Cyber Security

Elite Interactive Remote Guarding – Stops 96% of Crimes Without Law Enforcement Involvement

Elite Interactive Solutions has compiled three years of data spanning from 2020 to 2022 that details criminal activity and outcomes at three of the company’s customer locations. The data confirms that Elite has been successful in preventing criminal behavior in 96% of non-violent incidents when trespassers were detected on customers’ properties without the need for police intervention. In over 1,400 documented security related events in this study, Elite’s Digital Guards™ solution resulted in one of three positive outcomes: the criminal behavior stopped or the police detained or arrested the subject(s) – with zero false alarms generated to law enforcement during the three-year survey time frame.

Albuquerque Police Department Enhances Public Safety with Data-Driven Intelligence

In a testament to the positive impact of unifying security systems, Genetec shared the experience of the Albuquerque Police Department (APD). APD has chosen Genetec™ Security Center, Genetec Citigraf™, and Genetec Clearance™ to enhance public safety in the most populated city in New Mexico. The open, scalable Security Center platform enabled the city to combine all their video and public safety technologies into a single solution.

Genetec Alerts Organizations to Risks of Legacy Access Control Systems in Light of Rising Cyberattacks  

With the ever-increasing rise in cybercrime, Genetec is cautioning organizations of all sizes to be vigilant about the cybersecurity risk posed by legacy access control systems. Vulnerabilities in legacy access control systems can introduce cybersecurity weaknesses that may put an entire organization at risk. Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers, or workstations connected to the network.

Genetec Guides Utility Companies on Security System Support for NERC CIP Compliance

Genetec has published a guide for utility companies on how to select a security system that supports compliance with the Critical Infrastructure Protection plan (CIP) of the North American Electric Reliability Corporation (NERC). The 12 published NERC standards are aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America. A subset of the full guidance follows.

UK Police Force Leverages Location Intelligence from Precisely to Keep World Leaders Safe at Global Summit

Precisely announced that Devon and Cornwall Police leveraged its GIS software to enhance safety measures during the 2021 G7 Summit – the annual gathering of policy leaders from seven of the world’s major democracies. The local police force combined MapInfo Pro with third-party 3D visualizations to create a digital twin that enabled precise contingency planning – based on a model that had an accuracy of up to five millimeters.

Revelstoke Teams Up with BreachRx – Offering Users Automated Incident Response and Compliance Solutions

Revelstoke has prtnered with BreachRx to unify automated incident response and compliance capabilities with the Revelstoke next-generation enterprise Security Orchestration, Automation, and Response (SOAR) platform.  BreachRx has created the security industry’s first incident reporting and response automation solution. It is designed to help people find answers to security and regulatory compliance questions in real-time and at the height of a crisis. Similarly, Revelstoke has developed a next-level-SOAR solution that allows Security Operations Centers (SOCs) to sift through incoming data and identify the most dangerous cyber threats. The two solutions together give organizations an off-the-shelf solution that holistically addresses problems like no other product currently on the market.

Interface Systems Shares Best Practices with Retailers for Cybersecurity Month

As retailers integrate their digital and physical shopping experiences to future-proof their business models, it’s never been more important to be aware of the cybersecurity vulnerabilities that can be created by digital transformation. As cybersecurity awareness month becomes a focus of discussion in October, Interface Systems shares best practices on how to prevent retail cyber-attacks and mitigate fraud. Retail chains face a variety of security challenges, from connected POS (Point of sale) systems and devices to online ordering and delivery applications. Retailers’ data lakes, which combine their customers’ data with credit card information, make them particularly attractive targets for cybercriminals.

i-PRO Shares IoT Pillars of Cybersecurity for Cybersecurity Awareness Month

i-PRO to join with the U.S. Department of Homeland Security Cyber and Infrastructure Security Agency (DHS CISA) to raise awareness around cybersecurity for NCSAM (National Cyber Security Awareness Month). The world has seen significant increases in cyber-attacks aimed at critical infrastructure and security products in the last few years, with IIoT (Industrial Internet of Things) devices such as security cameras, becoming prime targets for hackers. According to a Kaspersky analysis of its telemetry from honeypots shared with Threatpost, in first half of 2021 alone, there were over 1.5 billion IoT breaches.

TDSi Adds Cyber Essentials Plus Certification to Further Boost its Cybersecurity Credentials

TDSi announced it has achieved Cyber Essentials Plus Certification following its initial Cyber Essentials certification back in June. Cyber Essentials Plus further demonstrates the company’s dedication to fully securing its operations, as well as its products and services, with a hands-on technical verification by an independent assessor, following an earlier self-assessment. Backed by the UK Government through the National Cyber Security Centre (NCSC), Cyber Essentials helps any size or type of organisation to protect itself, its customers and partners, and anyone else that relies on it from a range of common and potentially dangerous cyber-attacks.

