securitylinkindia

CISO Benchmark Study: Anticipating the Unknowns

See no evil, block no evil Imagine if one could see deep into the future, and way back into the past – both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of the survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications and new data. The unknown is what keeps CISOs up at night. This report sheds light on what actions are reaping results in strengthening organizational cyber health. For example, when asked, only 35% confirm that it is easy to determine the scope of a compromise, contain it and remediate from exploits. It suggests that visibility into the unknown clearly is a key challenge. It means 65% of CISOs in the survey have room to improve. 46% said that they have tools in place that enable them to review and provide feedback regarding the capabilities of their security practices. While the good fight is far from over, it’s also far from being all bad news. At least some respondents in the survey seem to be feeling good about their jobs. When asked about cyber fatigue, only 30% of respondents claimed to suffer from cyber fatigue this year. While almost a third seems like a high number to be tapping the mat and raising the white flag, the drop from last year’s figure of 46% is moving in the right direction and this is worth the fight. State of the CISO For some time now, threat hunters have talked about knowing the unknowns. It’s time to expand that to the entire spectrum of cybersecurity – to users, apps, data and clouds. You can’t protect what you can’t see. You generally want to support the business, and not mire it down in bureaucracy. If you’re going to be a bit more open, how are you mitigating control? This is going to be different for everyone. CISOs must deal with that balance of organizational culture while combatting the most critical threats. Sometimes blocking everything and locking everything down doesn’t fit the culture of the enterprise. That might be right for a bank but not for a university. The CISO faces several challenges managing cyber-risk – whatever their organizational model: Breaches create adverse impacts to financial profitability, brand reputation, customer data security, customer satisfaction, and continuity of business. Losses can be substantial and non-recoverable, creating a higher risk score for the organization on insurability. Over the years, vendor point solutions looked promising; however, each generates their own set of alerts. Many point solutions competing on alerts makes it difficult to identify those threats posing the highest risk to the organization, and becomes a resource drain. IT is usually siloed across the organization, making inte gration of securing the network, the cloud, and employee endpoints highly complex. Aggressive tactics to hire security IT personnel are required, as the specialized pool of candidates cannot sustain the magnitude of the problem across global organizations. The talent shortage is, however, out of control and not solvable by trying to fill all jobs. New threats such as Emotet, Olympic Destroyer and others appear daily, even hourly, and are employing more stealth and sophisticated methods. Threat response as a category has to evolve and there is a need for tools to consolidate information and centralize remediation of infections and other incidents. Additional technologies and processes for the CISO to consider are: AI and ML, and used right are essential to triage the volume of work. The cost of a breach is falling – but don’t get too excited yet. There is head room to realize obvious benefits in process improvement e.g., training. There is more confidence in cloud-delivered security and in securing the cloud. 2019 findings The findings from the Benchmark Study revealed several areas that are critical to strengthening organization’s security posture. Set up for success? What does it mean to be a CISO day-by-day? What is their charter? The present survey revealed multiple areas that together determine a organization’s cyber health including being practical about risk, setting criteria for budgeting, collaborating across divisions, educating staff, conducting drills, knowing how to track outcomes to inform investments, and being strategic on vendor and solution implementation. Know your risk Risk management is hardly table stakes. Understanding the risks of cyberattacks and the compliance landscape that encompasses security breaches is paramount to understanding how to defend and prepare for the worst. When asked who were very knowledgeable about risk and compliance, only 80% of respondents were very knowledgeable. That leaves 20% of security professionals who could possibly use some of the discussed trainings. How to spend budget Almost half, or 47% are determining how to control security spending based on organizational security outcome objectives. Measuring outcomes against investments is the best data-driven approach. What’s more, 98% strongly or somewhat agree that their executive team has established clear metrics for assessing the effectiveness of their security program. 49% of respondents have metrics that are utilized by multiple areas of their companies to understand the risk- based decisions and improve processes to measure the security effectiveness throughout the organization. Back to the budget, and aside from outcome based measurement, there are some less healthy options. Controlling security spending on previous years’ budgets (46%) and percent of revenue respectively (42%) were both popular choices,…

