Network / IP security - Expert commentary
There’s a new security paradigm emerging across malls, server farms, smart office buildings, and warehouses, and its advantage over the status quo are so broad they are impossible to ignore. Instead of a lecture, let’s start with a short narrative scenario to illustrate my point. Darryl's work Darryl works as a security guard at the Eastwood Mall. Like any typical evening, tonight’s shift begins at 9:30 PM, as the stores close and the crowds thin. His first task: Ensure that...
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber, and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers RFID readers very much belong to the ecosystem wherein per...
You’re no psychic. You probably don’t have the power of clairvoyance. But guess what? When it comes to your security, none of that matters. You can still create future-proof security by properly equipping yourself. Here’s how. Understanding access control Security is changing faster than ever before. With new threats inside the workplace and smaller security teams taking on more tasks, IT and security personnel must automate their processes using new technology. One difficu...
Hybrid cloud computing enables organizations to segregate their resources and workloads on-premise, in a private cloud, or in a public cloud. But despite its many benefits, the hybrid environment also creates security concerns. AlgoSec’s co-founder and CTO, Prof. Avishai Wool shares his expert insights on some of these concerns and offers best practices to boost hybrid cloud security. Hybrid cloud computing Hybrid cloud computing combines on-premises infrastructure, private cloud servic...
At the start of the millennium, GRC was still very much in its infancy. Fast forward to 2022 and it is no longer seen as a siloed process. Now it is an organization-wide concern that permeates every decision from C-suite to the shop floor. And its evolution shows no sign of slowing down as modern solutions are changing the way that GRC processes are delivered and embedded into day-to-day operations within organizations. So, what does the future look like? In an era where risk is accelerating, w...
If defense is the best form of attack, then in security, planned preventative maintenance (PPM) is the best way to protect your business from harm. Also known as PPM, the service ensures that your security efforts are up-to-date and effective. In the latest how-to guide, discover the benefits of planned preventative maintenance and learn how to add PPM to your building. What is Planned Preventative Maintenance? You have installed all of the necessary security measures for your business, now wh...
Although the wider adoption of 5G, together with faster connection speeds and improved bandwidth, opens up new prospects for telecom service providers, it also poses new risks in terms of network security. This article explains how telcos can make their newly-established 5G networks as well as telecom software solutions more impenetrable and secure. Implement robust device authentication protocols 5G is set to spur a wide-scale adoption of connected devices in the business and consumer sphere...
Although inflated fuel prices have somewhat settled since the summer, recent changes in legislation mean construction sites are particularly vulnerable to attempted fuel thefts. Read on to find out what’s changed, and what’s proving effective in mitigating the threat. What are the changes? As of April, this year red diesel can no longer be used in a range of vehicles, including those in construction. That means fuel bowsers are now filled with the same white diesel available to m...
Nowadays the Internet of Things has become an integral part of business around the world. The enhanced functionality made possible by the Internet of Things (IoT) and associated technologies are responsible for many of the major changes seen across society today. Video surveillance Video surveillance is one area that experiences substantial evolution driven by IoT technology. The intelligent monitors and sensors of the IoT combined with emerging high-speed network solutions promise to improve...
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal...
Enable third-party application system quickly to incorporate the visual data, as part of their solutions. Each and every user has a unique set of platforms that they need to efficiently run their business. In the security and surveillance field, increasing interest in visual sensor networks drives the development of multi-camera applications in private and public areas. Thus, middleware is needed to facilitate video data sharing connections between software platforms. It works like video plumbi...
It’s clear that despite recent layoffs in the tech industry and general unease about the economy, there are still significant gaps in the number of jobs available and the amount of workers available to fill them. According to the Labor Department, there are 5.5 million more job openings than workers available. The physical security industry is not immune to these shortages. Last fall, Allied Universal reported being unable to fill thousands of open roles nationally while other smaller se...
Identity management is an important element of both data security and physical security in an organization. But all ID management solutions are not the same—especially when it comes to security. There are no uniform security standards for the industry, and many off-the-shelf systems fall short when it comes to data protection. To protect people, property, and data, make sure you select a system that maximizes security at every stage. What is identity management? Identity management&mdas...
Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early color cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books....
For the past few years, security professionals have had to change the way that they go about protecting their organizations. From challenging old assumptions around access control through to implementing more access management and authentication policies, security has been at the heart of how companies have responded to the pandemic. The journey to more modern security processes that could support more flexible working was a rapid one. Remote work programs have bedded in, based on how IT secur...
