securitylinkindia

Top 7 Trends for the Security Industry in 2023

The physical security industry has been changing quickly in recent years. Developments and applications of cutting-edge technologies in this ever-evolving industry such as AI, machine perception, and IoT, are breaking boundaries all the time. We have seen security systems become deeply integrated and more comprehensive, expanding with capabilities that are now shouldering more intelligent tasks to improve efficiency in security as well as other operational functions. And all this is happening across many different industries and types of organizations. As we step into 2023, Hikvision would like to share some insights into seven key trends coming to the fore in the security industry. AI applications are diversified, requiring more open ecosystems We have seen more diversified AI products and applications that help solve intricate problems daily and meet customers’ fragmented needs. AI’s acoustic and textual capabilities are also being explored by the industry, beginning with visual AI. For example, AI-powered audio anomaly detection is being used to detect equipment failures in industrial environments for heightened levels of worker safety. Furthermore, AI technology itself is evolving to the stage of self-learning with training and optimizing itself much faster than supervised learning. All of these require more ecosystems with open technologies, open resources, and even open protocols, for collaborations in the industry. Open technologies such as container technology and virtualization technology, have significant potential for our industry, which are making hardware products more open. AIoT continues to bridge physical and digital worlds Taking artificial intelligence further, we believe the combination of AI and IoT (AIoT) will continue to be a major trend for 2023, reshaping the scope of the security industry. More AIoT solutions have been introduced that will not only provide intelligent protections but also help advance the efficiency of operations in a multitude of industries and organizations. AIoT will create an important path for boosting digital transformation across several industries. This can be done by creating a digital twin, bridging the physical and digital worlds. For example, in industrial park management, virtual sites can be created by applying 3D modeling, using VR and AR technologies to represent and reflect the real ones, empowering them with the dynamic insight to act quickly to make the whole site run smoothly. Visual experiences improve with 24/7 imaging technologies Capturing security imaging with sharp clarity and color around the clock is a core demand for users of video security, but dim light at night has always been the biggest challenge to achieving this. Now, with the development of several new imaging technologies, we are seeing these challenges removed. Bi-spectrum image fusion technology that employs two sensors is being used to combine IR and visible-light imaging to reproduce vivid colors in dim lighting conditions. Artificial Intelligence-based image signal processing (AI-ISP) technology leverages deep-learning algorithms to radically improve visual noise reduction for nighttime image optimization. Perception capabilities extend to a wider range For security applications, perception capabilities are going far beyond visible light, extending out along the electromagnetic spectrum to expand capabilities of perceiving the physical world in new ways. For instance, hyperspectral imaging technology has been used in analyzing optical irradiance characteristics and eutrophication to record water quality trends in rivers and lakes. In the millimeter-wave band, radar products are assisting the measurement of vehicle speeds and distances. The X-ray band has been applied widely in security inspections, now extending its applications in industrial equipment flaw detection. And these multi-dimensional perception capabilities also converge to create innovative solutions that can accomplish a multitude of new operations such as radar assisted video systems for perimeter protection, integration solutions of video and sonar arrays for traffic management, and alarm systems with a wide range of detectors for smart home applications. More focus on usability of devices and systems Usability of devices and systems impacts the daily life of security professionals, which has generated more focus now in light of workforce shortages and labor cost increases across our industry. This trend is requiring manufacturers to optimize their products with an easier configuration process, make better use of interactive experiences that will reduce installation time, and lower the costs of equipment maintenance and skill building. For example, we see more installers preferring to use mobile applications over PCs in device installation and maintenance where that interactive and simplified process comes across best. The industry moves to greener, lowercarbon operations for sustainability Trends in green manufacturing and low-carbon initiatives in the security industry are very inspiring. Security manufacturers are rolling out products featuring longer life expectancies, recyclable materials and packaging, and renewable energy usage. Each of these initiatives reduces waste and emissions. For example, the solar-powered camera demand continues to increase due to its well-established effectiveness at using the sun’s limitless clean energy. And in daily manufacturing and operations, more companies in the industry have set medium-to-long-term goals for environmental management, spanning from lower carbon production, efficient energy use, and waste and chemical management, to greener office environments. Zero Trust continues to become the go-to cybersecurity strategy Cybersecurity remains a very important and challenging issue for all parties in our industry, as customers and regulators get more concerned about the security of their data and privacy, and have set higher standards and demands on this issue. We see the value in highlighting the idea of Zero Trust for everyone to consider when making cybersecurity strategies. Zero Trust is a strategic initiative that was developed to prevent data breaches by eliminating the concept of trust from an organization’s network architecture. In cybersecurity, trust becomes a vulnerability. Zero Trust is an approach to cybersecurity that dictates our connected systems must ‘never trust; always verify.’  

