IT Security


Report: Nearly One-Third Of Federal Agencies Experience Daily Cybersecurity Incident

CDW Government Inc. recently released its 2009 Federal Cybersecurity Report, which found that across federal civilian and Department of Defense agencies, the number and severity of cybersecurity incidents has stayed the same or increased in the last year, with nearly one-third of Federal agencies experiencing a cybersecurity incident daily.

SCM Microsystems, LEGIC Identsystems To Create USB Tokens For Converged Physical, Logical Access

SCM Microsystems Inc., a provider of solutions for secure access, secure identity and secure exchange, and LEGIC Identsystems, a manufacturer of contactless smart card technology for personal identification, announced recently that they have formed a strategic partnership to create new products that support integrated physical and logical access.

Conquering The Risks

Corporate security has evolved over the years to recognize that physical security and information security are linked, and both need to be considered if a corporation is to succeed. However, while physical security management has evolved to embrace proactive risk management, information risk management remains oddly reactive. Only a comprehensive, proactive and appropriate information risk management plan will help keep the company secure and in turn provide other benefits.

Survey: Only 22 Percent Of Americans Fully Trust Government Agencies To Keep Personal Information Secure, Private

Only 22 percent of Americans fully trust government agencies to keep personal information secure and private, and the proportion is only slightly better (29 percent) with regard to trust in data protection by financial institutions such as banks, according to research conducted in September by Unisys Corp.

Big Business

Behind all the glamour and glitz, casinos are a lot like other businesses, yet they face a number of unique challenges. Casinos are required to adhere to numerous regulations and must secure their assets without causing inconvenience to customers. Casinos must protect against physical heists, but just as important, if not more so, casinos must protect their networks. Although it may not play as well on the big screen, a network breach could cost millions of dollars.

Report: Worms Jump Back Onto Scene, But Rogue Security Software Still Top Threat

Microsoft Corp. recently released the seventh volume of the Microsoft Security Intelligence Report (SIRv7), which indicates that worm infections in the enterprise rose by nearly 100 percent during the first half of 2009 over the preceding six months.

Federal Information Security Spending Will Continue To Grow, According To Forecast

INPUT recently announced the release of its report: Defining the Federal Information Security Mission: 2009-2014 Forecast, which indicates that federal spending is on the rise to counter the growing threat of cyber attacks on federal computer networks and the national infrastructure.

Extending Trust And Security

Today, most organization officials understand they can use their IP network to connect physical security devices together. In some cases, the capital and operational cost savings from using a single communications infrastructure is enough to motivate them. But for others, further justification and additional benefits may be needed to drive convergence between the physical and the cyber worlds.



campus security, school security, mobile security apps, best security apps for iphone, 10 best security apps for apple iphone, best security software for iphone, mobile security apps, best mobile security apps

10 Best Security Apps for Your iPhone

Apple's App Store currently holds about 85,000 applications for you to download to your iPhone or iPod Touch. Of course, about 84,900 of those programs consist of free and 99-cent games that your seven-year-old would probably find more compelling than you do. So we've scoured reviews, App Store search sites, and recommendation directories to compile this concise list of some of the best security apps currently available.

Department Of State Uses RFID Asset Tracking Solution

The Department of State is tagging 10,000 mission critical IT assets with passive RFID to save money, increase security and reduce administrative burden.

Safe Storage

There are typically two different approaches to storing data in an IP video system: using a centralized architecture with a master database located in the central control room or head office and using a distributed architecture that spreads the data around the security management system, keeping it close to where it is produced or needed.

Study: Discrepancy Between Disaster Preparedness Perception, Reality In SMBs

Symantec Corp. recently announced the findings of its 2009 SMB Disaster Preparedness Survey, reflecting the attitudes and practices of small and mid-sized businesses and customers toward technology disaster preparedness.

Single Sign-On Solution Helps Simplify Access To Records For Healthcare Organization

Sentillion recently announced that IASIS Healthcare, a owner and operator of acute care hospitals, has implemented its enterprise single sign-on (SSO) solution to provide caregivers with improved access to the health system’s electronic health record (EHR) system.

Poll: Security, Data Privacy Top Concerns Of Cloud Computing For Businesses

According to an online poll recently conducted by Unisys Corp., security and data privacy concerns remain the most significant impediment to the adoption of cloud computing among enterprise users.

Thinking Beyond the Product

Technology plays a dichotomous role in the security of an organization's information assets. While it enables us to protect assets in ways we never imagined, it also can enable the very threats that leave those assets vulnerable.

IT Speak

The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.

Verizon Business Enhances Network Security For Nikon

Nikon Corp. one of Japan’s leading manufacturers of optical imaging and processing equipment, has selected Verizon Business to provide new monitoring and security measures to protect Nikon’s global network infrastructure.

Survey: State Of Economy Leading To Increased Data Loss For Companies

In its sixth annual study of outbound e-mail and data loss prevention issues, Proofpoint, Inc. found that U.S. companies are increasingly concerned about a growing number of data leaks caused by employee misuse of e-mail, blogs, social networks, multimedia channels and even text messages.

Lockheed Martin Develops Mission Maker Cyber Security Solutions for Warfighters

Military operations threatened by persistent cyber attacks will benefit from mission assurance and resilience through cyber security solutions being developed by Lockheed Martin.

There's More the Paramount Than Pictures

Paramount Pictures has released many great movies, but the studio is not as bestowing when it comes to privacy and security.

Featured

  • Mall of America Deploys AI-Powered Analytics to Enhance Parking Intelligence

    Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. Read Now

  • Security Industry Association Launches New “askSIA” AI Tool

    The Security Industry Association (SIA) has unveiled a brand-new SIA member benefit – askSIA, a conversational AI agent designed to help users get the most out of their SIA membership, easily access SIA resources and find the latest information on SIA’s training and courses, reports and publications, events, certification offerings and more. SIA members can easily find askSIA by visiting the SIA homepage or looking for the askSIA icon in the top left of webpages. Read Now

    • Industry Events
  • Industry Embraces Mobile Access, Biometrics and AI

    A combination of evolving workplace dynamics, technology innovation and new user expectations is changing how people enter and interact with physical spaces. Access control is at the heart of these changes. Combined with biometrics and AI, mobile access control has become increasingly crucial for deploying entry solutions that are seamless, secure and adaptive to user needs. Read Now

  • Sustainable Video Solution Delivered for Landmark City of London Office Development

    An advanced, end-to-end video solution from IDIS, with a focus on reducing waste and costs, has helped a major office development in the City of London align its security with sustainability objectives. Read Now

  • DHS to End ‘Shoes-Off’ Travel Policy

    Homeland Security Secretary Kristi Noem announced a new policy today which will allow passengers traveling through domestic airports to keep their shoes on while passing through security screening at TSA checkpoints. Read Now

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.