IT Security


For a More-Secure Password, Watch How You Type

A group of researchers at the American University in Beirut have come up with an unusual biometric that could be used as for that second factor: your typing pattern.

Ed Strong

A Conversation With Ed Strong

Western Digital released a 3 terabyte AV hard drive May 16 aimed at storing video from surveillance systems. We sat down with WD’s marketing director, Ed Strong, to learn more about the new product.

Research Examines Five Industries Most Susceptible To Phishing Attacks

Internet Security Awareness Training (ISAT) firm KnowBe4 has released new cybercrime statistics that identify the nation's most Phish-prone industry sectors, which are those most susceptible to cybercrime ploys. The top five industries vulnerable to cybercrime include travel, education, financial services, government services and IT services.

Study Finds Security Vulnerabilities At All Time High For Mobile Devices

In a global mobile threat study released recently, Juniper Networks found that enterprise and consumer mobile devices are exposed to a record number of security threats, including a 400 percent increase in Android malware, as well as highly targeted Wi-Fi attacks.

GSA Launches $2.5B Cloud Computing Procurement

The General Services Administration released an RFQ for cloud computing services. Do you have what they are looking for?

Sophos to Acquire Astaro

The acquisition will enable the company to meet demands for complete, layered security protection.

eEye Reveals Simple Steps to Defend Against Everyday Threats

The report, produced from research led by eEye cofounder and CTO Marc Maiffret, reveals that simple configuration changes and software version upgrades could mitigate many application vulnerabilities before patches are available.

Five Considerations When Evaluating Cloud Computing Architectures

An excellent starting point for an organization looking at cloud computing platforms is to examine its IT architecture. Only by aligning the architecture – compute, network, data center, power and storage resources – with applications can a company be on the path to achieve the reliability and performance it requires within a cloud environment.



Datapipe Joins the Cloud Security Alliance

The company will work with the CSA to promote thought leadership and best practices for secure cloud computing.

Survey: Employee Use of Social Media Heightens Security Concerns

The eighth annual "What Keeps Network Administrators Up At Night" indicates unease about network security breaches and users respectively are at an all-time high in survey's history.

Aaron's Inc. Sued Over Computer Spyware Allegations

According to the complaint, "It has been the practice and policy of the Aaron's Defendants to conceal from their customers their ability to remotely access, intercept and monitor customers' private, personal electronic communications, information, screen shots, keystrokes or images captured on webcams and to further disclose to consumers exactly the kinds of private information and images that can be and were routinely collected, transmitted and stored."

Americans' Security Concerns Jump on Internet and National Security Worries

U.S. Unisys Security Index finds concern rises to highest levels ever following WikiLeaks incident, new unrest in the Middle East and national and financial security threats.

Buyer Be ‘Diallerware’

It probably goes without saying that being a smart person is not a prerequisite for owning a smartphone. Just take a look around you.

WDDinc Launches New Company, 403 Web Security

New company helps businesses examine, repair and develop secure websites.

Security Standoff In The Cloud?

CA Technologies and the Ponemon Institute, an independent research firm specializing in privacy, data protection and information security policy, recently released a study that shows cloud providers and cloud consumers are not aligned on cloud security. Their conflicting views on focus, priority and responsibility suggest a pending security standoff between cloud providers and cloud users.

Restaurant Group Provides Secure Wi-Fi With SonicWALL Technology

SonicWALL Inc., provider of intelligent network security and data protection solutions, today announced that BRAVO BRIO Restaurant Group Inc., has selected the SonicWALL Clean Wireless solution to provide network security and data protection solutions for its 85 high-volume, full-service restaurants in the U.S., including the upscale affordable BRAVO! Cucina Italiana and Brio Tuscan Grille.

Report: Advanced Persistent Threats Increase In April

Symantec Corp. recently announced the publication of its April 2011 MessageLabs Intelligence Report. This month analysis reveals that targeted attacks intercepted by Symantec.cloud rose to 85 per day, the highest figure since March 2009 when the figure was 107 per day in the run-up to the G20 Summit held in London that year.

Report Reveals Dramatic Increase In Cyberattacks, Sabotage On Critical Infrastructure

McAfee and the Center for Strategic and International Studies (CSIS) recently revealed the findings from a report that reflects the cost and impact of cyberattacks on critical infrastructure such as power grids, oil, gas and water.

Android, Facebook Seeing Increased Cyberattacks

AVG Technologies, a provider of internet and mobile security, today launched its “AVG Community Powered Threat Report -- Q1 2011,” providing insight and background on the trends and developments in the world of online threats.

Survey: Regulatory Compliance Top Concern Of IT In 2011

Regulatory compliance will be the top business issue affecting enterprise information technology (IT) in the next 12 months, according to Top Business/Technology Issues Survey Results, a new survey of more than 2,400 ISACA members from 126 countries.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3