Read More

VisionBot™ Augmented Computer Vision

Prakash Prabhu – Chief Business Officer & Co-Founder, VisionBot In this feature, we will navigate how automated visual inspection, content analysis and deep learning methodologies can save significant time and effort for organized retail and warehousing enterprises. Computer Vision Driven Automated Video Content Monitoring For Retail Augmented computer vision is a game-changer for the retail industry. By adding layers of digital information to the real world, retailers can create engaging and personalized experiences for their customers, resulting in increased sales and customer loyalty. Computer vision is a type of technology that is revolutionizing the way that we think about retail. By using machine learning algorithms, computer vision is able to ‘see’ the world around us and make sense of it in ways that were previously impossible. With its ability for automated visual monitoring in real-time, it provides insights into customer behaviour, shelf management, merchandising, inventory & visitor analytics to name a few, and has become an essential tool for retailers who want to understand their customers better, deliver a more personalized shopping experience and bring more efficiency in their operations. In this editorial, we will explore some of the most promising use cases of computer vision in retail, and how they are already transforming the industry. Smart shelves One of the most exciting applications of computer vision in retail is the development of smart shelves. These shelves are monitored by cameras that can detect when products are running low and automatically raise an alert to reorder them. This not only saves time and resources, but it also ensures that customers always find what they are looking for. Smart shelves can also be used to analyse customer behaviour. By tracking which products are most frequently picked up or put down, retailers can gain valuable insights into what customers are looking for and adjust their inventory accordingly. This kind of real-time data can be used to optimize product placement, pricing, and promotions. In-store navigation Navigating a large store can be a daunting task, especially for customers who are not familiar with the layout. Computer vision technology can help with this problem by providing real-time maps and product locators that help customers find the products they are looking for quickly and easily. In-store navigation also offers opportunities for retailers to personalize the shopping experience. By tracking a customer’s movements through the store and analysing dwell times, retailers can make targeted recommendations about products that they might be interested in through instore promotions. Real-time analytics Perhaps the most significant advantage of computer vision technology in retail is its ability to provide real-time analytics. By analysing customer behaviour and preferences in real-time, retailers can make data-driven decisions about pricing, product placement, and marketing. Computer vision can be used to collect valuable data on customer behavior such as which products they are looking at, how long they spend in the store, and which displays they interact with the most. This data can be used to make informed decisions on store layout, product placement and promotions. Retailers can also use computer vision to analyze customer demographics such as age and gender, to better tailor their products and services to their target market. Checkout & payment The checkout process is often a pain point for both customers and retailers. Long lines and slow checkout times can lead to frustrated customers and lost sales. Pilferages can be reduced at the self-checkout counters, by flagging suspicious transactions. Inventory management Managing inventory is a crucial aspect of retail operations. Computer vision can help retailers track inventory levels and identify which products are running low or out of stock. By using cameras installed in the store, computer vision algorithms can detect which products are being picked up by customers and which shelves are running low. This information can be used to automate the reordering process, ensuring that the store always has sufficient inventory levels. Security Security is a major concern for retailers, and computer vision can help improve safety and prevent theft. Cameras equipped with computer vision algorithms can detect suspicious behavior such as someone trying to remove a security tag or hiding a product in their bag. This information can be sent to store personnel in real-time, allowing them to take appropriate action to prevent theft. Computer Vision Driven Automated Video Content Monitoring For Warehousing Warehousing and logistics are essential components of the supply chain for any industry. The rapid growth of e-commerce has led to an increased demand for faster, more efficient, and cost-effective warehousing and logistics solutions. Computer vision technology is playing a significant role in transforming the industry by enhancing operational efficiency, reducing costs, and improving customer satisfaction. In this editorial, we will explore some of the key use cases of computer vision in warehousing and logistics. Monitored picking and sorting Picking and sorting products is a critical process in the warehousing and logistics industry. Computer vision can be used to automate this process, reducing labour costs and improving efficiency. With cameras and machine learning algorithms, computer vision can detect and identify products, sort them, and place them in the appropriate storage location. This technology can also be used to optimize the picking process by identifying the fastest route to collect items and reducing errors. Inventory management Inventory management is a critical aspect of warehousing and logistics. Accurate inventory management ensures that the right products are available at the right time, reducing delays and improving customer satisfaction. Computer vision can help automate inventory management by scanning barcodes or using image recognition to identify products, track their location, and monitor their quantity. This technology can also be used to optimize storage space, ensuring that products are stored in the most efficient way possible. Quality control Quality control is an essential aspect of the warehousing and logistics industry. Computer vision can be used to detect defects or damage to products, ensuring that only high-quality products are shipped to customers. With cameras and machine learning algorithms, computer vision can identify flaws or inconsistencies in products, and alert workers to take…

