securitylinkindia

Cellular Iot Market Value to Exceed $61 Billion Globally by 2026, Driven by 5G & Low-Power Solutions

A new study from Juniper Research has found that the global value of the cellular IoT market will reach $61 billion by 2026; rising from $31 billion in 2022. It identified the growth of 5G and cellular LPWA (low-power wide area) technologies as key to this 95% increase over the next four years. The new study, Cellular IoT: Strategies, Opportunities & Market Forecasts 2022-2026, predicted that, LPWA solutions, such as NB-IoT and LTE-M, will be the fastest-growing cellular IoT technologies over the next four years. It anticipated that the low cost of both connectivity and hardware will drive adoption for remote monitoring in key verticals, such as agriculture, smart cities and manufacturing. In turn, LPWA connections are expected to grow 1,200% over the next four years. 2G and 3G Network Shutdowns to Drive LPWA The report urged operators to migrate IoT connections on legacy networks to networks that support LPWA technologies. It anticipated that demand from enterprises for low-cost monitoring technologies, enabled by LPWA networks, will increase as these legacy networks are shut off over the next four years. Research co-author Charles Bowman commented, “Operators must educate users on the suitability of LPWA as a replacement technology for legacy networks. However, many IoT networks cannot solely rely on LPWA technologies. More comprehensive technologies, such as 5G, must underpin IoT network architectures and work in tandem with LPWA technologies to maximise the value of IoT services.” 5G to Generate $9 Billion for the IoT Market by 2026 Conversely, the report predicted that 5G IoT services will generate $9 billion of revenue by 2026; rising from $800 million in 2021. This represents a growth of 1,000% over the next five years as 5G coverage expands and operators benefit from the increased number of 5G IoT connections. To capitalise on this growth, it recommended operators offer value-added services, such as network slicing and edge computing, to IoT users to maximise the value of 5G adoption. Juniper Research provides research and analytical services to the global hi-tech communications sector, providing consultancy, analyst reports and industry commentary.  

Read More

Eagle Eye Networks High Security Standards Validated with SOC 2 Type 2 and ISO 27001 Audi

Eagle Eye Networks, the global player in cloud video surveillance, recently announced it successfully completed the SOC 2 (System and Organization Controls) Type 2 examination, a rigorous security standard, which certifies that Eagle Eye Networks policies and procedures securely protect and manage customer data. The company also completed conformance with ISO 27001:2013 security standards. The SOC 2 Type 2 audit evaluated internal controls over six months to ensure that Eagle Eye Networks satisfies the Trust Services Criteria defined by the American Institute of Certified Public Accountants (AICPA). The criteria include security, availability, processing integrity, and confidentiality. “Our customers value the priority Eagle Eye Networks places on data security and cybersecurity; it is a foundation on which our company was built and a responsibility we take very seriously,” said Dean Drako, CEO, Eagle Eye Networks, “This important audit reinforces our commitment to our customers and provides independent validation of our ongoing efforts to meet and exceed industry standards.” Eagle Eye Networks successfully completed the SOC 2 Type 1, in December 2020. Eagle Eye Networks offers additional data security and cybersecurity resources on its website.  

