Vehicle security

How Terror Attacks Have Driven Demand For A Higher Quality Of Security Training In 2018

  The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV. Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are si...

Trillium Joins Volkswagen Collaboration Space To Develop Vehicle Cybersecurity Solutions

Trillium Secure, Inc. has announced that it has been selected by Volkswagen Data:Lab Munich to participate in the Startup Collaboration Space, a program designed to join emerging companies with VW Group researchers in developing AI solutions for Volkswagen and the greater automotive industry. The Collaboration Space is entering a 2nd cycle of 14 weeks duration. Future Car Cybersecurity “With cyber carjackings quickly becoming a real threat, vehicular cybersecurity is no longer theoretic...

Trillium’s European Operations And Development Center Offer AI-Enabled Vehicle Cybersecurity

Trillium Secure, Inc., a developer of automotive cybersecurity technology, has launched its European Operations & Development Center in Brno, Czech Republic. With the new facility joining US and Asian centers to provide global coverage, Trillium is now capable of providing real-time global protection for the millions of commercial, public and private vehicles to be serviced by its SecureIoT C-SaaS platform. Trillium develops and deploys security patches and counter measures in real time as...

Secutech 2018 To Focus On IoT And Intelligent Analytics Powered Cybersecurity

Secutech 2018, an exhibition for the security industry, is scheduled to be held form 25 to 27 April 2018 at Taipei Nangang Exhibition Center in Taiwan. The fair is expected to welcome more than 400 exhibitors from 15 countries and regions (2017: 372 exhibitors from 13 countries and regions), and will this year correspond with the industry’s evolutionary shifts in buying habits. Toward Cross-Industry Cooperation The emergence of IoT, AI and big data has reshaped the traditional security i...

2017 Security Trends: Lone Wolf Terror Encourages Vehicle Access Control System Installations

With the changing “lone wolf” style of terrorism, there will be a trend toward many more installations of vehicle access control systems and smaller numbers of units. Where a university, military base or airport might have 20-plus systems scattered among its grounds, there will be a growing number of smaller applications needing one, two or three systems. These will include customers such as primary and secondary education facilities; pedestrian locations such as shopping malls, co...

How TerrorMate Smartphone App Can Help During Terrorist Attacks And Mass Shooting Events

Information can be a scarce commodity in the midst of terrorism or a mass shooting incident. Information can also save lives during the first critical moments of such events. The general public can now download a free smartphone app that provides instantaneous real-time information as a terrorism or mass shooting event is unfolding. TerrorMate Crawler Software Called TerrorMate, the app began development in 2013, in the wake of several terrorist attacks in France. People in the affected areas...

Round Table Discussions

Should Marketers Seek To Leverage Violent Incidents?

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate...

What role do / should consultants play in the security technology buying decision?

There's no doubt that the security technology buying decision is a complex one. There are several factors to consider, and no one application will have the same exact needs as another.  This is generally where security consultants come in - to help out with the security buying process and help the end-user decide on the best technology to suit their specific needs. But more specifically, what is their exact role in the security technology buying decision? Let's take a l...