Read More

Making a Career In Digital Forensics: A New Age Career

Iqbal Singh, Founder, Forces Network Introduction With increasing digitization and automation the surface area for attack for cyber criminals has increased exponentially. Cybercrime is on the rise and jobs in digital or computer forensics are in great demand. It is a branch of digital forensic science. Using technology and investigative techniques, digital forensics helps identify, collect, and store evidence from an electronic device. Digital forensics can be used by law enforcement agencies in a court of law, or by businesses and individuals to recover lost or damaged data. The goal of computer forensics is to perform a structured investigation and maintain a documented chain of evidence to find out exactly what happened on a computing device and who was responsible for it. It essentially involves data recovery with legal compliance guidelines to make the information admissible in legal proceedings. The terms digital forensics and cyber forensics are often used as synonyms for computer forensics. Digital forensics starts with the collection of information in a way that maintains its integrity. Investigators then analyze the data or system to determine if it was changed, how it was changed and who made the changes. The use of computer forensics isn’t always tied to a crime. The forensic process is also used as part of data recovery processes to gather data from a crashed server, failed drive, reformatted operating system (OS) or other situation where a system has unexpectedly stopped working. Businesses also use computer forensics to track information related to a system or network compromise, which can be used to identify and prosecute cyber attackers. Businesses can also use digital forensic experts and processes to help them with data recovery in the event of a system or network failure caused by a natural or other disaster. Typically they investigate security breaches on a computer system, network, website, or database to find out how they occurred, endeavour to retrieve lost files, and repair damaged data while strengthening the security system to prevent reoccurrence. Where Do They Work?  Many computer forensic investigators work within the law enforcement industry, whether directly for law enforcement agencies or for private firms hired by agencies to manage digital evidence. It’s also possible to work as a forensic analyst for a private company. In this case, you’re likely to be tasked with identifying vulnerabilities, investigating breaches, and attempting to retrieve data from damaged or compromised digital storage devices. Some digital forensic investigator jobs require you to be on call to respond to incidents that might not occur during regular business hours. You can also work as a freelancer in this domain. See the profiles of typical freelancers billing in a range from $20- $200 per hour. Salary. Digital forensic analysts in the US make an average base salary of $74,575, according to Glassdoor, as of December 2022. Job sites ZipRecruiter and CyberSeek report salaries of $73,271 (computer forensic investigator) and $100,000 (cyber crime analyst), respectively.\\ Job openings. To get a feel of the kind of job openings, take a look at indeed website for such roles. Types of Digital Forensics There are various types of computer/ digital forensic examinations. Each deals with a specific aspect of information technology. Some of the main types include the following: Database Forensics.The examination of information contained in databases, both data and related metadata. Email Forensics.The recovery and analysis of emails and other information contained in email platforms, such as schedules and contacts. Malware Forensics.Sifting through code to identify possible malicious programs and analyzing their payload. Such programs may include Trojan horses, ransomware or various viruses. Memory Forensics. Collecting information stored in a computer’s random access memory (RAM) and cache. Mobile Forensics. The examination of mobile devices to retrieve and analyze the information they contain, including contacts, incoming and outgoing text messages, pictures and video files. Network Forensics. Looking for evidence by monitoring network traffic, using tools such as a firewall or intrusion detection system. How Does Computer Forensics Work? Forensic investigators typically follow standard procedures, which vary depending on the context of the forensic investigation, the device being investigated or the information investigators are looking for. In general, these procedures include the following three steps: Data Collection. Electronically stored information must be collected in a way that maintains its integrity. This often involves physically isolating the device under investigation to ensure it cannot be accidentally contaminated or tampered with. Examiners make a digital copy, also called a forensic image, of the device’s storage media, and then they lock the original device in a safe or other secure facility to maintain its pristine condition. The investigation is conducted on the digital copy. In other cases, publicly available information may be used for forensic purposes such as Facebook posts or public Venmo charges for purchasing illegal products or services displayed on the Vicemo website. Analysis. Investigators analyze digital copies of storage media in a sterile environment to gather the information for a case. Various tools are used to assist in this process, including Basis Technology’s Autopsy for hard drive investigations and the Wireshark network protocol analyzer. A mouse jiggler is useful when examining a computer to keep it from falling asleep and losing volatile memory data that is lost when the computer goes to sleep or loses power. Presentation. The forensic investigators present their findings in a legal proceeding, where a judge or jury uses them to help determine the result of a lawsuit. In a data recovery situation, forensic investigators present what they were able to recover from a compromised system. Often, multiple tools are used in computer forensic investigations. A researcher at Kaspersky Lab in Asia created an open source forensics tool for remotely collecting malware evidence without compromising system integrity. Techniques Used By Forensic Investigators Investigators use a variety of techniques and proprietary forensic applications to examine the copy they’ve made of a compromised device. They search hidden folders and unallocated disk space for copies of deleted, encrypted or damaged files. Any evidence found on the digital copy is carefully documented in a finding report and verified with the original device in preparation for legal proceedings that involve…

