IT Security


Report Finds Basic IT Security Threats Continue To Be Overlooked

Trustwave, a provider of on-demand data security and payment card industry compliance management solutions to businesses and organizations throughout the world, has released its 2010 Global Security Report.

Study: Cost Of Data Breaches Continue To Rise

PGP Corp. and the Ponemon Institute, a privacy and information management research firm, recently announced results of the fifth annual U.S. Cost of a Data Breach Study.

Survey: Confidence In Social Networking Security Shaken As Online Crime Rises

RSA, The Security Division of EMC, announced the results of its 2010 Global Online Consumer Security Survey that polled more than 4,500 consumers regarding their awareness of online threats, concerns with the safety of their personal information online and their willingness to share it, and desire for better identity protection.

Company Says Malware, Malicious Insiders Top Information Security Threats For 2010

Perimeter E-Security recently unveiled its Top 10 information security Threats for 2010.

Poll: Greatest Cyber Risk Driven By Remote Network Access, Embedded Malicious Code

More than 40 percent of executives polled by Deloitte believe remote internet access to corporate systems, embedded malware in computers, applications and devices, and little visibility into the security protocols of suppliers and business units are the greatest cyber risks today.

Fujitsu, IBM Offer Biometric Security Solution That Replaces Passwords

IBM and Fujitsu Frontech North America Inc. recently announced a new security solution that integrates palm vein biometric technology from Fujitsu with IBM's single sign-on solution.

McAfee Predicts Social Networks Will Be Platforms Of Choice For Emerging Cybersecurity Threats In 2010

McAfee Inc. recently unveiled its 2010 Threat Predictions report. McAfee Labs believes cybercriminals will target social networking sites and third-party applications, use more complex Trojans and botnets to build and execute attacks, and take advantage of HTML 5 to create emerging threats.

Report: Fake Security Software, Search Engines, Social Networks Top Internet Threats In 2009

The latest State of the Internet 2009 report issued recently by CA Inc. states that the most notable 2009 online threats were rogue/fake security software, major search engines, social networks and Web 2.0 threats.



University Deploys Biometric Software On Faculty, Student Computers

DigitalPersona Inc. recently announced that Bentley University has deployed the company's software on faculty and student laptops and PCs.

Report Predicts IT Security Challenges In 2010

M86 Security, a provider of Web and messaging security products, recently released Predictions 2010, a report on its expectations for Web and messaging-based threats for the coming year.

Survey: Security Concerns Hinder Cloud Computing Adoption

Concerns about the security of cloud computing environments top the list of reasons for firms not being interested in the pay-per-use hosting model of virtual servers, according to the latest Enterprise And SMB Hardware Survey, North America And Europe, Q3 2009, by Forrester Research Inc.

fail_safe_systems

Fail-Safe Systems Required

Physical security information systems, including video, are critical to a company’s security operation and general well-being. The security mission requires fail-safe systems that operate dependably over long periods of time and are ready to respond when needed. Security systems should not have to compete for network resources on the enterprise network.

Report: Online Social Networks, Education Sites Harbor Most Security Risk

WhiteHat Security, a leading provider of Web site risk management solutions, recently released the eighth installment of the WhiteHat Security Web site Security Statistics Report, a high-level perspective on major Web site security issues that continue to compromise corporate data across all industries.

Study: Most Healthcare Organizations Not Ready For New Privacy, Security Compliance Regulations

A recent survey of healthcare organizations found that 94 percent believe they are not ready to comply with the privacy and security provision of the Health Information Technology for Economic and Clinical Health (HITECH) Act.

Study: Nearly 80 Percent Of IT Security Products Do Not Perform As Intended

Nearly 80 percent of security products fail to perform as intended when first tested and generally require two or more cycles of testing before achieving certification, according to a new ICSA Labs report.

Report: Nearly One-Third Of Federal Agencies Experience Daily Cybersecurity Incident

CDW Government Inc. recently released its 2009 Federal Cybersecurity Report, which found that across federal civilian and Department of Defense agencies, the number and severity of cybersecurity incidents has stayed the same or increased in the last year, with nearly one-third of Federal agencies experiencing a cybersecurity incident daily.

SCM Microsystems, LEGIC Identsystems To Create USB Tokens For Converged Physical, Logical Access

SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, and LEGIC Identsystems, a manufacturer of contactless smart card technology for personal identification, announced recently that they have formed a strategic partnership to create new products that support integrated physical and logical access.

Conquering The Risks

Corporate security has evolved over the years to recognize that physical security and information security are linked, and both need to be considered if a corporation is to succeed. However, while physical security management has evolved to embrace proactive risk management, information risk management remains oddly reactive. Only a comprehensive, proactive and appropriate information risk management plan will help keep the company secure and in turn provide other benefits.

Survey: Only 22 Percent Of Americans Fully Trust Government Agencies To Keep Personal Information Secure, Private

Only 22 percent of Americans fully trust government agencies to keep personal information secure and private, and the proportion is only slightly better (29 percent) with regard to trust in data protection by financial institutions such as banks, according to research conducted in September by Unisys Corp.

Big Business

Behind all the glamour and glitz, casinos are a lot like other businesses, yet they face a number of unique challenges. Casinos are required to adhere to numerous regulations and must secure their assets without causing inconvenience to customers. Casinos must protect against physical heists, but just as important, if not more so, casinos must protect their networks. Although it may not play as well on the big screen, a network breach could cost millions of dollars.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3