Cyber Security

Genetec Helps Organizations Monitor Occupancy Levels and Ensure Compliance with Physical Distancing Regulations

As many retailers, restaurants, and public venues get set to start reopening in the coming days and weeks, the need to enforce physical distancing measures is critical. To help these organizations monitor their occupancy levels and ensure compliance with regulations, Genetec Inc. announced a new Occupancy Management Package. The Package includes analytics and reporting tools that enable organizations to tap into their security system to count the number of people in a store.

Sonitrol Announces Newest Data and Network Protection Solution

Sonitrol announces the launch of their newest data and network protection product solution, Sonitrol Network Protection powered by Cisco Meraki. With this release, Sonitrol now offers a fifth service to their customers?joining verified intrusion, access control, video surveillance, fire and network protection?giving the company a more robust ability to verify intrusion and security threats than just physical assets. Sonitrol Network Protection keeps your network, devices and data safe from daily cyber-threats and attacks.

Top Global Bank Selects Verint to Provide Enterprise Solution for Fraud and Security Investigations

Verint announced one of the world?s largest banking organizations selected Verint as its new standard solution for enterprise fraud and security investigations. The selection resulted after a thorough analysis of technologies that best fit the bank?s fraud investigation, cybersecurity and deployment management requirements. The solution combines the powerful network video recorder with robust software for review and enterprise management.

Netscout?s Cyber Threat Horizon Offers Free Real-Time Visibility and Analysis of DDOS Attacks

Netscout Systems announced the public availability of Cyber Threat Horizon, a free threat intelligence portal that offers network and security operators greater visibility into DDoS attacks in real-time. Cyber Threat Horizon collects, analyzes, prioritizes, and disseminates data on past and emerging DDoS threats across the internet. This macro view gives users contextual awareness of the DDoS attacks that could impact their organization.

Mellanox to Acquire World Leading Network Intelligence Technology Developer Titan IC to Strengthen Leadership in Security and Data Analytics

Mellanox Technologies announced that it has reached a definitive agreement to acquire privately-held Titan IC Systems Limited, the leading developer of network intelligence and security technology to accelerate search and big data analytics across a broad range of applications in data centers worldwide. The acquisition will further strengthen Mellanox?s network intelligence capabilities.

Keyfactor Announces IoT Security Integrations Supporting Crypto-Agility at Scale

Keyfactor announced at the RSA Conference its partnership and technology integration with SSL/TLS crypto-library provider wolfSSL. The integration provides greater security control to IoT (Internet of Things) device manufacturers at design and through a product?s lifetime. Recent research analyzed IoT device vulnerabilities, emphasizing inherent design constraints and limited entropy as critical factors contributing to IoT device security risks.

Johnson Controls? C?CURE 9000 and Victor VMS Platforms First to Market with New UL-2610 Certification

Johnson Controls announced that its Tyco Software House C?CURE 9000 v2.8 and Tyco American Dynamics victor 5.4.1 are the first platforms to be officially certified as meeting new third-party security standards from UL for on-premise commercial security systems. UL- 2610, which provides standards for Commercial Premises Security Alarm Units and Systems, updates the requirements for this technology to include cybersecurity provisions and cloud functionality.

Fujitsu and Upstream Security Partner for Vehicle Security

Fujitsu Limited and Upstream Security Ltd., cutting-edge security solution provider for connected vehicles, today announced a partnership for vehicle cybersecurity. The companies will collaborate in the development of security operations solutions for connected vehicles. As more vehicles are connected to the network, they are increasingly prone to the growing risk of cyber-attacks.

Hanwha?s Top 5 Video Surveillance Trends for 2020

Hanwha Techwin announced its top five key trend predictions for the security industry in 2020. They include: AI End-to-End Security Solutions, Cybersecurity, Cloud-based Data Insights, Privacy Protection and Vertical Specialized Solutions. In 2020, Hanwha Techwin will introduce cloud-based solutions beginning with the Device Health Monitoring Cloud which will monitor and manage video surveillance devices in real-time. The company will also introduce Retail Insight Cloud designed to facilitate store management.

Amazon?s Ring Issues New Passwords ? Expert Commentary on Staying Safe

The Amazon company Ring just issued a password reset after user logins were found online. Here is expert commentary from Peter Galvin, Chief Strategy Officer of nCipher Security. nCipher Security also has a list of safety tips for holiday shopping based on their recent survey of consumers in the U.S. and UK about their security perceptions related to connected devices and new technology. This survey gauged their overall levels of trust in various industries.

