IT Security


NIST Sponsors Second Cloud Computing Forum, Workshop In November

On November 4 and 5, the National Institute of Standards and Technology (NIST) will host the Cloud Computing Forum and Workshop II to give government and industry stakeholders opportunity to comment on the next steps in developing cloud computing standards.

Research: More Than Half Of Mid-Sized Companies Have Seen Increase In Hacker Attacks Since Last Year

McAfee, Inc. recently released new research, finding that mid-sized organizations have seen increased attacks on their networks and systems since last year, according to the McAfee report The Security Paradox.

AmIHackerproof.com Gets Record Hits after CNN Appearance

The online web service had over 205,128 people who performed vulnerability scans and out of those scans over 40,221 registered in a 4 day period.

BLADE Software Eliminates 'Drive-By Downloads' From Malicious Websites

Insecure Web browsers and the growing number of complex applets and browser plug-in applications are allowing malicious software to spread faster than ever on the Internet. Some websites are installing malicious code, such as spyware, on computers without the user’s knowledge or consent.

DHS Launches Cybersecurity Awareness Campaign

The Department of Homeland Security recently launched the “Stop. Think. Connect.” public cybersecurity awareness campaign -- a national initiative that promotes simple steps the public can take to increase their safety and security online.

Report: More Than 50 Percent Of Malware Infections Occurred In Education Sector In First Half Of 2010

During the first half of 2010, Europe sped through the spam-generating fast-lane, bypassing North and South Americas, and Asia-Pacific to earn the "Top Producer of Spam" title. Based on the Trend Micro semi-annual 2010 threat report, spam continued to grow between January and June 2010, with a brief lull during April.

The New Warfighters

As we go about our day, preoccupied with work, family, friends and activities, many of us have the luxury of never thinking about cyberwarfare. But know that right this second, more than 100 foreign intelligence organizations are trying to hack into our military networks. A scary thought, isn’t it? To defend our nation against this threat, the Pentagon is partnering with NATO allies and the private sector.

Survey: Federal Executives Believe Cybersecurity Measures Hurting Agency Productivity

Citrix Systems Inc. recently announced key findings from a recently conducted survey on the impact of government cybersecurity measures on federal managers.



Going Virtual

Most people in the industry are familiar with how the NVR has changed the face of security video projects worldwide. As security hardware professionals, you may have been asked, “Aren’t NVRs just servers?” or “Can we use one of our extra e-mail machines as an NVR?” You might answer with a reserved, “Yes, but....”

Report: Trojans Constituted More Than Half Of All New Threats In Third Quarter

PandaLabs, Panda Security's antimalware laboratory, recently published its Q3 Quarterly Report on global malware activity, covering security events and incidents from July to September. Continuing the theme from the last report, PandaLabs once again found Trojans in the spotlight, comprising 55 percent of all new threats. Infection via e-mail, traditionally the most popular vector for spreading malware, has declined in favor of greater use of social media. These include clickjacking attacks using the Facebook "Like" button, fake Web pages positioned on search engines (BlackHat SEO) and zero-day vulnerability exploits.

DHS Announces Start Of Cyber Storm III Exercise

Department of Homeland Security (DHS) Secretary Janet Napolitano recently announced the beginning of Cyber Storm III -- a three-day long, DHS-sponsored exercise that brings together a diverse cross-section of the nation’s cyber incident responders to assess U.S. cyber response capabilities.

Poll: Businesses Express Confidence In IT Network Resilience, But Experiences Reveal Otherwise

CDW LLC, a provider of technology solutions to business, government, education and healthcare, recentlyannounced the results of its Business Continuity Straw Poll, based on a survey of 200 Information Technology (IT) decision makers at medium and large U.S. businesses, each of which experienced significant network disruptions since July 2009.

Brigadier General Antonino

Brazilian Army Joins Forces with Panda Security to Combat Cyber-Warfare

Panda will train the Army's operational agents in the fight against cyber terrorism, digital crime and strategic preparation for cyber-warfare.

Report: Security Concerns Hinder Adoption Of Web 2.0, Social Networking In Business

McAfee Inc. recently revealed that business leaders worldwide see the value of Web 2.0 in supporting productivity and driving new revenue -- but remain deeply concerned about security threats associated with deploying the technology.

Independent Lab Tests Show Security In Virtualized Data Center, Cloud Computing Is Possible, Measurable

Independent test lab, Broadband Testing, and test and measurement leader, Spirent Communications, achieved a significant breakthrough in securing virtual environments and allaying user fears about cloud based applications.

Waterfall Security Solutions Passes INL Cyber Security Assessment

Waterfall Security Solutions, provider of Unidirectional Security Gateways, announced recently the successful completion of a security assessment, undertaken by the Idaho National Laboratory, of Waterfall's Unidirectional Security Gateway's technology and products. The assessment was conducted as part of the Department of Homeland Security Control Systems Security Program (CSSP).

New Report Highlights Most Significant IT Security Risks Facing Enterprises

Qualys Inc., provider of on demand IT security risk and compliance management solutions, recently announced the release of the “Top Cyber Security Risks Report.” This second annual report features new data from HP TippingPoint DVLabs, SANS Institute and Qualys Research Labs, helping companies understand the latest security threats and implement security policies and technologies to protect company data.

HP Acquires ArcSight For $1.5 Billion

HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.

Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3