Nowadays to save costs by making full use of old devices while upgrading the old security projects, many integrators or installers prefer to use video management software to manage multiple brands of video devices (such as IP cameras, and NVR), instead of only one single brand. So that they could have more flexible choices to earn profits while saving costs. Multi-brands video device management On other hand, with market segmentation and specialization, instead of managing the video by themsel...
The General Data Protection Regulation, or GDPR as it is more commonly known, is a privacy and data protection law within the European Union (EU) and the European Economic Area (EEA). Despite opting to leave the European Union, the United Kingdom (UK) also uses the UK General Data Protection Regulation, which is currently identical. For businesses, the legislation throws up a number of potential challenges related to how data is obtained, handled, and kept secure. Companies are obligated to com...
The banking market continues to evolve through the growing use of digital and mobile devices, as more branch operations aim to enhance convenience and service for the customer. These advancements also create more significant opportunities for fraud and loss. Together, these two trends come full circle: Increasingly sophisticated fraud techniques require organizations to pursue new approaches to preventing and detecting such activities. Digital transformation But before we lead down that path,...
One of the biggest security trends in the last two years has been the adoption of cloud-based services, spearheaded mainly by an increasing number of video surveillance-as-a-service (VSaaS) offerings. VSaaS market value According to MarketsandMarkets Research, the global VSaaS market value is expected to reach $6.2 billion by 2026. This growth is propelled by demand for remote access video services, less local hardware to maintain, new internet-enabled devices, and a lower total cost of owners...
In the UK there is a new data reform act working its way through the legislative process. As the law changes, the market changes – so this year will see many companies trying to read the tea leaves and adapt their offerings to take advantage of the emerging changes. The security marketplace is, apparently, constrained by the need for great privacy – it appears to be a zero-sum game – you can have privacy, or you can have security, you can’t have both. In the second half...
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally...
Organizations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend: More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organizations looking to drive higher...
Integrators need to be well versed in Total Cost of Ownership (TCO), when discussing video surveillance options with their customers. Business leaders are looking for the best, most economical technology that will address their security needs, and they also want to avoid being blind-sided by unplanned technology operations and service costs. While most folks understand that the initial cost of a video surveillance system is not the same as the total cost of ownership, many might be surprised to...
Back in 1890, Samuel Warren and Louis Brandeis published a ground-breaking article in the Harvard Law review called ‘The Right to Privacy’. To this day, it is regarded as one of the most influential essays in the history of American law and is widely regarded as the first publication in the United States of America to advocate a right to privacy, articulating that right primarily as a ‘right to be let alone’. In this essay, the authors questioned whether the arrival of p...
Many people, quite correctly, point to Salesforce.com—which launched in February of 2000—as the first example of cloud computing. In the years following, the term ‘cloud’ became so popular and was applied to so many products and service offerings, that it became almost meaningless. The result was cloud confusion in the business world and in the media. In one stark example from 2008, Oracle CEO Larry Ellison described news stories about cloud as, ‘complete gibberis...
We must leverage existing technologies like social media monitoring, gunshot and weapons detection, and real-time watchlist alerting. We owe it to our children. The recent news of the Dallas elementary school shooting absolutely gutted me. It’s a tragic and incomprehensible loss of life. A question I hear being asked again and again – could technology have made a difference? From my experience, modern technologies can help schools mitigate some of the damage and provide an early w...
Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning...
The world around us is full of technological innovation. Smart locks are commonplace in our homes and control access to buildings, but when it comes to industrial locking and access control for equipment cabinetry, options can seem limited. Equally, there’s not enough accessible information to act as a guide. The development of new technologies and cabinet capabilities feels as though it is being held back. But that doesn’t have to be the case. Common problems are seen across the l...
Trevor Dearing, the EMEA Director of Critical Infrastructure Solutions at Illumio, said “It is encouraging to see NIST releasing updated guidance acknowledging the increase in cyber-attacks targeting the supply chain and the consequent necessity to bolster the supply chain’s cyber security. We can no longer turn a blind eye to the exponential increase in attacks on the IT systems of manufacturers, logistics companies and organizations, which ultimately target the operational part of...
Today, RFID readers can be found in numerous devices requiring user authentication, authorization and access control, from doors to multi-function printers to point of sale terminals to computers and more. RFID is a simple, secure and convenient access control solution for end users and original equipment manufacturers. RFID readers/writers come with a broad range of form factors, capabilities and configurations. Choosing the right RFID reader When choosing a reader to embed into a system or d...