Read More

LEGIC Orbit

LEGIC Orbit is the latest generation of a high-level key and authorization management solution that secures customer applications such as mobile ID and messaging from infrastructure components to back-end systems. It is the perfect choice for a secure creation, secure storage and secure distribution of cryptographic application keys. It can be used, wherever data integrity matters. In the need of a secure, convenient, instant and worldwide distribution of application keys, configuration data and much more, user-specific application keys can be generated, thanks to LEGIC Orbit, which are never visible to anybody, and can easily be distributed over the air. Secure key storage and flexible distribution Cryptographic keys are the central element for secure ID solutions and IoT projects and must be well protected. With LEGIC Orbit, the randomly generated application keys are always stored securely and are available at any time. LEGIC Orbit enables the distribution of cryptographic keys over the air to all the readers, so that they are ready for mobile ID and messaging applications. The LEGIC reader ICs contain a secure element to store the application keys. This is end-to-end security at its best. Full system control The new key and authorization management solution allows full control over all applications in a mobile environment. The users can just define the required security level of the system and use as many different keys as necessary, and then freely assign the right to configure readers to any trusted person on site. They benefit from a state-of-the-art security mechanism provided by LEGIC. This saves them valuable time to concentrate on their application design. How to use LEGIC Orbit To profit from the outstanding LEGIC Orbit advantages, the user only needs a LEGIC Connect account and compatible LEGIC reader ICs. LEGIC Orbit is already supported by these components.  

Read More

Vicon New V840D HD Micro Dome Camera

Vicon introduces the V840D Micro Dome series, its micro-sized cost-effective solution for unobstructive surveillance applications. Designed for security installations that require a small form factor vandal dome, it is available in 2MP and 4MP resolution with a 2.8mm fixed lens. These cameras, designed for indoor/ outdoor use, can be surface mounted on a wall or ceiling and provide 3-axis adjustment – a variety of mounting accessories are available for almost any mounting solution. The camera includes IR illuminators for stronger low light performance. These new micro dome cameras do it all to deliver a superior experience when a fixed lens solution is right for the application. Designed to be discreet and feature-rich, these small cameras deliver high performance now and will future-proof the system for real RoI over time. For applications with strong backlighting or reflections, wide dynamic range technology is available. In challenging low-light applications, this series offers best-inclass light sensitivity that captures details in very low-light.  

Read More

QNAP QTS 4.4.1 Beta

QNAP® has recently released the QTS 4.4.1 Beta. With a focus on high-efficiency backup and innovative hybrid cloud storage, QTS 4.4.1 includes HBS 3 with QuDedup technology, which de-duplicates backup data at the source and increases backup and recovery efficiency; Cache Mount enabling local caching for connected cloud storage for users to enjoy a near-LAN access speed to their cloud data. QNAP also released QuMagie – the AI-based photo organization application which provides users with the ultimate photo management and sharing solution. QNAP NAS will also support fibre channel SAN for easily adding to existing SAN environment as a budget-friendly storage and backup solution. “QTS 4.4.1 integrates Linux Kernel 4.14 LTS and supports next-generation hardware platforms for QNAP NAS to leverage the latest technologies. Following the trend of hybrid cloud solution deployment, QTS 4.4.1 optimizes backup efficiency and features innovative applications tailored for hybrid cloud environments, allowing business and home users to enjoy flexible storage allocation, convenient management and perfect backup and recovery solution. QNAP strives to integrate innovative technologies to provide the best NAS experience to our users,” Said Ken Cheah, Product Manager of QNAP.  

Read More

IDEAL Networks : PoE Pro

IDEAL Networks has launched a new hand-held tester hat eliminates guesswork when installing, maintaining and troubleshooting PoE devices and data cabling. PoE Pro measures and reports PoE Class, voltage/ voltage drop, atts and injector type, making it easy to see how much power is available. “The new PoE Pro eliminates trial and error when installing or troubleshooting PoE systems,” said Tim Widdershoven, Marketing Director from UK technology firm IDEAL Networks, “Installers can now accurately measure the maximum power available to PoE devices in any installation.” Power over Ethernet (PoE) is used to power VoIP phones, smart lighting systems, CCTV, digital signage, Wi-Fi access points, intercoms, sensors and much more. As PoE continues to grow, technicians need fast, accurate PoE validation to eliminate guesswork and get the job done faster. “Previously technicians had to understand all the various standards, device power outputs and cable lengths to be sure a device will operate successfully. There was a lot of guesswork involved,” Tim explained, “With the PoE Pro, users can see whether 75W of power is provided to a device that needs 75W of power, such as a remote point-of-sale kiosk or a digital flight status sign at an airport. The pass-fail indication provides peace of mind the PoE device will work first time every time.” If the PoE test fails at the device location, the technician can measure available power directly from the switch or injector to instantly determine whether the problem lies with the power supply or cabling. Instant, easy to read test results are shown on the large backlit screen, up to a maximum of 90W (PoE++). It displays the voltage, PoE Class from 0 to 8 and type, whether 802.3af, at or bt, regardless of cable length, cable quality or other factors. There’s no setup or complicated configuration, users can just connect the PoE Pro to the cable or PoE port to display the maximum power available. “It’s easy to define if there is a problem with the cable, switch or device, saving loads of time,” he confirmed, “Users can quickly rule out whether they are getting enough power from the switch, and they can see which pairs have power indicating if the power is coming from a mid-span injector or a PoE switch.” There is no need for separate testers as PoE Pro is both a data cable and PoE verifier with all the familiar cable testing features of the popular VDVII Pro from IDEAL Networks. With comprehensive details on wire-map faults such as opens, shorts, crossovers and split pairs, PoE Pro can identify wiring errors instantly. It utilises time domain reflectometry (TDR) to accurately measure cable length and provide distance to fault information. “Fault finding is fast with the PoE Pro helping to minimise disruption and potential damage to fixtures and fixings,” Tim continued. There is also ethernet speed detection (10/ 100/ 1000Mb/s) and it quickly determines which media service is running over the cable such as Ethernet, ISDN, PBX and PoE resulting in faster fault diagnosis. Furthermore, users can utilise the port blink feature to identify the switch port or the in-built analogue and digital tone generator with a compatible amplifier probe for quick cable tracing. “PoE Pro is a convenient tool for security, IT, communications, PoE lighting and building automation professionals,” he concluded, “Whatever the job, the integrated RJ11/ RJ12 (voice), RJ45 (data) and F-Type (video) connectors allow faster testing of most types of low-voltage cables. It’s the ideal way to validate PoE and deliver accurate proof of performance.  

