The Convergence of Physical & Logical Access

For many security professionals, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. While external threats are very real, working to confront internal vulnerabilities can prevent incidents from happening in the first place.…

Read More

Security Considerations for Code Signing

Recent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital…

Read More

A Guide to Connected Lighting for IP Video Surveillance

Connectivity is the heartbeat of smart technology. Connectivity between devices improves the quality of decision making from each device, the level of service that each device can provide, and magnifies the value of the overall system. A truly smart device can make relevant decisions, whether that decision is a recommendation on Netflix or Spotify, automatic windscreen wipers that operate when rain is detected or smart heating that turns on 30 minutes before we arrive home from work. To be smart a device has to be connected to other sensors, whether…

Read More

Building a Future-Proof Data Processing Solution with Intelligent IoT Gateways

To date, most discussions about the Industrial Internet of Things (IoT) have been about connecting new devices and rapidly bringing them online. In this white paper we look at the implications of bringing such a large number of devices online, namely, the need for efficient methods to collect information from these devices, and discuss how to handle the large amount of data collected from these devices. Industrial IoT solutions are judged on their ability to adapt to various data acquisition needs and how they can transform the data collected from…

Read More