IT Security


Generation Next

Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.

Study: Web Browsers Becoming Favorite Vulnerability For Hackers

Vital to everyday business operations, the Web browser must be protected from malware lurking on a fast-growing number of infected Web sites, according to Enterprise Management Associates.

IT Security Skills In High Demand, Short Supply, Survey Reveals

There is a wide gap between the IT security skills that organizations want and the corresponding skills that workers bring to the job, according to a new survey commissioned by the Computing Technology Industry Association (CompTIA).

New Computer Attacks Compromise ‘Secure’ Contents Of Memory Systems

A team of academic, industry and independent researchers has demonstrated a new class of computer attacks that compromise the contents of "secure" memory systems, particularly in laptops.

Report: Underground Cyber Economy Growth To Increase

According to research from Trend Micro's TrendLabs, hackers are intensifying their attacks on legitimate Web sites. The number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals.

Report: Hacker Attacks Against Healthcare Organizations Up 85 Percent

SecureWorks has seen an 85 percent increase in the number of attempted attacks directed toward its healthcare clients by Internet hackers. Attempted attacks have increased from an average of 11,146 per healthcare client per day in the first half of 2007 to an average of 20,630 per healthcare client per day in the last half of 2007 through January.

Making IT Your Business

Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.

Security Software Industry Takes Steps To Form Anti-Malware Testing Standards Organization

More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO.



Computer Security Group Releases Top 10 Cyber Menaces For 2008

The SANS Institute recently worked with 12 cyber security experts and released a list of the attacks most likely to cause substantial damage during 2008.

To IT and Beyond

When many industry observers talk about how IT is changing security, the discussion typically reverts to the concept of hanging 30-year-old panel technology onto 10-year-old Ethernet backbones.

Leaving a Legacy

The security industry is clearly ready for IP video surveillance. Network cameras have been around for more than a decade, and they can now be found everywhere. Furthermore, the latest megapixel cameras offer image quality that is not available with standard analog cameras. Network bandwidth is already faster today than it was just a few years ago. Processing speeds on PCs continue to get faster while hard drives and other storage options continue to get bigger— all with the cost of computers, generally, decreasing.

Report: Number Of Legitimate Web Sites Compromised By Hackers Skyrockets

Websense recently released a new report that reveals that -- for the first time -- the number of legitimate Web sites compromised by attackers has surpassed those purposefully created by attackers.

Organizations Using SAML 2.0 For Digital Identity Management

Liberty Alliance, the global identity consortium working to build a more trusted Internet for consumers, governments and businesses worldwide, recently released highlights of SAML 2.0-based digital identity management applications that are delivering real world value to users and organizations around the globe.

Ethical Hacker Training Focus Of Institute

In response to a growing need to combat illegal hacking, Halock Security Labs announces the opening of the Institute 4 Ethical Hacking (I4EH).

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

Report: Botnet-Infected Computers To Increase Sharply In 2008

The latest Internet Security Outlook Report issued recently by CA Inc. forewarns that online gamers, social networks and high-profile events like the U.S. presidential election and the Beijing Olympics are among the top potential targets for online attacks in 2008.

United Kingdom Banks Choose IBM Intrusion Protection Technology

IBM recently announced that the Bank of London and The Middle East plc have selected intrusion prevention technology from IBM’s Internet Security Systems (ISS) division to help reinforce its existing security controls and further protect its customer and corporate data.

Engineer Developing Cyber Technology To Find Online Criminals

Yong Guan had scribbled 12 arrows across his office whiteboard, each black line going from one little box he had drawn to another little box. He had written five long formulas up there, too. And that was bad news for cyber criminals.

Where Security Fits In

Deemed the rum capital of the world and the birthplace of salsa music, Puerto Rico has reason to celebrate.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.