IT Security


HP Acquires ArcSight For $1.5 Billion

HP and ArcSight Inc. recently announced that they have signed a definitive agreement for HP to acquire ArcSight, a security and compliance management company, for $43.50 per share, or an enterprise value of $1.5 billion.

Study: Cybercriminals Creating 57,000 New Websites Per Week To Exploit High-Profile Brand Names

PandaLabs, Panda Security's anti-malware laboratory, has discovered that hackers are creating 57,000 new websites each week that exploit approximately 375 high-profile brand names worldwide at any time. These findings are based on a three-month long study conducted by PandaLabs of its global malware database. Notably, eBay and Western Union-related URLs comprise 44 percent of all malicious sites, with Visa, Amazon, Bank of America and PayPal also heavily targeted by cybercriminals.

NIST Releases Initial Set Of Smart Grid Cyber Security Guidelines

The National Institute of Standards and Technology (NIST) issued recently its first Guidelines for Smart Grid Cyber Security, which includes high-level security requirements, a framework for assessing risks, an evaluation of privacy issues at personal residences, and additional information for businesses and organizations to use as they craft strategies to protect the modernizing power grid from attacks, malicious code, cascading errors and other threats.

Study: Cybercrime Strikes More Than Two-Thirds Of Internet Users

The next time you surf the Internet, consider this: You might be just one click away from becoming the next cybercrime victim.

New Product Of The Year Award Winners Announced

Security Products magazine, the only integrated product magazine reaching the entire security market, announced the winners of its 2010 New Product of the Year Award at the publication’s premiere Virtual Event today.

Study: 25 Percent Of New Worms Designed To Spread Through USB Devices

PandaLabs, Panda Security's antimalware laboratory, has discovered that in 2010, 25 percent of new worms have been specifically designed to spread through USB storage devices connected to computers. These types of threats can copy themselves to any device capable of storing information such as cell phones, external hard drives, DVDs, flash memories and MP3/4 players.

Study: Mobile Application Security One Of Top Concerns For Organizations

According to a new study commissioned by Entrust Inc., many of today's mobile applications have limited functionality from a lack of overall security. And for mobile applications that feature transaction-based capabilities, the requirement for security is even greater, highlighting a key area of concern for deploying organizations.

Cameron Diaz Is Web’s Most Dangerous Celebrity Search

Cameron Diaz has replaced Jessica Biel as the most dangerous celebrity to search for on the Web, according to security company McAfee Inc. For the fourth year in a row, McAfee researched popular culture’s most famous people to reveal the riskiest celebrity athletes, musicians, politicians, comedians and Hollywood stars on the Web.



Intel To Acquire McAfee For $7.68 Billion

Intel Corp. has entered into a definitive agreement to acquire McAfee Inc., through the purchase of all of the company’s common stock at $48 per share in cash, for approximately $7.68 billion. Both boards of directors have unanimously approved the deal, which is expected to close after McAfee shareholder approval, regulatory clearances and other customary conditions specified in the agreement.

Brivo Earns TRUSTe's Stamp of Approval

The TRUSTe EU Safe Harbor Seal communicates that a website has committed to protecting the privacy of visitors through compliance with the EU-U.S. Safe Harbor Framework and participation in TRUSTe’s Watchdog Consumer Dispute Resolution service.

NIST Report: Securing Critical Computer Systems Starts At Beginning

Nothing beats the feeling of starting up a new computer -- be it a laptop, desktop or a major, custom-designed computing system. A new system is a blank slate with no worry of botnets, viruses or any other cybersecurity hazards. Not so, explains computer researcher Marianne Swanson at the National Institute of Standards and Technology (NIST), lead author of a draft report, Piloting Supply Chain Risk Management for Federal Information Systems. Information systems and components are under attack throughout the supply chain from the design phase -- including specification and acquisition of custom products -- through disposal.

IQinVision Centralizes Marketing under Nazarenus, Expands Sales

The addition of new distribution organizations and the augmentation of sales operations with four new personnel will help ensure the company is set up for continued rapid sales growth, the company said.

Pictured from left are Ken King, President of ‘The Strategy King’; Dr. Greg Winter, CVTC Superintendent; Haley Pitre, Executive Assistant, HSI Sensing; Ryan Posey, VP Operations, HSI Sensing; Angela Lewis, CVTC BIS Director; George Tiner, CVTC Assistant Superintendent; and Dick Lowe, CVTC Industrial Coordinator.

HSI Sensing Recognized with Partners for Progress Award

“Partnerships like this strengthen our communities and serve as the foundation for future growth and prosperity,” said CVTC’s Angie Lewis of HSI, an ISO 9001:2008-registered company that designs, develops, and makes reed switches, proximity sensors, and other sensing products.

Survey: Accessing Corporate Data On Vacation Has Serious Implications For IT Security

With bags packed, flights booked and foreign currency in their pockets the workforce might be jetting off but they’re definitely not leaving the daily grind behind. Instead these stressed out individuals, a whopping 95 percent of our sample, will be taking their mobiles and smartphones abroad with them with the expectation of working.

Research: Majority Of Business Leaders Underestimate Risk Of Advanced Cyberthreats

NetWitness Corp. recently announced the results of a research study by the Ponemon Institute on advanced threat prevalence, impact and preparedness. The study demonstrates that a vast majority of enterprises of all sizes regularly fall victim to advanced cyber threats, at the same time, more than half of these organizations recognize their defensive technologies, personnel and budget as "inadequate."

Microsoft, Other IT Companies Support Cybersecurity Legislation

The sponsors of comprehensive, bipartisan, risk-based cybersecurity legislation Wednesday thanked Microsoft Corp. and others for supporting the Protecting Cyberspace as a National Asset Act, S. 3480.

National Initiative For Cybersecurity Education Spreading Across Country

Cybersecurity training is spreading from high-tech and government offices into high schools, libraries and workplaces near you. Called the National Initiative for Cybersecurity Education (NICE) and coordinated by the National Institute of Standards and Technology (NIST) , the new interagency program aims to promote cybersecurity awareness and know-how across the country and among citizens of all ages.

Smart Business Communications

How secure is your business data network? It’s a question that can be tough to answer when new security risks seem to emerge on a daily basis. Broadband data and voice communications are the lifeblood of business, and without a network that functions optimally all the time, the productivity, profitability and even viability of businesses in many vertical sectors are at risk.

Research: Smart Grid Cybersecurity Market To Reach $3.7 Billion By 2015

As governments and utilities invest in smart grid deployments, the need for robust security measures has become increasingly apparent. Those requirements will drive major investments in smart grid cybersecurity over the next several years, according to a recent report from Pike Research.

House Leaders Announce Support For Cybersecurity Bill

Homeland Security and Governmental Affairs Committee Chairman Joe Lieberman, ID-Conn., Ranking Member Susan Collins, R-Me., and Senator Thomas Carper, D-Del., last week hailed the bipartisan support of prominent members of the House of Representatives for comprehensive cybersecurity legislation introduced last week by the three Senators.

Featured

  • Allegion, Comfort Technologies Implement Mobile Credentials at the Artisan Apartment Homes in Florida

    Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a leading provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Read Now

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.