Read More

Hikvision New Turbo HD X : Security Solutions

Hikvision has launched the latest generation Turbo HD series – Turbo HD X, which is a complete system to help stop intruders in real-time, avoiding damage and loss of property. From passive monitoring to active deterrence, in a wide variety of applications The Hikvision Turbo HD X series of cameras have a builtin detector that captures infrared light emitted by human bodies, distinguishing it from other visual ‘noise.’ Once the camera detects a potential intruder, its built-in siren flashes red and blue light and a loud sound with the aim of frightening the intruder away. The Turbo HD X series can support a broad range of perimeter protection and security system processes for in-process warning and evidence collection after an event. It enables transformation of the traditional monitoring and post-event investigation approach, and helps change perimeter protection from passive monitoring to active deterrence in order to protect people and assets. It can be used in warehouses, residences, jewellery stores and more. A complete end-to-end system More importantly, the Turbo HD X is a complete and unified system, featuring front-end devices linking to back-end devices and a remote application. As the front-end alarm sends a warning to potential intruders, the system also triggers an alarm at the back-end to notify security personnel. Users can also receive alarm information remotely via an application on their mobile devices. Even better false-alarm reduction Turbo HD X cameras can also be integrated with Hikvision’s cutting-edge AcuSense DVRs. The intelligent false-alarm reduction technology within these DVRs will disregard irrelevant movements picked up by the camera – such as rain, leaves and animals – and instead focus exclusively on human or vehicle movement. Together, this integrated solution dramatically reduces the number of false alarms and ensures security staff focus on actual targets for greater efficiency. Building on already impressive functionality All of this builds on the impressive functionality that has been delivered by Hikvision’s Turbo HD DVRs and cameras since their launch in 2013. In addition to impressive HD image clarity, the last six years of Turbo HD products have delivered a wealth of innovations to the market including super-efficient bandwidth, storage usage and ultra-lowlight video recording – all helping customers enhance their security and perimeter protection. Frank Zhang, President of the International Product and Solution Center at Hikvision said, “Once again, we are bringing fresh ideas and new possibilities to the industry. Usually, video surveillance records are only searched for evidence after someone has suffered the consequences of an intrusion. However, criminals may give up further actions if they believe their behaviour has been detected. By stopping intruders in their tracks, the Hikvision Turbo HD X can help our customers avoid costly damage and loss of property.”  

Read More

Allied Vision’s Manta Cameras are used in PCB Surface Defects Inspection along with AI Agorithm

