Cyber Security

MSA Security Launches Firearms Detection Canine Services

MSA Security announced a newly executed exclusive agreement with Shallow Creek Kennels to train MSA canines in firearms detection. This capability enhances the company’s existing threat detection offerings, creating a sophisticated new solution to address the escalating active shooter and criminal threat. MSA Security has been the industry’s leading Explosive Detection Canine (EDC) provider for over three decades with more than 800 DHS SAFETY Act designated teams deployed around the world. MSA EDC teams are capable of detecting a full range of commercial and homemade explosives, including black powder used in firearms.

Viakoo Unveils Enhanced Video Action Platform To Eliminate Missing Video at ISC West 2022

Viakoo is demonstrating its newly enhanced Video Action Platform that provides automated service assurance and cyber hygiene solutions to eliminate both longstanding and new challenges, including the problem of missing video evidence here at ISC West 2022 in booth 30087. The Viakoo Action Platform automatically verifies the performance and integrity of physical security systems – video surveillance, access control and related IoT devices – while delivering automated proof of compliance.

Dedrone and Carahsoft Partner to Bring AI/ML-Powered Airspace Security Solutions to Public Sector

Dedrone and Carahsoft Technology announced a strategic partnership to bring the anti-drone security solution to the Public Sector. As part of the agreement, Carahsoft will serve as Dedrone’s Master Government Aggregator®, making Dedrone’s smart airspace technology available through Carahsoft’s Illinois Learning Technology Purchase Program (ILTPP) and NJSBA Technology & Cybersecurity contract, as well as through Carahsoft’s network of reseller partners. Dedrone is deployed by U.S. Government agencies both within the continental U.S. and abroad to detect, identify, track, analyze and mitigate small, unmanned aircraft systems (sUAS).

Blueshift Cybersecurity Launches Comprehensive Managed Cybersecurity Platform

Blueshift Cybersecurity™ announces the global launch of Blueshift XDR the first cybersecurity management service that provides efficient and cost-effective cybersecurity protection for SMB businesses and the defense industry. Blueshift XDR™ combines industry-unique detection and prevention capabilities with a dedicated 24/7/365 US-based security-operations center to deliver effective, comprehensive and affordable cybersecurity protection to organizations of all sizes.

HID Global Offers its European Customers PKIaaS with Full Local Data Residency, Failover and Redundancy

Increasingly European enterprises must comply with regulations for establishing local residency of data and security infrastructure. HID Global now delivers its Public Key Infrastructure (PKI) as a Service (PKIaaS) with high availability and redundancy via a hybrid of data centers and cloud regions operated within the EU, enabling what it expects to be a growing number of European customers to simplify regulatory compliance.

Major Airports Turn to HID Global to Help Navigate Bumpy Travel Industry Recovery

As airports navigate an uneven return to pre-pandemic operations, many of the largest are using HID SAFE for Aviation as a unified physical identity and access management solution for defending against security and safety threats while consolidating, automating, and simplifying associated administrative and regulatory processes.

WatchGuard Cloud Adds New Endpoint Security Modules Further Strengthening Its Unified Security Platform

WatchGuard Technologies announced four new endpoint security modules in WatchGuard Cloud including WatchGuard Patch Management, WatchGuard Full Encryption, WatchGuard Advanced Reporting Tool (ART), and WatchGuard Data Control. This integration further strengthens WatchGuard’s Unified Security Platform™ and gives solution providers and customers centralized access to all WatchGuard endpoint solutions, with the ability to layer on additional security services such as network security, MFA, and secure Wi-Fi.

March Networks Achieves Certification for Cybersecure Business Practices

March Networks announce that it has achieved CyberSecure Canada certification, developed by the Canadian Centre for Cyber Security, Canada’s authority on cybersecurity. In order to become certified, an organization must put into place the requirements of the 13 security control areas developed by the Centre. Examples of these control areas include developing an incident response plan, implementing strong user authentication, providing employee training, implementing data recovery methods, and ensuring encryption across all data.

The Security of IoT Devices Relies on Secure Updates and Cyber Resiliency, says TCG

To increase the resiliency of IoT devices from cyber-attacks, IoT manufacturers need to have a security-first approach and combine the latest updates and techniques, Sunil Cheruvu, Co-Chair of Trusted Computing Group’s (TCG) Internet of Things Work Group, said today. Speaking at the IoT Device Security Conference, Cheruvu stressed the importance of preparing the best response to inevitable cyberattacks.