Read More
interpol

52 Arrests in Operation Across 28 Countries Targeting Trafficking Incultural Goods

A global operation targeting illicit trafficking in cultural goods has led to 52 arrests and the seizure of 9,408 cultural artefacts across the world. These priceless items include archaeological objects, furniture, coins, paintings, musical instruments and statuettes. Operation Pandora VI, the operational phase of which ran from 1 June to 30 September 2021, saw law enforcement authorities in 28 countries carry out checks and controls in airports and at border crossing points, as well as in auction houses, museums and private homes. Special focus was placed on the monitoring of online markets. To that end, a cyber patrol week was organized by the National Police Force of the Netherlands (Politie) to identify suspicious sales online. Over 170 investigations are still ongoing, as a result of which more seizures and arrests are anticipated as investigators around the globe continue their pursuit of those spoiling and destroying cultural heritage. Led by Spain (Guardia Civil), Pandora VI was coordinated at the international level by Europol, INTERPOL and the World Customs Organization (WCO). Operational Coordination Units working 24/7 were established by Europol on one side, and the WCO and INTERPOL on the other, to support the exchange of information as well as to disseminate alerts, warnings and perform cross-checks in different international and national databases. Operational highlights French Customs (Douane) seized 4,231 archaeological objects which included approximately 3,000 coins, as well as bells, buckles, rings and pieces of pottery which were looted from archaeological sites by a single individual using a metal detector. In a separate case, French Customs also seized three ancient statuettes dating back to the La Tolita – Tumaco pre-Columbian culture. The Spanish National Police (Policía Nacional) recovered a treasure consisting of 91 gold coins from the Roman Empire worth an estimated half a million euros on the black market. The investigation began after these coins were detected in a well-known auction house in Madrid. The investigators later identified the Spanish archaeological site from which these coins were looted. Officers from U.S. Customs and Border Protection (CBP) seized a shipment containing 13 pieces of ancient Mexican artefacts from the Post-Classic to the Aztec era, including one skull and 12 adzes (chopping tools). A processional cross dating from the 13th century was recovered by Romanian Police (Politia Românã) and returned to the Evangelical Church Museum of Cisnadie, from where it was stolen in 2016. The object had been recorded in INTERPOL’s Stolen Works of Art Database and was identified via INTERPOL’s ID-Art mobile app. Italy’s Carabinieri Corps (Arma dei Carabinieri) seized 79 archaeological goods of different types and age in the Mediterranean region. These goods were lacking documentation certifying their lawful origin or import into the national territory. The Art and Antiques Crime Unit (National Police Force of the Netherlands) recovered two Kees Verweij paintings which had been reported as stolen, following checks of an online sales catalogue involving an Amsterdam auction house. Officers from the Hellenic Police recovered a marble column dating back from the Roman period, alongside 13 ancient coins and 3 pottery vessels dating back from the Hellenistic period. Metal detectors remain a hot commodity amongst looters, with seven European law enforcement authorities reporting the seizure of 90 metal detectors destined for illicit use at archaeological sites. International coordination Europol, as co-leader of this action, played a key role in implementing the entire operation by facilitating information exchange and providing analytical and operational support. The WCO provided its CENcomm secure communication channel and facilitated intelligence exchange among different agencies. INTERPOL, through its I-24/ 7 secure communication system, connected countries in the Balkans and European Union participating in the exchange of information, supporting the entire operation with a dedicated expert to double check searches against INTERPOL’s Stolen Works of Art Database in order to locate and identify items that had been stolen and items that were still missing. Operation Pandora, which was first launched in 2016, is an annual law enforcement operation. To date, it has netted 407 arrests and resulted in the recovery of 147,050 cultural goods. Pandora VI participants INTERPOL Member countries comprise Albania, Austria, Bosnia & Herzegovina, Bulgaria, Cyprus, France, Germany, Greece, Ireland, Italy, The Netherlands, Norway, Poland, Romania, Serbia, Slovakia, Spain, Sweden, Hungary, Latvia, Lithuania, Montenegro, North Macedonia, Portugal, Switzerland, United Kingdom and United States. Third party: Kosovo.  

