IT Security


HP Acquires ArcSight For $1.5 Billion

HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.

Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Study: Cybercrime Strikes More Than Two-Thirds Of Internet Users

The next time you surf the Internet, consider this: You might be just one click away from becoming the next cybercrime victim.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Study: 25 Percent Of New Worms Designed To Spread Through USB Devices

PandaLabs, Panda Security's antimalware laboratory, has discovered that in 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers. These types of threats can copy themselves to any device capable of storing information such as cell phones, external hard drives, DVDs, flash memories and MP3/4 players.

Study: Mobile Application Security One Of Top Concerns For Organizations

According to a new study commissioned by Entrust Inc., many of today's mobile applications have limited functionality from a lack of overall security. And for mobile applications that feature transaction-based capabilities, the requirement for security is even greater, highlighting a key area of concern for deploying organizations.

Cameron Diaz Is Web’s Most Dangerous Celebrity Search

Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee Inc. For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web.



Intel To Acquire McAfee For $7.68 Billion

Intel Corp. has entered into a definitive agreement to acquire McAfee Inc., through the purchase of all of the company’s common stock at $48 per share in cash, for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which is expected to close after McAfee shareholder approval, regulatory clearances and other customary conditions specified in the agreement.

Brivo Earns TRUSTe's Stamp of Approval

The TRUSTe EU Safe Harbor Seal communicates that a website has committed to protecting the privacy of visitors through compliance with the EU-U.S. Safe Harbor Framework and participation in TRUSTe’s Watchdog Consumer Dispute Resolution service.

NIST Report: Securing Critical Computer Systems Starts At Beginning

Nothing beats the feeling of starting up a new computer -- be it a laptop, desktop or a major, custom-designed computing system. A new system is a blank slate with no worry of botnets, viruses or any other cybersecurity hazards. Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for Federal Information Systems. Information systems and components are under attack throughout the supply chain from the design phase -- including specification and acquisition of custom products -- through disposal.

IQinVision Centralizes Marketing under Nazarenus, Expands Sales

The addition of new distribution organizations and the augmentation of sales operations with four new personnel will help ensure the company is set up for continued rapid sales growth, the company said.

Pictured from left are Ken King, President of ‘The Strategy King’; Dr. Greg Winter, CVTC Superintendent; Haley Pitre, Executive Assistant, HSI Sensing; Ryan Posey, VP Operations, HSI Sensing; Angela Lewis, CVTC BIS Director; George Tiner, CVTC Assistant Superintendent; and Dick Lowe, CVTC Industrial Coordinator.

HSI Sensing Recognized with Partners for Progress Award

“Partnerships like this strengthen our communities and serve as the foundation for future growth and prosperity,” said CVTC’s Angie Lewis of HSI, an ISO 9001:2008-registered company that designs, develops, and makes reed switches, proximity sensors, and other sensing products.

Survey: Accessing Corporate Data On Vacation Has Serious Implications For IT Security

With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead these stressed out individuals, a whopping 95 percent of our sample, will be taking their mobiles and smartphones abroad with them with the expectation of working.

Research: Majority Of Business Leaders Underestimate Risk Of Advanced Cyberthreats

NetWitness Corp. recently announced the results of a research study by the Ponemon Institute on advanced threat prevalence, impact and preparedness. The study demonstrates that a vast majority of enterprises of all sizes regularly fall victim to advanced cyber threats, at the same time, more than half of these organizations recognize their defensive technologies, personnel and budget as "inadequate."

Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

National Initiative For Cybersecurity Education Spreading Across Country

Cybersecurity training is spreading from high-tech and government offices into high schools, libraries and workplaces near you. Called the National Initiative for Cybersecurity Education (NICE) and coordinated by the National Institute of Standards and Technology (NIST) , the new interagency program aims to promote cybersecurity awareness and know-how across the country and among citizens of all ages.

Smart Business Communications

How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.

Research: Smart Grid Cybersecurity Market To Reach $3.7 Billion By 2015

As governments and utilities invest in smart grid deployments, the need for robust security measures has become increasingly apparent. Those requirements will drive major investments in smart grid cybersecurity over the next several years, according to a recent report from Pike Research.

House Leaders Announce Support For Cybersecurity Bill

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Senator Thomas Carper, D-Del., last week hailed the bipartisan support of prominent members of the House of Representatives for comprehensive cybersecurity legislation introduced last week by the three Senators.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.