IT Security


Integrating Physical and Cyber Security: Strategies that Work

Security principles have not changed much in the past 30 years, but the application of those principles is shifting daily. Addressing integrated security disciplines to ensure a cohesive and collaborative security solutions environment in any organization requires a number of coordinated things to happen efficiently.

Report: Government IT Pros Think Cybersecurity is Very Important

InformationWeek Reports, a service provider for peer-based IT research and analysis, announced the release of its latest research report.

From the IT Perspective

Video surveillance as a network service continues to grow and presents expanded opportunities for silicon solutions.

Study: Many IT Professionals Believe Cyber Security Has Increased

A study by nCircle found that 76 percent of security professionals believe U.S. cyer security has increased over the last 12 months.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.

GSA Launches Effort to Transition Federal Government to Cloud Computing

The U.S. General Services Administration (GSA) has announced an important benchmark that will pave the way for agencies across the federal government to accelerate adoption of cloud computing.

Threat Intelligence System Helps Share Malware Data

Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.



Security Systems Integrators Unsure About IT Distributors

Almost 40 percent of North American security systems integrators would prefer to deal with IT distributors when purchasing their IP-based video surveillance products, according to a new report from IMS Research.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

Report: Mobile Use of Social Networking Becoming Preferred Way to Infect Mobile Devices

AVG Technologies recently released its Q1 2012 Community Powered Threat Report. The report highlights the growing use of mobile devices to connect with social networks and how this is fast becoming a preferred method for cyber criminals to spread malware, particularly on those devices running Android.

Military Explores Expansion of Open Source Technology

Open source technology can help military and other government entities modify software quickly without sacrificing data security. That flexibility, coupled with lower overall cost, is helping fuel a rapid increase in government adoption of open source software, advocates say.

Linsanity, Whitney's Death, New Android Threats Dominate Cybercrime in First Quarter

This quarter saw a significant shift in the way the security industry approaches targeted attacks and advanced persistent threats, which are now viewed more as a long-term, ongoing campaign versus the typical "smash-and-grab incidents" favored by cybercriminals in the past, according to the Trend Micro Q1 2012 Security Roundup Report.

Research: Personal Information Top Target of Cyber Attacks

Customer, student, employee and patient information is most at risk for cyber attacks today, and defending that data is a top concern for IT professionals this year, according to the Data Loss Straw Poll, a national survey published today by CDW LLC.

Mobile Security Survey: Lack of Awareness Chaos Pervades BYOD

SANS will be hosting a complimentary webcast on April 12, releasing the results to the First Annual Survey on Mobility Security.

Mobile Device Vulnerability Management Top Concern for Security Professionals in 2012

New findings from a Tenable Network Security study have revealed that mobile device vulnerability management is a top concern for security professionals for the next 12 to 15 months

HID Global Shows off NFC Access Control Technology in Action at ISC West

With mobile technology becoming an important trend in the security industry, HID Global showcased its NFC access control technology in action during a lunch Thursday at ISC West.

Mobile Takeover at ISC West

All attendees and exhibitors were introduced to “The Future of Security” early Wednesday morning; yet, many exhibitors came to Las Vegas armed with the mobile technology know-how to take on the new wave of mobile communication.

The Future of Security

The future of security is always on the minds of industry leaders and developers. As a welcome to all attendees at this year’s ISC West Conference in Las Vegas, an early morning session devoted to the future of the security industry addressed how IT and security convergence in the cloud will create better end-user operability.

CompTIA, Cybersecurity Experts Call For Best Practices with Increased Adoption of Mobile Technologies

In today's "post-PC" world, businesses of all sizes, as well as policy makers at all levels, need to be ready to address and manage increasing security and privacy challenges, found a panel of experts at CompTIA's mobile security briefing. Several dozen Hill staff, policy makers, security and privacy experts and technology advocates participated in the discussion.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Protecting Data is Critical

    To say that the Internet of Things (IoT) has become a part of everyday life would be a dramatic understatement. At this point, you would be hard-pressed to find an electronic device that is not connected to the internet. Read Now

  • Mobile Access Adoption

    Smartphones and other mobile devices have had a profound impact on how the world securely accesses the workplace and its services. The growing adoption of mobile wallets and the new generation of users is compounding this effect. Read Now

  • Changing Mindsets

    We have come a long way from the early days of fuzzy analog CCTV systems. During that time, we have had to migrate from analog to digital signals. When IP-based network cameras arrived, they opened a new world of quality and connectivity but also introduced plenty of challenges. Thankfully, network devices today have become smart enough to discover themselves and even self-configure to some degree. While some IT expertise is certainly required, things are much smoother these days. The biggest change is in how fast security cameras and supporting infrastructure are evolving. Read Now

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3