Data Security


Survey Finds Majority of Businesses Risk Sensitive Data in Cloud

Thales, leader in information systems and communications security announces that eighty-two percent of organizations already transfer, or plan to transfer, sensitive or confidential data into the cloud environment according to Encryption in the Cloud, a global study of 4,000 business and IT managers conducted by the Ponemon Institute and commissioned by Thales.

Security Issues to Escalate as BYOD Trend Continues

A new report from Juniper Research has found that the number of employee owned smartphones and tablets used in the enterprise will more than double by 2014, reaching 350 million by 2017, compared to almost 150 million this year.

Harris Corp. to Provide Latin American Country With Falcon Tactical Radios

Harris Corporation (NYSE:HRS), an international communications and information technology company, has received a $5 million order to provide a Latin American country’s armed forces with high-performance tactical communications for drug interdiction, anti-terrorism and illegal immigration missions.

Video Security

Cloud computing and storage may be one of the most disruptive technologies to the video security industry we’ve seen yet. Already growing dramatically in the IT world, the slower-to-adopt-new-technology security space is watching closely, with several tentative applications offered.

Kizi Gaming Company Selects Porticor to Protect Private Information

Kizi, an online gaming company, has selected Porticor's Virtual Private Data™ (Porticor VPD™) system to protect its private information stored in the cloud, while keeping customer information confidential.

Stream Data Centers Breaks Ground on Private Data Center in Houston

Stream Data Centers, a data center developer specializing in secure, independent, highly efficient Private Data Centers for corporate users, has started construction of a fully-commissioned Private Data Center development in The Woodlands, Texas, a master-planned community 35 miles north of downtown Houston.

Jericho Systems Named Best Privacy Technology of 2012

Jericho systems' Enterspace Exchange PatientPortal was named Best Privacy Technology of 2012 during the Second International Summit on the Future of Health Privacy in Washington, D.C.

Fastmetrics Implements Corero DDoS Defense Technology

Fastmetrics, an Internet service provider, has deployed Corero Network Security's Distributed Denial of Service (DDoS) Defense technology to detect and block network- and application-layer DDoS attacks and forms of malware-based attacks.



Northrop Grumman to Acquire M5 Network Security

Northrop Grumman, global security company, will acquire privately held M5 Network Security Pty Ltd, a Canberra, Australia-based provider of cybersecurity and secure mobile communications products and services to Australian military and intelligence organizations.

MorphoTrak Introduces MorphoIDent for Police Officers

MorphoTrak recently introduced MorphoIDent, a mobile terminal for police officers that fits into a shirt pocket.

Threat Intelligence System Helps Share Malware Data

Georgia Tech researchers are launching a malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.

Report Says Cybercriminals Targeted Users of Major Social Networking Sites in April

GFI Software, a provider of web-monitoring software and security, has released a report citing the 10 most prevalent cyber-threats detected in April. The report says cybercriminals exploited people who use social networking sites Facebook, Twitter, Tumblr and Pinterest to spread malware and spam surveys.

Anti-Malware Lab Report Says Four out of Five Malware Samples are Trojans

Six million new malware samples were created in the first quarter of 2012 alone, according to an anti-malware laboratory's quarterly report.

In A Flash

Surveillance data is critical in applications ranging from retail to government, and gaming to transportation. Today, video usage is moving beyond security and safety to other key business functions such as training, staffing, marketing and traffic flow. The strategic value of video data is made possible because of advancements in IP-based megapixel cameras and the intelligence of incoming video streams, which are increasingly tagged with information to improve search capabilities. But the influx in high-resolution video data combined with the greater amount of VMS features creates a significant performance challenge for video surveillance storage systems, which are the core of any surveillance deployment. Flash memory is a compelling new high-performance storage technology, but the price premium over disk drives is so large that it takes some creative thinking to make flash costeffective for mainstream surveillance environments.

Identity Fraud Rose in 2011

The 2012 Javelin Strategy & Research Identity Fraud Report shows that the number of identity fraud incidents increased by 13 percent in 2011, totaling 11.6 million adult victims. The report also found that certain social media behaviors and increasing number of data breach incidents contributed to the overall amount of identity fraud instances in the United States over the past year.

Michigan Man Arrested for Illegally Streaming Live Sporting Events Over the Internet

Yonjo Quiroa, 28, of Comstock Park, Mich., was arrested Wed., Feb. 1, charged with criminal copyright infringement related to a website operation that illegally streamed live sporting event telecasts and pay-per-view events via Internet.

Sony's CLEFIA Encryption Technology Adopted as International Standard

CLEFIA was adopted as one of the ISO/IEC 29192 International Standards in lightweight cryptography.

Some Dating Websites Do Not Remove Location Data From Pictures

While the majority of dating websites do a good job of managing the privacy of their users, a class research project at the University of Colorado Boulder’s Leeds School of Business found that 21 of 90 dating websites the class examined did not properly remove location data from pictures uploaded by their users.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.