Read More

Digital India 2022 Major Technology Trends for Indian IT Industry

Vikas Bhonsle, CEO, Crayon Software Experts India Every company is already an IT company today. Corporates or SMEs, every workplace today is accessing digital tools and solutions most organically. We are adapting to futuristic technologies faster than ever, thanks to the disruptive year of 2020. And India is one of the fastest-growing IT markets in this race, after the US and China. The IT industry here has witnessed growth in the last two decades, and soon, it is expected to touch the $100 billion mark. The Government of India has also been pushing for rapid digitization, leading to increasing investments in the IT sector. In the recent Union Budget of 2022-23, the Government of India has made a few announcements which will lead to some major developments in India on the digitization front. Apart from direct digitization in banking, higher education, and health sector, the country will soon have its own Digital Currency issued by the Reserve Bank of India, the country’s apex bank. Also, the government has announced that datacentres will be given infrastructure status in the country allowing it to play a key role in enabling a digital economy. Here are some of the major technological trends that will continue to transform the Indian IT industry in the present year are – the Internet of Things, artificial intelligence, blockchain technologies, cloud adoption, and data security & cyber protection. Internet of Things (IoT) The Internet of Things is a network of devices, vehicles, home appliances, and other items embedded with electronics, software, sensors and network connectivity that enable these objects to collect and exchange data. In 2022, the IoT will be firmly entrenched in people’s everyday lives. The number of devices connected to the IoT will triple by 2022, reaching 25 billion. Most cars and homes will be connected to the internet by 2022. Both individuals and companies will benefit from this connectivity. IoT makes the autonomous collection of big data possible, which helps businesses get insights into customer behaviours and product performance. IoT also facilitates the continuous optimization and automation of business processes and even helps to improve employee engagement and performance. Artificial Intelligence (AI) AI has been one of the most buzzing technologies in recent years. This has led to significant advances in many areas such as speech recognition, natural language processing, robotics, machine learning and computer vision. According to Gartner, AI and machine learning (ML) will be used in over 80% of IoT activities in enterprises by 2022. Hyper Automation is one of the major outcomes of AI, and this will be one of the driving forces behind digital transformation in 2022. Hyper-automation ensures streamlining of processes to increase efficiency, accuracy, and productivity. In 2022 we will see AI and ML increasingly active, infusing more automation and taking over most mundane tasks, freeing us to focus on activities that shall require more human touch and intervention. With AI and humans working together, the workforce is becoming an augmented one. AI will not replace humans but will be working along to add efficiency to our work. Blockchain Technologies Blockchain is a technology that enables digital information to be distributed but not copied. It is a vast and globally distributed database, which can be applied to anything from payments and banking to complex computer programs. A report by trade association IDC predicts that worldwide spending on blockchain technologies will reach $9.7 billion in 2022. Blockchain is a highly disruptive force for enterprise software. One of the most intriguing applications of blockchain technology is supply chain tracking, which gives the ability to track products from the time they are created to when they are stored in warehouses and finally sold to customers. Blockchain is also used to reduce fraud in digital contracts and create faster data retrieval for distributed ledgers. The technology is continuously developed, with some of its latest applications being Smart Contracts and crypto-currencies. In the future, blockchain technology will be used to manage personal health records, deliver payments, and even Smart buildings. Cloud Adoption Cloud computing has become an increasingly popular way to store and manage data, which means more sensitive information is on the cloud than ever before. Cloud computing is often looked at as a more secure alternative to on-premise solutions. It is also a better choice for most businesses, as it reduces hardware and maintenance costs by paying for resources only when needed. By moving some of the infrastructures to the cloud, companies can also significantly improve their security posture. Also, companies using single cloud resources earlier are now exploring multicloud options. With single cloud earlier, companies were often suffering in vendor-lock ins, and it was also risky and costly to store all data in a single server. Multicloud is a better option when it comes to disaster recovery. Instead of establishing a traditional on-premise disaster recovery capability, cloud resources can be used as and when required. As each provider will be coming up with their unique selling propositions, be it in AI, machine learning, or analytics, a multicloud strategy will give organisations the advantage of each platform’s competitive edge. Data Security and Cyber Protection Data security and data protection will remain areas of highest concern in 2022. Businesses in the last two years were riddled by constant ransomware attack threats, data breaches and major IT outages, which became even bigger nuisance than supply chain disruptions, or the COVID-19 pandemic, all of which have heavily impacted businesses in the past year. 2022 will still be a difficult year, as there is still a large talent pool to fill up for efficient cybersecurity management. Also, it is estimated that cyberattacks will be relentless in attacking small and medium scale businesses. End-to-end encryption is already becoming mainstream along with zero-trust policies when it comes to network security, and data access control. However, things will continue to look grim for the coming years as ransomware attacks are gearing up menacingly. As per research agency, Cybersecurity Ventures, the frequency of ransomware attacks on a consumer or…

Read More