Read More

Threats to Human Security

Colonel B S Nagial (Retd) Human security means the safety of people from both violent and non-violent threats. This world is insecure and poses various threats and challenges to people worldwide. These threats could be natural disasters, violent conflicts, poverty, epidemic, economic hardships, social exclusions etc., threatening human security and undermining their safety, security, and sustainable development. Such problems are very complex and need the urgent attention of the authorities. They could pose exponential threats if they are not resolved in time and overlapped.Human security is a concept in international relations that emphasises protecting and promoting individual freedoms, human rights, and well-being. It differs from traditional security concepts focusing mainly on protecting states and their territorial integrity. The human security approach seeks to address a wide range of threats to individuals including economic insecurity, poverty, hunger, disease, political violence, and other forms of violence and exploitation. The concept of human security recognises that individuals are not only threatened by conflict and violence but also by a range of non-military threats such as poverty, disease, and environmental degradation. Human security focuses on the empowerment and protection of individuals rather than the state’s safety. This approach seeks to create a safer and more secure world for all individuals, regardless of where they live or their nationality. There are many different threats to human security, some of which include: Political violence: This includes conflict, civil war, state repression, and human rights abuses. Political violence can result in the displacement of people, loss of life, and damage to infrastructure and institutions. Poverty and economic insecurity: Lack of access to basic needs such as food, water, shelter, and health care can undermine human security and lead to chronic poverty, unemployment, and food insecurity. Disease: Outbreaks of infectious diseases, such as HIV/AIDS, Ebola, and COVID-19, can devastate human security, especially in countries with weak healthcare systems. Environmental degradation: Climate change, deforestation, and other forms of environmental degradation can lead to water scarcity, displacement, and decreased food production, all of which pose threats to human security. Disasters: Natural disasters, such as hurricanes, earthquakes, and tsunamis, can have a catastrophic impact on human security, causing loss of life, injury, and displacement. Terrorism: Acts of terrorism can cause widespread fear, injury, and death and can have lasting impacts on economies and societies. Cyberattacks: Cyberattacks on critical infrastructure, such as power grids, financial systems, and communication networks, can significantly impact human security, especially in digital dependence. These are just a few examples of the many threats to human security. It’s essential to address these threats comprehensively and broadly, considering the interconnected nature of these challenges. The state of human security worldwide is complex and varies significantly from region to region and country to country. In some parts of the world, there have been significant improvements in human security in recent years, while the situation has deteriorated in others. In some countries, poverty and hunger remain persistent problems, and access to essential services such as health care and education remains limited. The COVID-19 pandemic has exacerbated these issues, leading to economic instability, job losses, and increased poverty in many countries. However, there have also been some positive developments in human security. For example, there have been improvements in the protection of human rights in some countries, and some states have made progress in reducing conflict and promoting peace. The international community has also significantly tackled global challenges such as poverty, disease, and environmental degradation. Overall, while the state of human security worldwide is mixed, there is still much work to be done to ensure that individuals everywhere have access to the fundamental freedom and protection they need to lead safe, secure, and fulfilling lives. There are many countries around the world where human security is badly affected due to various factors, such as conflict, poverty, disease, and political repression. Some examples include: Syria: The ongoing conflict in Syria has had a devastating impact on human security, with widespread loss of life, displacement, and widespread human rights abuses. Yemen: The ongoing conflict in Yemen has led to widespread food insecurity, disease outbreaks, and displacement of people. The situation has been described as one of the world’s worst humanitarian crises. Venezuela: The political and economic crisis in Venezuela has led to widespread poverty, food insecurity, and shortages of essential goods and services, including health care. Afghanistan: The ongoing conflict in Afghanistan has led to widespread displacement, loss of life, and human rights abuses, as well as significant challenges in areas such as health care and education. Sudan: The ongoing conflict and political instability in Sudan have led to widespread displacement, loss of life, and human rights abuses, as well as food insecurity and disease outbreaks. These are just a few examples of the many countries where human security is badly affected. It’s important to note that human security is not only affected by conflict and violence but also by a wide range of non-military threats, such as poverty, disease, and environmental degradation. In many countries, a combination of these factors exacerbates the challenges to human security. How can we ensure human security? Ensuring human security requires a multi-faceted approach that addresses many threats and challenges. Some key steps that can be taken to ensure human security include: Promoting peace and stability: By reducing conflict and promoting peace, governments and the international community can create a safer and more secure environment for individuals. Protecting human rights: Governments and the international community must take steps to protect the rights and freedoms of individuals, including freedom of expression, assembly, and religion. Reducing poverty and promoting economic growth: By reducing poverty and fostering economic growth, governments can ensure that individuals have access to the basic needs and services they need to lead secure and fulfilling lives. Combating disease: Governments and the international community must work to prevent and control the spread of infectious diseases, such as HIV/AIDS, Ebola, and COVID-19. Addressing environmental degradation: By addressing environmental degradation, governments and the international community can help ensure a…