New Genetec Research Shows Almost 4 in 10 Security Cameras Can Be at Risk of Cyber-attack Due to Outdated Firmware

Outdated camera firmware, and failing to change default passwords present some of the biggest weaknesses in cybersecurity defence. As the number of interconnected security devices keeps on growing, keeping pace with the latest updates can be tricky and very time-consuming. According to new research* conducted by Genetec as many as 68.4%?or almost 7 out of 10?cameras are currently running out of date firmware.

Keyfactor Brings Enhanced Security for Cloud, DevOps and IoT

Keyfactor announced the latest update to its award-winning PKI as-a-service and certificate lifecycle automation solution, Keyfactor Command. The offering supports information security, IT and DevOps teams juggling security priorities, regulatory demands and digital transformation. In a recent survey, 44 percent of security and IT professionals indicated that lack of skills and expertise is the greatest challenge they face in managing their organization?s PKI.

Siemplify Integrates MITRE ATT&CK Framework into SecOps Platform

Siemplify announced its integration to the MITRE ATT&CK framework, enabling security operations teams to incorporate rich data and actionable intelligence into their incident response workflows. A globally accessible knowledge base of adversary tactics and techniques based on real-world observations, MITRE ATT&CK is used as a foundation for the development of specific threat models and methodologies in the private sector, government and in the cybersecurity product and service community.

Cloud Security Spending in the US Expected to Reach $1.93 billion by 2021

According to PreciseSecurity.com, cloud security spending in the United States is expected to reach $1.93 billion by 2021. Back in 2016, the US region spent $675 million on cloud security solutions in total, meaning it will triple in the following years. In comparison with other regions, the United States also represents the leading cloud security spending region in the World, followed by the Asia Pacific with $638 million cloud security costs expected in 2021.

The New Security Landscape: Where Physical Security and Cybersecurity Converge

Nearly every industry has undergone some form of digital transformation, and security is no exception. More tech solutions hit the market every day and businesses are starting to see the importance of effectively combining their physical security and cybersecurity practices. The influx of IoT-enabled devices, coupled with an increase in cybercrime, has led businesses to take a hard look at preventative measures to protect their people, property and assets from threats.

Viakoo Salutes National Cybersecurity Awareness Month

Viakoo marks the end of National Cybersecurity Awareness Month with insights from three industries that are familiar with addressing cybersecurity challenges. Data centers have a unique position in today?s business landscape, enabling companies to quickly scale their computing and data processing resources. They also present a particularly attractive target for cybercriminals, because of the density of the valuable customer and business data they hold.

Infocyte Launches ?Response Ready? Partner Program and Incident Response Platform Extensions

Infocyte introduced their ?Response Ready? program for certified IR partners. These elite partners have deployed Infocyte into multiple customer environments during cybersecurity incident response operations and proven their ability to address and remediate active attacks. Additionally, Infocyte announced new platform Extensions enabling customers and partners to develop, deploy, and share custom collection and action capabilities built on top of Infocyte?s award-winning platform.

TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader

In September 2019, Proofpoint researchers observed a prolific threat actor, TA505, sending email campaigns that attempt to deliver and install Get2, a new downloader. Get2 was in turn observed downloading FlawedGrace, FlawedAmmyy, Snatch, and SDBbot (a new RAT) as secondary payloads. In this post, Proofpoint will detail the tactics, techniques, and procedures associated with these latest campaigns and provide a detailed analysis of Get2 downloader and SDBbot RAT.

National Whistleblower Center Announces Research Partnership with Bradley University?s Center for Cybersecurity

The National Whistleblower Center has established a research partnership with the Center for Cybersecurity at Bradley University. Through this partnership, an academic research working group has been created to facilitate and promote enhanced whistleblower anonymity. Dr. Jacob Young, who has studied whistleblowing systems since 2013, has agreed to serve as the Senior Advisor on Cybersecurity for the National Whistleblower Center. In this role, he will manage and coordinate a multidisciplinary research team.

Qognify Announces the Cyber Security Release of its Cayuga Video Management System

Qognify announced the latest release of its VMS Cayuga R14. In recent years, dealing with cybersecurity issues to safeguard video installations has become of utmost importance. One of the best ways to reduce network vulnerabilities associated with video surveillance systems is to make sure that the communication between the different components of the video solution is securely encrypted.