IT Security


Time to Take Advantage

Time to Take Advantage

For every organization, one of the first steps in providing safety and security is knowing at all times who is in the building. This is true for protecting people, property, or assets, and whether the building is a business, school, hospital or any other location.

Utah System of Higher Education Requests $2 Million for Security

Utah System of Higher Education Requests $2 Million for Security

Higher education leaders are asking the state for more money to help protect universities from IT security threats.

Denmark Outlines Security Funding after Terror Attacks

Denmark Outlines Security Funding after Terror Attacks

The government is also looking to prevent young people from becoming radicalized.

On a Clear Path

Today, there are countless manufacturers that claim to have a clear migration path toward an open architecture platform; however, there is simply no clear path that applies to all applications.

Columnist Says Those with Footage Have the Power

Columnist Says Those with Footage Have the Power

In the aftermath of the Ray Rice Scandal, it comes down to those with the camera footage.

Security Holes Found in some DLP Products

Security Holes Found in some DLP Products

Two researchers planned to reveal their findings at Black Hat USA.

Application Single Sign-on – Benefits and Considerations

Application Single Sign-on – Benefits and Considerations

Simplify the process of accessing multiple resources for productivity and collaboration to a "sign and done" experience.

Adding a Razberi to the Mix

Adding a Razberi to the Mix

Throughout Mexico, residents trust Presta Prenda de Banco Azteca for short-term, secured loans on jewelry, electronics and other valuables. Much like the pawn shop business model in the United States, Presta Prenda customers obtain immediate cash with various repayment options.



Building a Secure Cloud Environment A secure IT strategy often emerges as a key concern

Building a Secure Cloud Environment

When properly constructed, a cloud infrastructure can offer greater security than a legacy system; however, when poorly constructed, a cloud-based infrastructure introduces risk across the enterprise.

On The Fast Track

On the Fast Track

Cloud computing has kicked off the next big wave in business computing. It offers many benefits including business agility, security, scalability and reduced administration, resulting in a lower total cost of ownership (TCO) for any size and type of company.

Air RAID

Redundant Array of Independent Disks (RAID) is a method for configuring multiple disks or hard drives in a single array. While there are many levels of RAID, focusing on RAID 5 for video surveillance is key.

On the Cutting Edge

Staying on top of a rapidly evolving technology, such as video surveillance, can be challenging.

Training Next-Generation Cyber Warriors with Advanced Cyber Ranges

Online Exclusive: Training Next-Generation Cyber Warriors with Advanced Cyber Ranges

Organizations worldwide face a dangerous shortage of cyber warriors who possess the skills required to defend against cyber terrorism. A pragmatic and sustainable new approach is urgently needed to prepare cyber warriors to defend critical infrastructures.

hosted video can be lucrative

Hosted Video Can Be Lucrative

If you’re limiting your business to selling surveillance technology as a capital expense, you’re leaving a lot of money on the table.

Cybersecurity Defensive Stance Protects Small Business Computers

Cybersecurity Defensive Stance Protects Small Business Computers

Cybercriminals are taking a toll on small businesses. Revealed here are some of cybercriminals' most popular tactics and how small businesses can counter-act them.

Evolving Video - Upgrades to new versions of open platform software help keep the safest campus in England on track

Evolving Video

The University of East Anglia (UEA) was an early adopter of IP video surveillance in 2005. Milestone partner, Check Your Security (CYS), brought together a number of standalone CCTV systems into one IP-based monitoring system that is proving it can grow with the university.

trapping wild hogs - state harnesses power by using cellular network

Trapping Wild Hogs

Helping the state of Tennessee with a solar-powered, IP video-based solution to catch wild hogs, ICRealtime has installed an autonomous remedy by harnessing the power of Verizon’s nationwide cellular network.

Internet Explorer Browser Security Tips

Internet Explorer Browser Security Tips

Don't become the next Internet victim! From lurking spyware to sophisticated hackers, you need to build a line of defense to help ensure safe Internet browsing. Consider the following tips to establish your safe browsing plan with Internet Explorer.

Distributed Storage Done Right

Scalable system architectures have been the source of many debates within the security industry.

Comtrol Releases RocketLinx PoE Switch for Security Applications

Comtrol Corporation, a manufacturer of industrial device communication products, has released the RocketLinx ES7106-VB industrial Power over Ethernet (PoE) switch.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.