Read More

Cyberattack on AIIMS: Is India on Edge of Cyber Pandemic?

Anil Puri CMD, APS group A first generation serial entrepreneur, thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, an innovator and a strategic thinker. He has used this combination to innovate and implement on-ground many new business ideas. His rich experience in various businesses has enabled him to nurture & mentor innovative ideas and scale them up. Introduction In its quest for digitalization, India has become an easy target for cyberattacks due to poor cybersecurity. The frequency and targets of cyberattacks on India are becoming increasingly alarming. The high-profile ransomware attack on Delhi’s All-India Institute of Medical Sciences (AIIMS) on 23 Nov 2022 exposed gaping holes in the country’s cybersecurity infrastructure causing disruption of online services that lasted over two weeks thus bringing to fore the critical infrastructure vulnerability. India’s nodal cybersecurity agency Computer Emergency Response Team (CERT-In) found in its investigation that five AIIMS’ servers were compromised during the cyberattack and nearly 1.3 terabytes of data were encrypted by hackers.  But it was hardly an isolated incident. Industry data shows that 2022 has been the worst year so far for India when it comes to cyberattacks – a problem that has only grown with increasing digitalization. Ransomware attacks in India have increased significantly and in an unprecedented numbers. One of the most distinguishing aspects in 2022 was the involvement of state actors. India saw the highest number of cyberattacks on government agencies in 2022. Experts believe that state-sponsored hackers will go after cloud services in 2023 due to growing digital transformation as companies migrate more of their attack surface to these cloud managed services. articles like these, get access to Mint Premium at 25% discount India’s Cyber Vulnerabilities In 2019, CERT-In handled close to 3,94,499 incidents in total, in which it suggested remedial measures for organizations and shared notes on cyber threats and vulnerabilities. In the same year, CERT-In issued 204 security alerts and 38 advisories. The number of incidents handled by CERT-In surged in 2020 to 11,58,208, a near-tripling over the previous year. This surge continued in 2021, which saw 14,02,809 incidents, a 21 per cent increase. The matters CERT-In looks into include website intrusion and malware propagation, malicious code, phishing, distributed denial-of-service (DDoS) attacks, website defacements, unauthorized network scanning or probing activities, ransomware attacks, data breaches and vulnerable services. In this backdrop, what will the government and companies do differently in the coming year? As the government readied its legislation on cybersecurity, numerous industry-wide surveys and sector experts say that 2023 will see companies spending significant amounts to secure their digital systems from attacks. CERT-In has also laid out a standard operating procedure for data breaches wherein companies and other organizations are supposed to inform the government of any breach within six hours, although this move has received a mixed reaction since compliance may be challenging. Chronological history of Cyber Attacks on India in last three years. In another report, CloudSEK also reported an uptick in the number of cyberattacks on banking and financial sector. The report, however, identified different patterns when compared between 2021 and 2022. The attacks in 2021 were on a global scale with an equal focus on North America whereas the events in 2022 saw a shift towards Asia. Within Asia, India stood pretty high, with the report characterizing India as ‘the new found hotbed for cyberattacks in Asia.’ The Banking Finance Services and Insurances (BFSI) has been identified as the most targeted sector in the FY 2021-2022. A comparison of the number of cyber events in 2021 and 2022 reveal that the US, India, and Brazil continue to be among the most targeted states. Response of the Nodal Agencies According to government data, in 2019, total number of cyber security incidents tracked by Indian Computer Emergency Response Team (CERT-In) was 3,94,499. The number spiked to 11,58,208 in the year 2020 and further increased to 14,02,809 in 2021. This year, as many as 6,74,021 cyber security incidents were reported till June. Cyber Attack which has put All India Institute of Medical Sciences (AIIMS), Delhi’s servers out of order on November 23 is yet to be resolved completely. Multiple agencies have been looking into the Cyber Attack at the crucial installation of the country. While a case has been registered, the CERT-IN, Delhi Police and other investigating agencies are probing the incident. On December 1. 2022, cyber attackers briefly hacked the Ministry of Jal Shakti’s Twitter handle, the second major Cyber Attack on a government site. A Parliamentary Standing Committee in its report this year observed that there is a significant surge in cyber incidents and cyber security breaches and it is imperative that capabilities and resilience of the country to deal with imminent dangers on cyber space are enhanced proportionately. Cyber Security has to remain at the forefront of agenda/ priority items for the Ministry and no fund crunch should come in the way of ensuring a safe ecosystem as far as the Cyber world is concerned. In fact the Committee feels that the Ministry must dovetail their efforts to achieve a more secured cyber world especially in the wake of renewed challenges in this domain. The Committee, therefore, recommends that funds for cyber security may be increased on a year on basis to forestall any failures in this domain for sheer lack of funds. The report also cited lower fund utili zation with respect to CERT-in, National Cyber Coordination Centre (NCCC) and data governance. “So far as the underutilization of funds under the head is concerned, an amount of Rs. 216 crore had been allocated in BE (Budget Estimate) stage during 2021-22, which was reduced to Rs. 213 crore at RE (Revised Estimate) stage and actual utilization till January, 2022 has been 98.31 crore only,” said the report. As per Information Technology Ministry, the government is operating an automated cyber threat exchange platform for proactively collecting, analyzing and sharing tailored alerts with organizations across sectors for proactive threat mitigation actions by them. The Government has issued…