Over the past five decades, the advantages of the Taiwan printed circuit board (PCB) industry lay in its complete and centralized supply chain, quality control, and the cross Strait relations. The industry has held 30% market share of the global PCB markets since 2010. Thanks to the rapid development of high-end mobile phones in recent years, the 2017 industrial value of overall PCB industrial supply chain at both sides of the Strait surpassed $30 billion, creating a historical level high. The PCB industry is one of the most competitive industries in Taiwan, while Automated Optical Inspection (AOI) equipment is vital to improving production capacity of PCBs and the yield rate of products. AOI equipment can be placed in the middle of production lines to inspect semifinished products without affecting production capacity. As a result, AOI equipment is an important investment in the PCB manufacturing process with a comparatively high proportion- about 15% of the total investment amount. Difficulties and challenges AOI is an automated visual inspection that scans the surface of a PCB to acquire a clear image. Then depending on computer image processing technology, AOI equipment can check if defects such as short circuits, excessive or insufficient copper, open circuits, nicks, burrs, copper slags, missing components, and deflections exist. As a variety of surface defects exist, the inspection is more difficult compared with that of general electronic components. Currently, AOI inspection is confronted with a phenomenon of overkill. Due to the extremely high yield rate requirement of PCBs, the design parameters of AOI equipment is very strict. As a result, overkill occurs in AOI due to the over sensitiveness of equipment. According to statistics, the overkill rate is as high as 70%, which means 70% of semi-finished goods are qualified. Due to a high overkill rate, a second manual screening must occur to differentiate between real defects and false-positives before they return to the product line. G4 Technology’s Artificial Intelligence (AI) Defect Inspection System G4 Technology Co., Ltd in Taiwan has been committed to providing imaging solutions for machine vision and AOI as well as services for enterprises’ successful application of machine vision technology. The company has strictly controlled quality in manufacturing not only to improve the yield rate of products and production efficiency, but also to effectively reduce inspection costs. Recently, G4 Technology launched their AI defect inspection system demo. This system can capture images using an Allied Vision Manta G-032C industrial camera, a Fuji film high resolution lens, and SUALAB’s SuaKIT AI visual inspection software with the latest deep learning algorithm to inspect, detect, mark, and classify PCB defects in real-time. The deep learning technology released by SUALAB utilizes an artificial neural network to analyze PCB images. Compared with traditional visual technology, this defect inspection system can analyze complex images, significantly improve image interpretation skill and accuracy of automatic visual inspection, and conduct automatic classification of defects. The required image data in the initial stage of deep learning algorithm varies with different complexity of images. Generally, 50 to 100 images are needed, which means this system can easily handle customer-specific defect standards. Manta Camera helps in PCB inspection accuracy and stability The Manta G-032C camera equipped in the G4 Technology AI defect inspection system, is a high-quality industrial camera with 656×492 resolution (0.3 megapixels). Its 80 frames per second is enough to meet normal demand. Generally, a model of corresponding neural network is established after 15 minutes. After which, 80 images per second can be collected and processed in real-time on a production line. “When we selected the Manta camera for this PCB inspection demo, we mainly considered the high-speed requirement of the environment for real-time inspection, which required us to transfer images quickly with comparatively small-sized images. This type of camera has a comparatively high frame rate to meet the requirement of inspection speed,” said Ken Chou, the General Manager of G4 Technology, “In addition, Allied Vision cameras are the best match with the AI inspection algorithm due to its German quality and stability. Actually, according to different applications, almost all Allied Vision camera series can be regarded as ideal choices for PCB inspection. For example, if customers have high requirement on inspected image quality, an Allied Vision high resolution camera series such as Prosilica GT can be utilized.” The Manta is Allied Vision’s most versatile GigE vision camera series. Numerous modular options, including angled head and board level versions, facilitate the camera integration in almost any application. The advanced feature set of the Manta, including multi-camera synchronization, user’s instruction and Ethernet trigger function, simplifies the setup of multi-camera applications and enables to reduce the overall cabling efforts and costs.    

Read More

Delta Barrier Stops Intruder at Naval Air Station – Corpus Christi

Recently a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate of the Naval Air Station – Corpus Christi. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed. “The charred SUV was seen in Navy photographs on top of the MP5000,” related Greg Hamm, Delta Vice President of Sales and Marketing, “One photo shows the front of the SUV suspended in the air. Parts of the vehicle are on the ground.” Delta’s totally self-contained MP5000 mobile deployable vehicle crash barriers carry a K8 rating (M40 ASTM rating), stopping 7.5 ton (6400 Kg) vehicles traveling 40mph (64kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away. Last year, six of the Associated Press (AP) top-10 football schools stayed one step ahead of terrorists and errant drivers on their campuses by identifying vulnerable areas and securing them within minutes with Delta MP5000 temporary, portable barriers. In many situations such as at the air base, the temporary barriers provide more flexibilities than a permanent solution. Delta always keeps an inventory of the MP5000s for purchase and quick delivery at their manufacturing facility in Palmdale, Calif. In many cases, they are needed for events that come up quickly such as politician or celebrity visits and other unexpected incidents.  

