IT Security


Survey: 70 Percent Of Small/Medium-Sized Enterprises At Risk Of Network Security Breach

Napera Networks recently issued the results of an online Network Test that asked 200 small and medium-sized enterprises a series of questions to determine if the corporate networks of the companies are secure and protected from potential threats.

All In Shreds

When you think of the NFL, shredding papers and documents is the last thing that comes to mind, unless your former quarterback is moving to a new team. You’re more likely to think of an oversized lineman sacking the quarterback or a fullback rushing for 3 yards in a cloud of dust.

Study: 42 Percent Of Organizations Report Unauthorized Active Directory Access

According to a study conducted by Osterman Research and sponsored by Imanami, 42 percent of organizations report unauthorized access of information through Active Directory.

One Size Fits All

Most people already know what ‘authentication’ is and how closely it is tied to accessing resources on the network. After some form of authentication, users typically either access resources directly or via technologies like SSO (Single Sign-On), which are then relied upon by the IT and security management as a central management console for controlling and managing access to resources across the enterprise. Unfortunately, most of us, including certified security professionals, assume that these technologies are enough to thwart fraudulent attempts to steal sensitive information.

Survey: Half Of U.S. Companies At Risk Of Sensitive Information Leaks By Employee E-Mail

Mimecast has found that 50 percent of U.S. companies are at risk of sensitive information leaks by employee e-mails, based on a survey of 500 IT professionals regarding their e-mail archiving and continuity policies.

Survey: More Than 45 Percent Of Business Internet Users Continue Risky Behavior Online

Palo Alto Networks recently announced the results of a study by the Ponemon Institute examining behavioral aspects around corporate policy compliance with regards to Internet tools and applications. The most startling discovery was that when confronted with a security or privacy breach as a direct result of using an Internet application, 45 percent of employees did nothing and continued using the product.

Georgian Bank Deploys Network Security Appliance To Protect Network, Prevent File Leaks

Mi5 Networks recently announced that Georgian Bank, the second-largest bank headquartered in Atlanta, has selected its Mi5 Webgate appliance to provide gateway protection against Web malware, control Web usage and prevent confidential files from leaking out of the network.

California County Ramps Up IT Security

Secure Computing Corp., an enterprise gateway security company, recently announced that Orange County, Calif., has protected its IT network with a unified set of Secure Computing products.



Conference Tackles Identity, Cybersecurity Programs In Next Administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?

UMB Financial Corp. Secures IT Infrastructure With Identity Management Solution

One of the largest independent banks in America, UMB Financial Corp., (UMB) is implementing Novell identity management solutions on SUSE Linux Enterprise Real Time to streamline user access and increase data security

ANSI, ISA Release Action Guide To Help Organizations Prepare For Cyber Attacks

The American National Standards Institute (ANSI) and the Internet Security Alliance (ISA) recently released a new action guide to assist business executives in the analysis, management and transfer of financial risk related to a cyber attack.

Marine Corps Taps BearingPoint For Identity And Access Management Solution

BearingPoint Inc. recently announced that the United States Marine Corps Systems Command has awarded the firm a fixed price contract for an Identity and Access Management (IAM) solution.

National Bank Of Kuwait Leverages Solution To Prevent Unauthorized Database Changes By 'Super Users'

Guardium and StarLink, Middle East provider of security and compliance solutions, recently announced that the National Bank of Kuwait (NBK) has successfully implemented Guardium’s enterprise security platform to continuously monitor all database transactions in real-time.

Forecast Looks At Emerging Cyber Threats For 2009

The Georgia Tech Information Security Center (GTISC) recently announced the release of the GTISC Emerging Cyber Threats Report for 2009, outlining the top five areas of security concern and risk for consumer and enterprise Internet users for the coming year.

Employees' Everyday Behavior Puts Sensitive Business Information At Risk

RSA recently announced the findings of its latest insider threat survey, conducted among attendees at industry events in North America and Latin America in the spring and summer of 2008.

Ohio Sheriff’s Office Uses Biometrics-Based Identity/Access Management System

BIO-key International Inc. and its partner Sig-Tec recently announced the successful deployment of a fingerprint biometrics-based identity and access management system at the Mahoning County (Ohio) Sheriff's Office.

Frankfurt Airport Uses Novell Identity Manager To Improve Security, Efficiency

The operator of the world's eighth largest airport and Germany's largest employer, Fraport AG, has implemented Novell identity and security management solutions to achieve a single point of control for thousands of identities and secure IT resources at Frankfurt Airport.

Leaving Your Mark

Today’s mobile professionals carry more sensitive information than ever before. A single laptop can contain information that can be valued in the millions, if not billions, of dollars.

Survey: Businesses Perceive Cybercrime As Major Risk

Finjan Inc., a provider of secure Web gateway solutions for the enterprise market, recentlyannounced the findings of its Web security survey of 1387 IT/security professionals.

Study: IT Security Spending Will Continue To Increase In 2009

Spending on IT security will continue to grow next year, according to new data unveiled by Forrester Research Inc. on the first day of its Security Forum.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3