirDefense performed wireless security monitoring at the RSA 2010 conference. Leveraging its Wireless Intrusion Prevention System platform and wireless security expertise, Motorola AirDefense collected and analyzed the security of the wireless networks present at the show.

securing data centers

Identity: Authenticated

It's no surprise that for data industry leaders, when addressing the questions of physical access control, the overwhelming answer has been biometric technology, which provides a level of security beyond that of conventional card systems by verifying the identity of the person.

IP video integration

Integrated at the Next Level

In order to address the shortcomings of traditional security systems, integrators and manufacturers have developed piecemeal solutions by creating interfaces between devices. When these interfaces are used, separate subsystems can work in conjunction.

Report: Malicious Spam, Social Engineering Attacks Rising

M86 Security, a provider of Web and messaging security products, recently unveiled its latest Security Labs Report, detailing a massive increase in spam volumes and recent vulnerabilities in applications including Adobe products and attacks via social networking sites such as Twitter.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3