IT Security


Generation Next

Building security has moved beyond locks and dependable security guards. Today’s threats require sophisticated security. The next generation of access control will converge physical and network security into one manageable entity.

Study: Web Browsers Becoming Favorite Vulnerability For Hackers

Vital to everyday business operations, the Web browser must be protected from malware lurking on a fast-growing number of infected Web sites, according to Enterprise Management Associates.

IT Security Skills In High Demand, Short Supply, Survey Reveals

There is a wide gap between the IT security skills that organizations want and the corresponding skills that workers bring to the job, according to a new survey commissioned by the Computing Technology Industry Association (CompTIA).

New Computer Attacks Compromise ‘Secure’ Contents Of Memory Systems

A team of academic, industry and independent researchers has demonstrated a new class of computer attacks that compromise the contents of "secure" memory systems, particularly in laptops.

Report: Underground Cyber Economy Growth To Increase

According to research from Trend Micro's TrendLabs, hackers are intensifying their attacks on legitimate Web sites. The number of compromised Web sites are slowly outnumbering malicious ones created specifically by cyber criminals.

Report: Hacker Attacks Against Healthcare Organizations Up 85 Percent

SecureWorks has seen an 85 percent increase in the number of attempted attacks directed toward its healthcare clients by Internet hackers. Attempted attacks have increased from an average of 11,146 per healthcare client per day in the first half of 2007 to an average of 20,630 per healthcare client per day in the last half of 2007 through January.

Making IT Your Business

Sometimes it seems as if everything is about security these days. Homeland security, physical security, digital security— there’s constantly a new security issue that needs attention.

Security Software Industry Takes Steps To Form Anti-Malware Testing Standards Organization

More than 40 security software technologists and anti-malware testers from around the world recently met in Bilbao, Spain to formalize the charter of the Anti-Malware Testing Standards Organization, or AMTSO.



Computer Security Group Releases Top 10 Cyber Menaces For 2008

The SANS Institute recently worked with 12 cyber security experts and released a list of the attacks most likely to cause substantial damage during 2008.

To IT and Beyond

When many industry observers talk about how IT is changing security, the discussion typically reverts to the concept of hanging 30-year-old panel technology onto 10-year-old Ethernet backbones.

Leaving a Legacy

The security industry is clearly ready for IP video surveillance. Network cameras have been around for more than a decade, and they can now be found everywhere. Furthermore, the latest megapixel cameras offer image quality that is not available with standard analog cameras. Network bandwidth is already faster today than it was just a few years ago. Processing speeds on PCs continue to get faster while hard drives and other storage options continue to get bigger— all with the cost of computers, generally, decreasing.

Report: Number Of Legitimate Web Sites Compromised By Hackers Skyrockets

Websense recently released a new report that reveals that -- for the first time -- the number of legitimate Web sites compromised by attackers has surpassed those purposefully created by attackers.

Organizations Using SAML 2.0 For Digital Identity Management

Liberty Alliance, the global identity consortium working to build a more trusted Internet for consumers, governments and businesses worldwide, recently released highlights of SAML 2.0-based digital identity management applications that are delivering real world value to users and organizations around the globe.

Ethical Hacker Training Focus Of Institute

In response to a growing need to combat illegal hacking, Halock Security Labs announces the opening of the Institute 4 Ethical Hacking (I4EH).

FERC Approves New Reliability Standards For Cyber Security

The Federal Energy Regulatory Commission (FERC) recently approved eight new mandatory critical infrastructure protection (CIP) reliability standards to protect the nation’s bulk power system against potential disruptions from cyber security breaches.

DHS Assistant Secretary Garcia Honored With Cybercrime Fighter Award

McAfee Inc. recently presented the McAfee Cybercrime Fighter Award to Gregory T. Garcia, Assistant Secretary for Cyber Security and Communications at the Department of Homeland Security.

Report: Botnet-Infected Computers To Increase Sharply In 2008

The latest Internet Security Outlook Report issued recently by CA Inc. forewarns that online gamers, social networks and high-profile events like the U.S. presidential election and the Beijing Olympics are among the top potential targets for online attacks in 2008.

United Kingdom Banks Choose IBM Intrusion Protection Technology

IBM recently announced that the Bank of London and The Middle East plc have selected intrusion prevention technology from IBM’s Internet Security Systems (ISS) division to help reinforce its existing security controls and further protect its customer and corporate data.

Engineer Developing Cyber Technology To Find Online Criminals

Yong Guan had scribbled 12 arrows across his office whiteboard, each black line going from one little box he had drawn to another little box. He had written five long formulas up there, too. And that was bad news for cyber criminals.

Where Security Fits In

Deemed the rum capital of the world and the birthplace of salsa music, Puerto Rico has reason to celebrate.

Featured

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.