Genetec Announces Major New Release of Security Center

Genetec announced a major new release of its flagship unified security platform, Security Center. With version 5.11, customers will have access to every module of Security Center, including Omnicast™ (video monitoring), Synergis™ (access control), AutoVu™ (automatic license plate recognition), Sipelia™ (intercom) and intrusion monitoring, right out-of-the-box. Beyond simplifying the path to unification, Security Center 5.11 includes a wide spectrum of powerful features as standard, including KiwiVision™ analytics

New Research from Utimaco Shows how Trust Works in a Digital World

Circles of Trust’, a new whitepaper from cybersecurity experts Utimaco, finds significant differences across countries, regions and generations when it comes to trusting the public and private sector with their digital safety. Utimaco has released a new whitepaper, ‘Circles of Trust: How the UK Public Perceives Digital Risk’ that uncovers how internet users in the […]

NanoLock Combats Cyber Chaos with Commercial Availability of Device-Level Industrial Cybersecurity Suite

NanoLock Security announces their full suite of bespoke cybersecurity solutions for the industrial and manufacturing market. The first company to announce device-level protection solutions specifically for legacy and new industrial machinery and smart factory production lines, NanoLock’s industrial protection solutions has been in trials with customers in Europe and is now available worldwide. In the United States, NanoLock’s industrial solutions are available through World Wide Technology (WWT), a major American professional services integrator.

MSA Security Launches Firearms Detection Canine Services

MSA Security announced a newly executed exclusive agreement with Shallow Creek Kennels to train MSA canines in firearms detection. This capability enhances the company’s existing threat detection offerings, creating a sophisticated new solution to address the escalating active shooter and criminal threat. MSA Security has been the industry’s leading Explosive Detection Canine (EDC) provider for over three decades with more than 800 DHS SAFETY Act designated teams deployed around the world. MSA EDC teams are capable of detecting a full range of commercial and homemade explosives, including black powder used in firearms.

Viakoo Unveils Enhanced Video Action Platform To Eliminate Missing Video at ISC West 2022

Viakoo is demonstrating its newly enhanced Video Action Platform that provides automated service assurance and cyber hygiene solutions to eliminate both longstanding and new challenges, including the problem of missing video evidence here at ISC West 2022 in booth 30087. The Viakoo Action Platform automatically verifies the performance and integrity of physical security systems – video surveillance, access control and related IoT devices – while delivering automated proof of compliance.

Dedrone and Carahsoft Partner to Bring AI/ML-Powered Airspace Security Solutions to Public Sector

Dedrone and Carahsoft Technology announced a strategic partnership to bring the anti-drone security solution to the Public Sector. As part of the agreement, Carahsoft will serve as Dedrone’s Master Government Aggregator®, making Dedrone’s smart airspace technology available through Carahsoft’s Illinois Learning Technology Purchase Program (ILTPP) and NJSBA Technology & Cybersecurity contract, as well as through Carahsoft’s network of reseller partners. Dedrone is deployed by U.S. Government agencies both within the continental U.S. and abroad to detect, identify, track, analyze and mitigate small, unmanned aircraft systems (sUAS).

Blueshift Cybersecurity Launches Comprehensive Managed Cybersecurity Platform

Blueshift Cybersecurity™ announces the global launch of Blueshift XDR the first cybersecurity management service that provides efficient and cost-effective cybersecurity protection for SMB businesses and the defense industry. Blueshift XDR™ combines industry-unique detection and prevention capabilities with a dedicated 24/7/365 US-based security-operations center to deliver effective, comprehensive and affordable cybersecurity protection to organizations of all sizes.

HID Global Offers its European Customers PKIaaS with Full Local Data Residency, Failover and Redundancy

Increasingly European enterprises must comply with regulations for establishing local residency of data and security infrastructure. HID Global now delivers its Public Key Infrastructure (PKI) as a Service (PKIaaS) with high availability and redundancy via a hybrid of data centers and cloud regions operated within the EU, enabling what it expects to be a growing number of European customers to simplify regulatory compliance.

Major Airports Turn to HID Global to Help Navigate Bumpy Travel Industry Recovery

As airports navigate an uneven return to pre-pandemic operations, many of the largest are using HID SAFE for Aviation as a unified physical identity and access management solution for defending against security and safety threats while consolidating, automating, and simplifying associated administrative and regulatory processes.

WatchGuard Cloud Adds New Endpoint Security Modules Further Strengthening Its Unified Security Platform

WatchGuard Technologies announced four new endpoint security modules in WatchGuard Cloud including WatchGuard Patch Management, WatchGuard Full Encryption, WatchGuard Advanced Reporting Tool (ART), and WatchGuard Data Control. This integration further strengthens WatchGuard’s Unified Security Platform™ and gives solution providers and customers centralized access to all WatchGuard endpoint solutions, with the ability to layer on additional security services such as network security, MFA, and secure Wi-Fi.

March Networks Achieves Certification for Cybersecure Business Practices

March Networks announce that it has achieved CyberSecure Canada certification, developed by the Canadian Centre for Cyber Security, Canada’s authority on cybersecurity. In order to become certified, an organization must put into place the requirements of the 13 security control areas developed by the Centre. Examples of these control areas include developing an incident response plan, implementing strong user authentication, providing employee training, implementing data recovery methods, and ensuring encryption across all data.