Read More

Gives Back to the Community through Global CSR Projects

With the advancement of technology to a new level, the application fields of security equipment have been widely expanded. Dahua Technology, a world-leading video-centric AIoT solution and service provider, actively supports the sustainable development of human and nature through its tech for good initiatives, and constantly brings positive impacts to the communities where it operates. Children’s charity donations Dahua has been advocating for a better world for every child as well as their families. Every year, Dahua presents kind donations to various outstanding children’s charities around the world. This year, Dahua Australia proudly supports Starlight Children’s Foundation, an Australia-based nonprofit organization that offers vital services for ill and hospitalized children. Dahua has made both direct donation and a program that allows the employees, customers and partners of the company to make donations which will be matched dollar for dollar by Dahua Australia. “The work Starlight does to bring happiness to sick kids is only made possible by the generosity of the community, so we’re incredibly appreciative of Dahua’s support,” said Kirsty Beed, Starlight Children’s Foundation NSW’s Partnerships Manager. Donations of advanced security equipment to educational and social organizations Dahua also believes on the importance of education and how it can contribute to the betterment of the society. The company has donated a number of its intelligent products to several educational institutions and social organizations around the world that create significant impact on their communities. Dahua Iberia has donated one DeepHub smart interactive whiteboard to Centro de Educación Especial Los Álamos, a special education school located in Madrid. It enables them to personalize their activities related to adaptive skills, allowing them to improve and offer necessary support for their students with intellectual disabilities. Moreover, in partnership with CS Sécurité in Montréal, Dahua jointly donated a new access control system for Marie-Vincent Foundation, a nonprofit organization based in Montréal, Canada that is committed to supporting children, adolescents, and families by providing specialized counseling and intervention. The donated Dahua equipment significantly transformed the security of the entire center in terms of better access management and clear video surveillance footages. In addition, Dahua UK & Ireland donated cutting edge surveillance products and solutions to Royal National Lifeboat Institution (RNLI) and Belfast Metropolitan College in order to equip them with the latest technology and optimize their monitoring operations as they continue to serve their communities. Environmental protection and sustainability Aside from its charitable donations, Dahua has also been actively engaged in developing intelligent solutions to aid scientific explorations and to promote sustainability through its own environmental initiatives. Dahua entered the Antarctic region for the first time by donating 15 intelligent devices to different local scientific bases, providing clear images of the flora and fauna in the Argentine region of Antarctica that are beneficial in the research studies conducted in ‘The White Continent.’ The Dongting Lake project greatly shows how Dahua’s intelligent fishery management solution helps curb illegal fishing and other illegal activities. Dahua’s intelligent monitoring solutions were also applied in protecting the weltland ecosystem in Yangtze River that is home for various fish species and other aquatic animals. An intelligent forest fire prevention system was also implemented in the mountainous region of Rizhao (China) to realize automatic early warning of fire, real-time fire control and closedloop response through digital intelligence technology. Furthermore, Dahua carries out a wide range of sustainability strategies that includes reduction of its CO2 emissions to help achieve carbon neutrality. It also makes unremitting efforts to combat plastic pollution and reduce waste disposal costs by implementing high quality, eco-friendly, and sustainable packaging solutions. One of the company’s recent initiatives is the upgrading of its IPC and HDCVI product packaging with plastic-free materials. Dahua Technology will continue to actively support organizations around the world that help people in need and utilize digital intelligence technologies to contribute to a safer society and smarter living.  

