Secure Computing Corp., a enterprise gateway security company, recently announced that University of Minnesota has selected the company's Secure SafeWord (formerly known as SafeWord) as a two-factor authentication solution for 8,000 staff and faculty members.
Despite the blustery cold and windy weather in San Francisco on Wednesday, information security of all kinds is the hot topic at RSA 2008 -- the largest event in the world dedicated to the field.
- By Brent Dirks
- Apr 10, 2008
In spite of the growing convergence of network security and physical security, it’s clear that many organizations have no plans to combine their IT and corporate security functions under a single CSO. That doesn’t mean those of us in non-converged businesses shouldn’t -- or aren’t expected to -- provide unified oversight of risks.
- By Bob Pappagianopoulos
- Apr 07, 2008
Securing an entire network at a finite number of ingress points simply does not offer the risk mitigation companies need.
- By Kevin Prince
- Apr 02, 2008
Many organizations now require that CCTV video images are recorded and archived continuously from all cameras for 90 days or more. In large systems, this can create a significant storage requirement. The issue is compounded by users wanting to store video at the highest quality and maximum frame rate, particularly in homeland security and law enforcement applications where CCTV footage is required for evidential purposes.
- By Barry Keepence
- Apr 02, 2008
With an explosive demand for security monitoring worldwide, cameras are appearing in every conceivable location. The challenge is how to support this rapidly growing infrastructure with affordable and flexible real-world solutions. The adoption of PoE offers new opportunities for the design of products directly powered over Ethernet lines, drastically reducing overall installation and maintenance costs.
- By Koen Geirnaert
- Apr 01, 2008
PGP Corp. recently announced the results from a second annual study by The Ponemon Institute identifying key areas of focus in enterprise encryption use, planning strategies, budgeting and spending, deployment methodologies and impact on data breach incidents.
WhiteHat Security, a provider of Web site security services, recently released the fourth installment of the WhiteHat Web site Security Statistics Report, which calls out the top 10 most prevalent vulnerabilities and provides a vertical industry breakdown based on attacks.
IT departments are under pressure to make corporate networks more accessible to remote workers and a range of external users despite fears over the increased threat of data leaks, malicious content and hacking that this entails, according to new research.
ActivIdentity Corp. recently announced that Deloitte Ireland is facilitating secure remote and office-based access through the use of a strong certificate-based, two-factor authentication solution.
Construction sites are fiercely regulated environments in the United Kingdom, under a program called the Construction Skills Certification Scheme. At these sites, CSCS accreditation is tied to employee biometric details. At many construction sites, only workers with a CSCS card can be employed. The Olympic venues in London fall into this group.
- By Jon Mooney
- Mar 18, 2008
Video management systems have evolved considerably since the analog tape-based VCRs that were prevalent nearly 10 years ago. Then, analog CCTV cameras with coaxial cable typically were connected to a multiplexer so multiple video images could be displayed on a video monitor simultaneously. These signals then were recorded for review and archiving.
- By Matt Barnette, Adam Shane
- Mar 18, 2008
Cyber Storm II is the second in a series of congressionally mandated exercises that will examine the nation’s cyber security preparedness and response capabilities. The exercise will simulate a coordinated cyber attack on information technology, communications, chemical, and transportation systems and assets.
Siber Systems Inc. recently announced the results of a poll on password use involving more than 600 U.S. IT professionals. The survey, administered through business data company eMedia, found that U.S. workers, managers and IT staffs alike are increasingly confronted with difficulties arising from computer passwords.
Quest Software Inc. recently announced the results of its Identity Management Government Survey of federal, state, local and municipal government IT professionals.
Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.
- By Ken Hertzler
- Mar 03, 2008
Vital to everyday business operations, the Web browser must be protected from malware lurking on a fast-growing number of infected Web sites, according to Enterprise Management Associates.
There is a wide gap between the IT security skills that organizations want and the corresponding skills that workers bring to the job, according to a new survey commissioned by the Computing Technology Industry Association (CompTIA).
A team of academic, industry and independent researchers has demonstrated a new class of computer attacks that compromise the contents of "secure" memory systems, particularly in laptops.
According to research from Trend Micro's TrendLabs, hackers are intensifying their attacks on legitimate Web sites. The number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals.