Microsoft Corp. recently released the seventh volume of the Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over the preceding six months.
INPUT recently announced the release of its report: Defining the Federal Information Security Mission: 2009-2014 Forecast, which indicates that federal spending is on the rise to counter the growing threat of cyber attacks on federal computer networks and the national infrastructure.
Today, most organization officials understand they can use their IP network to connect physical security devices together. In some cases, the capital and operational cost savings from using a single communications infrastructure is enough to motivate them. But for others, further justification and additional benefits may be needed to drive convergence between the physical and the cyber worlds.
- By Bob Beliles
- Oct 19, 2009
Apple's App Store currently holds about 85,000 applications for you to download to your iPhone or iPod Touch. Of course, about 84,900 of those programs consist of free and 99-cent games that your seven-year-old would probably find more compelling than you do. So we've scoured reviews, App Store search sites, and recommendation directories to compile this concise list of some of the best security apps currently available.
The Department of State is tagging 10,000 mission critical IT assets with passive RFID to save money, increase security and reduce administrative burden.
There are typically two different approaches to storing data in an IP video system: using a centralized architecture with a master database located in the central control room or head office and using a distributed architecture that spreads the data around the security management system, keeping it close to where it is produced or needed.
- By Barry Keepence
- Oct 05, 2009
Symantec Corp. recently announced the findings of its 2009 SMB Disaster Preparedness Survey, reflecting the attitudes and practices of small and mid-sized businesses and customers toward technology disaster preparedness.
Sentillion recently announced that IASIS Healthcare, a owner and operator of acute care hospitals, has implemented its enterprise single sign-on (SSO) solution to provide caregivers with improved access to the health system’s electronic health record (EHR) system.
According to an online poll recently conducted by Unisys Corp., security and data privacy concerns remain the most significant impediment to the adoption of cloud computing among enterprise users.
Technology plays a dichotomous role in the
security of an organization's information
assets. While it enables us to protect assets in
ways we never imagined, it also can enable the very
threats that leave those assets vulnerable.
- By B. Scott Haroff
- Sep 10, 2009
The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.
- By Fredrik Wallberg
- Sep 04, 2009
Nikon Corp. one of Japan’s leading manufacturers of optical imaging and processing equipment, has selected Verizon Business to provide new monitoring and security measures to protect Nikon’s global network infrastructure.
In its sixth annual study of outbound e-mail and data loss prevention issues, Proofpoint, Inc. found that U.S. companies are increasingly concerned about a growing number of data leaks caused by employee misuse of e-mail, blogs, social networks, multimedia channels and even text messages.
Military operations threatened by persistent cyber attacks will benefit from mission assurance and resilience through cyber security solutions being developed by Lockheed Martin.
Paramount Pictures has released many great movies, but the studio is not as bestowing when it comes to privacy and security.
- By Ralph C. Jensen
- Aug 07, 2009
IT managers are getting more involved in decisions regarding physical security solutions, according to a new report featured in the latest Quarterly Research Update from the Security Industry Association (SIA).
After the staggering success of the 2008 Olympic Games in Beijing, you could argue that things have been changed forever.
- By Megan Weadock
- Aug 01, 2009
RSA Conference recently released the results of a recent survey of security professionals regarding the critical security threats and infrastructure issues they currently face, including those exacerbated by the current economic climate. The study, “What Security Issues Are You Currently Facing?,” includes responses from nearly 150 C-level executives and professionals charged with directing, managing and engineering security infrastructures within their respective organizations.
Panda Security recently announced its worldwide barometer on the status of security at small and medium-sized businesses. According to the study, which surveyed 5,760 companies worldwide, 44 percent of the more than 1,400 United States respondents have recently been infected by Internet threats. Worldwide, 58 percent were affected, with Brazil showing the highest infection rate at 86 percent. Only 8 percent of SMBs in Germany reported infections.
At ISACA’s International Conference in Los Angeles recently, security professional John Pironti called for a sweeping change in how enterprises deal with information security.