Privacy by Design methodologies provide an essential road map for forward-thinking, ethical developers to build those principles into the products they create. This involves proactively embedding privacy into the design and operation of IT systems, networked infrastructure, and business practices from the first line of code to the third-party vendors selected for partnership and integration. Genetec solutions are designed to help customers enhance cyber hygiene and respect privacy.
The Covid19 pandemic has produced an increase in the way security guard services operate with global inquiries rising rapidly as sites go into states of lockdown. Commercial IP and vital global infrastructures have seen a spike in use for competent professional security guarding hire that is able to minimize incursions onto sites while minimizing criminal activity. This drive is seen as good for business but has created a sub-set of problems, Mainly how we keep our manned guarding teams safe in such times of a pandemic.
Today, the market demand is strong for access control technology that employs mobile credentials managed and implemented via apps on personal smartphones, replacing the need for physical cards. Mobile credentialing has the potential to improve both security and convenience and is delivering enhanced protection in many ways. To date, however, mobile credentialing has not been able to find the balance between security and convenience.
Viakoo demonstrated innovative new offerings for physical security service assurance and sustainable cyber hygiene at GSX 2018. Viakoo is showcased two of their newest software solutions for the intersection of physical and cyber security: the new Camera Firmware Update Manager (CFUM), and the new IoT Tracker. Viakoo helps to automate the process of assuring that video surveillance is working as it should, providing an auditable record.
I have mentioned in this space before that I have the opportunity to travel a lot and that this has afforded me an excellent view into how airports are run. But my perspective is not limited to their inner workings. In fact, from my office here in Montreal, I can see the O6L and 24R runways at the P.E. Trudeau airport. This means that, every once in a while, I get to watch these feats of engineering and technology move through the air. And I am reminded of the incredible precision required to get so many planes safely through take-off and landing every day. At the same time, I also know that any disruption on the airfield —no matter how small— can delay flights or threaten security.
We know by now that the possibilities and opportunities presented by artificial intelligence (AI) to both the security industry and beyond are nearly limitless; as one of the most exciting and fastest growing branches of computer science, AI has demonstrated its ability to provide exceptional efficiency and task adaptability to a wide range of markets. In areas that are seeing rapid growth and the need for increased productivity, users demand solutions that simplify and enhance processes in a cost-effective manner.
We are fortunate to have Steve Reinharz join Security.World as a monthly columnist to share his insights and knowledge on physical security, artificial intelligence, and autonomous security. We asked Steve to share with us his background and expertise as an “AI” system matter expert. We hope you learn as much from Steve as we do.
What would you think if there were a cure for cancer, but the medical profession didn’t provide it? How about a plant that solves world starvation, but farmers couldn’t be bothered to grow it? Or if there were an Unbreakable cipher for perfect digital security, but the cryptography field doesn’t use it? Not only is that Unbreakable cipher real – it’s been around for over a hundred years! It was invented by Gilbert Vernam, a Bell Labs Engineer (not a cryptographer, mind you) in 1917 and is the only Unbreakable cryptographic cipher. All it took for anyone to send an Unbreakable message was to pre-share a one-time-only encryption key, which is known as a One-Time Pad or OTP. So if this perfect Unbreakable cipher exists, why doesn’t cryptography use it?
Temperatures here in Montreal have once again settled into the low negative 30s. Rather than complain, we embrace the cold and head outside. And this year, it’s with the added benefit of getting ready for the 2018 Winter Olympics in Pyeongchang, South Korea. To be fair, we are not all Olympic athletes able to compete in bobsledding, skeleton, or moguls. But we do feel like winter sports are an essential part of our everyday lives. We feel personally connected with the event, and, for me, this extends to issues of security. A few years ago, I had the opportunity to talk with Juliette Kayyem, a professor who teaches on homeland security at the John F. Kennedy School of Government at Harvard University. At the time, she said something that has stayed with me ever since: “If you want to have a perfectly safe Super Bowl, don’t have a Super Bowl.”
The Security Industry Association (SIA) led a coalition of industry groups urging negotiators to accept a Senate-backed provision for tax reform to expand deductions under Section 179 of the IRS tax code, which empowers businesses to deduct the full purchase price of qualifying equipment and/or software purchased or financed during the tax year. The revised tax code permanently expands eligibility for deductions to fire protection, alarm, and security systems, along with other equipment, placed in service in 2018 and beyond.