Genetec Shares its Top Physical Security Trends Predictions for 2022

Genetec shared its top predictions for the physical security industry in 2022. Within months of the pandemic, businesses were deploying different solutions to track occupancy in their buildings and control social distancing. Almost two years later, this trend is still growing because they’re seeing value from the data collected. Beyond safety objectives, organizations will embrace the use of spatial analytics data to reduce wait times, optimize staff scheduling, and enhance business operations.

Botnet Buster Finds IoT Command and Control Centers

Did you know that your home smart devices could be soldiers in a malicious robot army called a botnet? Smart devices range from refrigerators that let you peer inside them remotely to baby monitors that let you check on your baby from wherever you are in the house. To criminals, these, along with wireless printers, wearable health monitors, and countless other internet-connected household and office devices look like a vast army of docile robots waiting to do their dark bidding.

Healthcare OT Facilities Remain Exposed as Industry Experienced 68 Attempted Ransomware Attacks in Q3

Last month saw an alarming rise in cyber attacks against healthcare facilities. Ransomware attacks across the globe locked 68 care providers out of their respective networks during Q3 of this year alone, threatening patient safety and privacy. Experts fear that patients will suddenly be unable to receive critical care at a targeted facility without a holistic whole-facility cybersecurity approach.

Arcules Achieves SOC 2 Type II Compliance

Arcules announced that it has completed its System and Organization Controls (SOC) 2 Type II certification. The process affirms Arcules’ information security practices, policies, procedures, and operations meet the SOC 2 standards for security, availability, and confidentiality. SOC 2 is an auditing procedure that ensures service providers securely manage customer data. Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on trust principles.

Monitoring of Energy Networks: How to Make it Easy and Secure

Cloud and cyber security in critical energy applications – Digitalization and IoT is a clear trend within power plants and substations, just as it is in industrial automation. The Smart Grid is certainly a driving factor, but there are also other reasons for this change. Operators often find that only having data available in the control room is insufficient. Instead, they want to monitor transformers remotely, implement new maintenance concepts from anywhere, optimize utilization and commissioning, or retrieve environmental data online.

oneM2M Invites Contributions on Future Roadmap for IoT Systems

oneM2M is currently finalizing a set of specifications for Release 4 of the standard while conducting parallel work on features to include in Release 5. Some of the new features under discussion include the topics of AI for Internet of Things (IoT) systems, tools for data licensing and, controls to guarantee adherence to privacy regulation such as GDPR and PIPA (Korea). Participation in oneM2M’s technical standardization activities is open to organizations across the world.

DHS S&T Launches Series 3 of Virtual Whole-of-Government R&D Showcase

The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) launched the third installment of the Virtual Whole-of-Government R&D Showcase. This unique four-part series highlights how S&T and its partners across government are mobilizing research and development (R&D) teams to reduce risks from natural and human-induced disasters; accelerating breakthrough discoveries; and helping the nation prepare against future threats and unknowns.

Ontic Expands Investigations and Case Management

Ontic announced the expansion of its Protective Intelligence platform to fully integrate a new Investigations and Case Management offering. Purpose-built for corporate security and physical threat investigations teams, the new Ontic solution enables them to research, document, track, report and recommend preventive measures for cases in order to mitigate future incidents.

ComNet Launch Razberi Monitor Software for Cybersecurity

ComNet announced the launch of Razberi Monitor software. Razberi Monitor is the latest addition to the ComNet product portfolio and the first solution to be rolled out from the recently acquired Razberi brand. Razberi Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. It monitors and manages all the system components for both cybersecurity and system health, and can be deployed from the cloud or on-premise.

Genetec Warns Older Legacy Access Control Systems Cyber-attacks

“Legacy access control systems use outdated technology that leaves them vulnerable to cyber threats, and can cause damage beyond the door,” cautions Thibault Louvet, Director – Access Control Product Group at Genetec Inc. With the average cost of a data breach being US$3.9* million in damages, it’s never been more important for organizations to be educated on the risks associated with legacy systems and the advantages that a new cyber-secure access solution can offer.

Cybersecurity Experts Releases Cyber Defense Guide for CEOs

ProtectedBy.AI, has released Stay Cyber Safe: What Every CEO Should Know About Cybersecurity. The book is authored by leading cybersecurity experts, JT Kostman, Ph.D., and Brian Gallagher, who are the co-founders of ProtectedBy.AI. Stay Cyber Safe is available on Amazon and has already reached the No. 1 spot on Amazon’s Best-Selling Books list for Information Management during the first week of pre-lease sales. Due to its success Amazon has decided to release and ship early sales.