Reducing Downtime for the Surveillance System

It seems that everywhere you look, there is a surveillance camera looking back at you. Video surveillance has become an absolute necessity for every type of organization – whether it be retail, hospitality, gaming, education, infrastructure or government – or any other type of business. When a crime is committed or a tragedy occurs, there is now an expectation that it will have been recorded on video, and this usually proves to be true. As a society, we have come to depend on this video to provide us with the…

Read More

The Influence of Lens Selection

Image resolution versus field of view One important, but often neglected consideration in video surveillance systems design is the trade-off between image resolution and field of view. With any given combination of camera and lens the native resolution from the camera is spread over the entire field of view of the lens, determining pixel density and image resolution. The wider the resolution is spread, the lower the pixel density, the lower the image resolution or image detail. The images below, taken with the same camera from the same distance away,…

Read More

Cybersecurity Trends 2018

How can businesses better protect themselves from the increasing volume and complexity of cyberattacks while preparing for the opportunities of automation and digitalization of industries – this is the burning question of the day and our goal is to raise awareness to help them address it. This article focuses where we see the most significant threats and opportunities emerging, and highlights the implications of the increasingly connected world, how global regulation is responding, the need to inject trust into cybersecurity, ways to protect ourselves from intelligent cyberattacks, and what we…

Read More

VPNFilter Malware: What is known so far

Recently, a malware known as VPNFilter was discovered infecting various types of routers. VPNFilter is a modular, multi-stage malware that works mainly on home or small office routers. Since 2016, when the malware was initially introduced, it has compromised more than 500,000 home and small office routers and NAS boxes. Infection of such a large scale could allow the malware’s creators to utilize the affected nodes as a private VPN, making the trace back to the origin of a targeted attack very difficult. Though the infection vector is not yet…

Read More