Cybersecurity
Getting on the Path
Shortest Path Bridging can enhance network performance and efficiency Darren Giacomini, BCDVideo As the world of surveillance evolves, the introduction of multi-sensor and megapixel cameras presents a dynamic shift in industry accepted standards. For years, we have known the limitations of pan-tilt-zoom (PTZ) cameras, often finding them looking in one direction, only to miss critical…
Keep Reading »How Hackers Attack Physical Access Control Systems
As physical access control system (PACS) technologies continue to advance, so do attackers. While card cloning can be effective, entry isn’t always gained with this method alone. Attackers are beginning to move beyond the card to the technology that supports it. At ISC West on April 6 from 12:30-1:30 p.m., Valerie Thomas, Executive Security Consultant…
Keep Reading »Can Your Security System Be Used Against You?
As of 2015, nearly 300 million IP cameras have been installed around the world. Many of these cameras have been installed with default usernames and passwords and can be accessed from anywhere in the world. For years, the question has been: How secure is the video that a system produces? But, that question is changing.…
Keep Reading »5 Questions That Cybercriminals Don’t Want You to Ask
All leadership in business has a fiduciary responsibility to protect their company, its shareholders, employees and customers. Part of this responsibility includes detecting cyber-risks and mitigating those risks. To protect your organization, you must take a proactive and comprehensive approach to this quickly increasing risk. At ISC West, a panel discussion led by PSA’s Cybersecurity…
Keep Reading »Security Monitoring Trends to Watch in 2017
As a company that integrates with a wide variety of security monitoring solutions—traditional physical security devices to business risk systems—SureView Systems obtains a unique perspective of the trends in the security monitoring arena. Looking ahead in 2017, here are five security monitoring trends we foresee. VMS Move to the Cloud Each of the major video…
Keep Reading »Talking Digital Certificates with IdenTrust’s Debra Spitler
When she was a college student at Arizona State University earning her B.S. in Marketing, Deb Spitler had a chance as part of her scholarship funded by Honeywell Home and Building Control to get a free lunch with Honeywell execs. “What college student turns down a free lunch?” jokes Spitler. That free lunch turned into…
Keep Reading »Making Sense of Where Physical Security and Cybersecurity Meet
When stepping back and taking a broad view of the security market, I find one of the greatest opportunities in our space is to simply translate technology to nontechnical groups, or to translate real pain points to entrepreneurial solutions crafters. One such case in point is the connectivity between physical and cybersecurity. Even the most…
Keep Reading »Encryption Technology Provides Strong Network Defense
It is said that when Julius Caesar sent messages to his close acquaintances, he didn’t trust the messengers. To ensure privacy, he encrypted the message by replacing every A with a D, every B with an E, and so on through the alphabet and only someone who knew the “shift by 3” rule could decipher…
Keep Reading »What a DDoS Attack on Spotify Can Teach Us About Cybersecurity Hardening
Last Friday my Spotify stopped working. If you’re like me, the workday goes by a little easier with some headphones in, listening to Drake or Sturgill or Taylor Swift—whatever gets you ready for your weekend—but on this Friday my Spotify wasn’t working. It wasn’t until earlier this week that we learned that the reason why…
Keep Reading »Recommendations for Initiating an Enterprise Cybersecurity Solution
SIA Cybersecurity Advisory Board today released, “Recommendations for Initiating an Enterprise Cybersecurity Solution,” a brief listing of executive level recommendations to serve as a starting point for developing a comprehensive cyber-risk strategy. (Read the document online here.) The Security Industry Association (SIA) published the recommendations as part of its efforts to raise awareness of cybersecurity…
Keep Reading »