Robotic Assistance Devices (RAD) has executed a strategic agreement to supply its intelligent robotic solutions through Allied Universal Security Services. Allied Universal provides security service, systems, and solutions with over 150,000 security professionals to serve, secure, and care for people and businesses nationwide. RAD’s S5 Security Robots add significant benefits to the Allied Universal product and services portfolio by delivering a cost-effective solution to augment traditional guarding services. The robots will be leveraged to help Allied Universal customers supplement existing security professionals and improve safety, increase situational awareness and drive efficiency across the enterprise.
We recently discussed how casinos and gaming facilities are realizing the benefits of IP video to secure their facilities and meet gaming compliance regulations. Yet, there’s another reason why the migration from analog to IP video is taking place at such a rapid pace. As gaming facilities continue transitioning to full IP video systems to capitalize on the high-quality imaging they provide, they are also realizing other benefits that include the ability to centralize and manage surveillance operations more efficiently.
Siklu announced that its MultiHaul™ auto-aligned radios, were selected by the City of Wichita to provide the wireless connectivity for 72 fixed bullet, dome and PTZ cameras from Axis Communication which make up the surveillance network deployed in the city’s Old Town district.
NodeSource, the Node.js® company, and Sqreen, a SaaS security monitoring and protection solution, announced the results of a joint developer survey. The survey of nearly 300 CTOs, CIOs and developers revealed that, while the developer community fully understands the risks of operating in the open internet and the complexities of building reliable, secure code, developers are not taking advantage of tools that can identify and mitigate threats.
One of the major challenges that comes with cloud computing, especially for security professionals, is protecting sensitive data that’s stored in the cloud. Consideration also has to be given to various regulatory compliance requirements that have to be met. The most common way to secure this data is via encryption, but the question arises as to who should be responsible for maintaining the encryption keys. With SaaS solutions, it can be difficult to separate encryption key management from the provider, so it’s up to each customer to explore available options. One of the main challenges is to implement encryption that doesn’t hamper user experience or performance. This, coupled with encryption key management, makes the situation very complex.
One major transformation in casino surveillance and security operations is the transition from analog video to digital recording and IP-cameras. The change is being brought about by several factors: some gaming commissions now insist on remote access to recorded or live video, which analog video cannot do; many manufacturers no longer make or sell VCRs; and analog systems have limitations on cable distances and distribution points, which limits their functionality.
On the Move Systems is pleased to announce that Robotic Assistance Devices (RAD), its wholly owned subsidiary, has deployed its first unmanned security guard robot at the headquarters of Romeo Power Technology in Vernon, Calif. The 113,000-square-foot facility will benefit from the addition of RAD robotic personnel and will augment the existing security, safety, and operational processes in place at the site.
Honeywell, a leader in products, software, and technologies for connected buildings and homes, announced Richard (Rich) Lattanzi as the president of Honeywell’s global security business and Dino Koutrouki as the president of Honeywell’s global fire business. In their new leadership roles, Lattanzi and Koutrouki will drive greater customer focus. Both will continue to report to Michael Flink, president of Honeywell Security and Fire.
Four leading security manufacturers have teamed up to provide safety and security solutions for the players, coaches, and fans at the 71st Annual Little League Baseball® World Series (LLBWS). For the first time, Milestone Systems is joining Axis Communications, Extreme Networks, and Lenel to provide video surveillance systems, access control, and network connectivity for the 10-day tournament. A fully integrated security system is in place as 16 Little League Baseball teams and hundreds of thousands of fans from around the globe come together Aug. 17-27 in South Williamsport. A priority of Little League Baseball officials is promoting a fun, exciting experience, while also providing the highest level of security.
HBO’s computer network struck by ransomware: hackers leak scripts from popular shows like “Game of Thrones” and demand up to $15 million in ransom. HBO reportedly responded with a $250,000 offer. Timothy Crosby, Senior Security Consultant for Spohn Security Solutions, says this newest hack evidences the growing risk that companies face with cyber intrusions. “No company —large or small— is immune to being a target; the HBO saga makes it even more apparent that cyber security teams must remain vigilant to detect and prevent attacks before they happen,” stated Crosby.