Read More

Waihi Beach Lifeguards Given Award Winning Security System

When lifeguard rescue gear had gone missing a few times, and five motors were stolen from another lifeguard club in the region, Waihi Beach Lifeguard Services knew it was time to step up its security. Hamilton-based global technology company Gallagher was happy to get involved, donating an award-winning security system to protect the club’s vital equipment and manage access to different parts of the clubrooms. Andrew Cochrane, Waihi Beach Lifeguard Services Asset Director has been with the club for 24 years. “We are a charity that relies on volunteer support, donations and fundraising efforts for all of our rescue equipment, vehicles and supplies, so any loss is hard to recover from,” said Andrew, “The equipment is not only worth a lot of money, it’s crucial to saving lives. Losing any of it hinders our ability to perform rescues and respond to other emergencies in the wider region.” Between Labour weekend and Easter the club provides volunteer weekend patrols from 10am-5pm. During the busy summer season from mid-December to the end of January regional lifeguards are there every day to keep beachgoers safe and respond to emergencies. The club also has a 24/7 emergency call out squad. Over 15,000 people pass through the building in a year, including school and community groups who use it as a venue. Lifeguards will now be issued with access wristbands to wear while they’re on patrol. Simply swiping the wristband at an access reader will unlock the door. When the day is done, the last one out can set the alarms with a simple exit button at the door. Gallagher’s Mobile Client gives club managers the flexibility to lock and unlock the doors from anywhere, and check in if an alarm is triggered. Steve Cooke, Gallagher Sales Manager, Central North Island said, “It was clear to see how Gallagher could help. Parts of the clubrooms need to be open to the public, but access to the accommodation, office and storage areas needs to be tightly controlled. We installed around $10,000 worth of security equipment to enable all the doors to be managed appropriately. That’s just a small recognition of the enormous value the lifeguards provide to the community.” Gallagher also supports Whangamata Surf Lifesaving, Raglan Coastguard and Waihi Coastguard – among up to 100 other community initiatives across New Zealand each year. “As a security business, keeping people safe is at the heart of what we do; as a result, we’re committed to helping community organisations and causes who share that value,” says Mark Junge, Global General Manager of Gallagher’s security division, “Donating this security system creates a safe and secure environment for staff, volunteers, and other people using the clubrooms – like school groups. It gives lifeguards peace of mind that their people, equipment and vehicles are safe and ready to use when an emergency occurs.”  

Read More

Oncam Secures the Transportation Sector

The transportation industry is unique in that it plays a role in both the minutiae of our everyday lives and the big picture of the economy’s overall well being. From one’s daily commute by public transit to the movement of goods across countries, the transportation market is extraordinarily crucial to cities around the world and therefore must be functioning at a high level at all times. Providing uninterrupted and efficient transportation service depends heavily on the safety and security of these entities. Due to the high volume of people frequenting transit stations and the importance of the items on ships and ferries, the transportation sector is one that faces significant and complex threats that evolve as the industry advances. The transportation market is heavily regulated to combat these risks and facilitate safe environments, with the implementation of video surveillance a key component of meeting guidelines. Though any kind of surveillance camera provides transportation operators numerous advantages, many are turning to omnidirectional surveillance technology for added benefits. Both 180- and 360-degree cameras enable security personnel to obtain a complete view of transportation entities such as a bus, airport, cruise ship or train station, providing a comprehensive picture with no blind spots. This then leads to various benefits such as: Elevated situational awareness Through the ability to monitor activity across an entire scene, transportation security officials can establish a proactive approach to identifying potential threats before they turn into an incident. Enhanced investigations When an emergency occurs on a method of transportation, an immediate response is necessary to mitigate the risk, restore operations and limit further damage. Omnidirectional surveillance technology provides in-depth intelligence and insight that enables security officials to obtain pertinent details and track suspicious individuals. Improved business operations Innovative surveillance technology can deliver advantages outside of security as well, through the use of high-level analytics for features such as people counting or traffic flow analysis. Optimal mounting options Compact and discreet 180- and 360-degree surveillance cameras are ideal for the transportation industry, where devices must often fit into narrow spaces while still capturing thorough and high-quality imagery. Transportation hubs around the world are looking to omnidirectional surveillance to experience these advantages, and the State Railway of Thailand (SRT) is a perfect example. SRT installed 360-degree cameras in each of its stations in areas that required wider view recording. SRT was able to increase its situational awareness in regard to threats and incidents, providing officials the views they need to decrease risks, identify potential problem areas and aid police in criminal investigations. Across the globe, public transportation agencies must contend with a number of vulnerabilities and threats on a near daily basis, which is quite simply unacceptable when it comes to the impact that this industry has on the world. The use of omnidirectional surveillance technology can help reduce the severity and frequency of these incidents, leading to a safer transportation process for all.  

Read More