Read More

Organizations See Expansion Opportunities, Ignore Security Red Flags and Jump Into the Metaverse

Tenable®, the exposure management company, recently published the results of a global study that revealed that cybersecurity is the top consideration as businesses decide on investing in the metaverse. In fact, even in a challenging global economy, concerns about macroeconomic conditions trailed behind cybersecurity worries. This sentiment underscores the rising criticality of cybersecurity in a digital economy to ensure it is a safe and secure environment for users. The study, ‘Measure Twice, Cut Once: Meta-curious Organizations Relay Security Concerns Even as They Plunge Into Virtual Worlds,’ surveyed 1,500 IT, cybersecurity and DevOps professionals in Australia, the U.K. and U.S. The study examines how organizations are approaching the opportunities and challenges associated with building, securing and participating in the metaverse, as well as offering insights into the risks and rewards of investing in this new technology. While still in its relative infancy, organizations have begun to explore the metaverse and its capabilities. In fact 23% of organizations have already ventured into the metaverse, and 58% plan to conduct business in the metaverse within the next year. Less than half of respondents feel very confident in their ability to curb threats in this new environment, the metaverse poses both new and legacy cybersecurity risks and challenges. According to survey respondents, threats that are either ‘somewhat’ or ‘very’ likely to take place in the metaverse include: Conventional phishing, malware and ransomware attacks (81%). Compromised machine identities and API transactions (84%). Cloning of voice and facial features and hijacking video recordings using Avatars (79%). Invisible-avatar eavesdropping or ‘man in the room’ attacks (78%). In addition to the cybersecurity threats, respondents identified several major barriers to entry, including the prospect of security breaches and identity theft (34%), the lack of a clear process for data privacy (33%) and the lack of experienced security professionals to secure the metaverse (32%). “As with any new business opportunity, first movers have the advantage and the risk,” said Bob Huber, Chief Security Officer and Head of Research, Tenable, “The foundation of the cybersecurity program must be solid before making a big leap into largely unknown territory and drastically expanding your attack surface. Forward- thinking organizations that take the time and make wise investments in their security personnel and the security and integrity of their infrastructure are more likely to be successful in the metaverse or any other technology investment.” Other key findings from the report include: 87% of respondents are in favor of regulating the metaverse. Nine in 10 respondents agree that organizations need to adequately develop a cybersecurity framework prior to offering services in such a virtual environment. More than half (55%) of respondents said their organization will need to invest in training their current employees about safe cybersecurity practices to support their investment in the metaverse. When asked about the skills required for the metaverse, respondents cited UI/ UX designing, 3D modeling, blockchain and gaming development, cybersecurity and software development as important development areas.  

