Increase In Attacks On GPON Routers

logo-eSentire

eSentire Threat Intelligence has observed an increase in exploitation attempts targeting consumer grade network devices manufactured by Dasan and D-Link. Customers are advised to review the below details and apply mitigation actions if applicable. Successful exploitation of vulnerable devices can result in remote code execution and ongoing communication between the threat actor and infected devices.
What we’re doing about it.

Read More ›

OnSSI’s National Accounts Program Continues To Provide Partners With Support And Rewarding Incentives

OnSSI Logo

OnSSI announced an enhanced partner initiative for their National Accounts Program that will deliver benefits and incentives to valued channel partners. The company also recently announced the appointment of David Barber as the new National Account Manager, who together with this program, will support OnSSI’s partners. OnSSI’s enhanced program rewards reseller partners, like Convergint Technologies. Partners enrolled in the company’s program realize exceptional profit margins, and benefit from a strong product offering, comprehensive technical and sales support, and free licenses for completion of Ocularis training.

Read More ›

Dortronics Custom Fabricated Door Control Solutions Save The Day… Again.

Dortronics-custom fabrication

When an end-user or installer needs a custom fabricated access or door control solution, they call Dortronics Systems, Inc. With all product and design done on site at their Sag Harbor, NY headquarters, Dortronics has carved a unique niche for themselves in the access and door control category by providing customers with fast turnaround times and competitive pricing for customized products. One recent request Dortronics received included detailed specifications for a uniquely shaped push-button switch for use outdoors.

Read More ›

Trust Automation To Provide Cybersecurity Solutions For Legacy Industrial Control Systems

Trust_PressReleaseGraphic_noLogo

Trust Automation has announced it will offer a novel new cybersecurity solution for industrial control systems (ICS). Working through the United States Department of Homeland Security’s Science and Technology Directorate, Trust has obtained an exclusive license to the Autonomic Intelligent Cyber Sensor (AICS) technology developed by Idaho National Laboratories. AICS brings autonomous, real-time cybersecurity measures to the legacy ICS networks that still control much of the United States’ critical energy, water and transportation infrastructure.

Read More ›

Sonitrol Of Lexington And Bates Security Partner With 3xLOGIC On Video Surveillance Project

Frederick-Douglass-HS_1

3xLOGIC announced that Frederick Douglass High School (FDHS) has deployed a highly-successful video surveillance installation that helps ensure two points of alarm verification to sharply reduce false alarms. In the summer of 2017, Sonitrol of Lexington and Bates Security completed one of the companies’ most innovative installations. The project includes verified audio detection, verified video, and an advanced access control system. FDHS, located in Lexington, KY, comprises 350,000+ sq. ft. with over 90 staff and hundreds of students.

Read More ›

Pelco Enhances VMS UX With Two-Camera Immersive Surveillance

Pelco-logo

Pelco Enhances Video Management System User Experience with Two-Camera Immersive Surveillance and a Camera for Eye-level Viewing of Crowded Locations. Pelco by Schneider Electric made two announcements that improve the user experience for video surveillance operators by enhancing visibility of events and enabling faster response. Pelco’s VideoXpert VMS, version 2.5 is packed with numerous new capabilities including enhanced “Panomersive” immersive context viewing when using Pelco’s Optera camera with Pelco Camera-Link technology and a Pelco “Enhanced” series PTZ camera.

Read More ›

Capticast Enhances School Safety With Interactive Video Solution

Capticast SVT

Capticast SVT, the first solution enabling security video clips to be manipulated for closer examination, annotated and shared to users’ mobile devices, is now available for use in school settings for rapid response to emergency situations. The software integrates with existing video management systems, runs on any current PC, utilizes a 30” or larger touchscreen for interactive display, and includes secure live chat for real-time communication during incidents.

Read More ›

Lanner Introduces V6S, The Next-Generation Rugged Vehicle Surveillance NVR

Lanner V6S

Lanner Electronics launched V6S, next-generation rugged, fanless vehicle surveillance NVR. V6S is designed for public transit video surveillance, recording and analytics. V6S, being the robust vehicle surveillance NVR, can operate under wide temperature range (-20~60° C), indicating its excellent reliability in harsh environment. V6S is powered by the 7th Generation 14 nm Intel® Core i7-7600U SoC (formerly Kaby Lake), offering power-efficient performance and accelerated graphics performance for vehicle computing needs.

Read More ›

CyberInt & Check Point Software Technologies Research Leads To Arrest Of Cyber Criminal in Brazil

CyberInt's logo

Israeli cybersecurity managed detection and response services company CyberInt, in cooperation with Check Point Software Technologies, a leading provider of cyber-security solutions globally, led Brazilian authorities to cyber-criminal Douglas Arrial, who had created a DIY phishing kit he was selling on the Dark Web. CyberInt delivers end-to-end cybersecurity managed detection, investigation and response services for digital businesses.

Read More ›

CyberGym Opens First U.S. Cybersecurity Training Arena

cg-logo

Cybergym announced the opening of its first U.S. cyber training arena as the latest among its global network of facilities where organizations can test and qualify their cybersecurity technologies and policies – focusing on their people, using an emulation of their business systems and real attacks and attackers. CyberGym NYC will feature human-centered training and qualification programs based on models of the latest cyber attacks against financial, insurance, critical infrastructure, utility and government organizations.

Read More ›