Read More

Sophos Unravels 20 Fake Criminal Marketplaces Designed to Scam Scammers

Sophos, a global company in innovating and delivering cybersecurity as a service, recently revealed details of how it tracked down the likely culprit behind more than 20 fake criminal marketplaces designed to con cyberscammers in part three of Sophos’ series, ‘The Scammers Who Scam Scammers on Cybercrime Forums.’ After stumbling upon a surface website mimicking the real criminal underground site Genesis, Sophos researchers further uncovered the 20 fake marketplaces dating back to August 2021. All of the fake sites appeared to be run by a scammer who uses the handle ‘waltcranston,’ a likely riff on the television show ‘Breaking Bad.’ “While investigating this huge sub-economy of scammers scamming other scammers, we examined about 600 scams of varying types. Out of all the scams investigated, this operation stood out for its sheer scope and intricacy. The scammer advertises the fake marketplaces on Reddit and replicates not just Genesis, which was the first scam site we ran across, but numerous other prominent or defunct marketplaces, such as Benumb, UniCC, and PoisOn. While at a technical level these scam sites are not sophisticated, the scam operation has been highly successful. In fact, seven of these fake sites are still active, and, to date, the cryptocurrency wallets associated with the scams have received at least $132,000,” said Matt Wixey, Senior Threat Researcher, Sophos. All 20 of the fake sites followed a similar scheme. Criminals were offered a chance to activate an account on the fraudulent version of a dark web marketplace with $100. The criminals expected their $100 would be deposited in either Bitcoin or Monero, and they would receive activation credentials. However, as part of the scam, once the criminals paid, their account would never activate. One common denominator among the 20 fake sites was a link to a website called darknet[.]markets – a site that lists dark web criminal marketplaces for visitors interested in drugs sales, carding, and cryptocurrency exchanges. This site ultimately led Sophos to a criminal forum called Café Dread – and a user going by the name of waltcranston. “We started searching Dread for any mentions of the marketplaces mentioned on the darknet markets, and we found multiple posts by the handle waltcranston talking about dark web marketplaces, as well as discussing how to scam people and recommending other users set up phishing sites. His own website, which sells meth, also shared some similarities with the fake marketplaces. We even found posts by Dread users who fell for the scam websites, and accusations by a Dread user that waltcranston was the culprit behind the scheme. While we can’t be 100% certain that those behind the handle waltcranston is indeed the culprit, there is strong circumstantial evidence. The entire operation and our investigation is an example of how much rich intelligence there is about cybercriminals hidden in these scams against other scammers, which the security community can leverage to help develop stronger defenses,” said Wixey.  

Read More

viisights Proactive Behavioral Recognition Video Analytics Enhance Safety at Industrial and Manufacturing Facilities

viisights, Inc., a global company in behavioral recognition video analytics, offers proven solutions that deliver real-time video intelligence for myriad occupational and environmental safety applications for industrial and manufacturing facilities. Designed for fast and cost-efficient deployment, viisights behavioral recognition video analytics leverage investments in existing video systems to autonomously detect and issue real-time alerts on unsafe conditions so they can be addressed before they cause injuries or losses. viisights offerings include personal and environmental safety solutions such as PPE detection, person falling or laying on the ground, vehicle/ person in hazardous areas, a person close to a moving vehicle, blocked aisles, misplaced equipment, behavioral workflows, and more. “Manufacturing and industrial facilities inherently pose risks for workers and visitors, so they have unique safety and security requirements,” said Asaf Birenzvieg, CEO, viisights, “viisights delivers highly effective pre-emptive solutions that can help improve safety, security and environmental conditions, while delivering a high RoI whether using existing or newly installed video systems.” viisights’ unique video understanding technology utilizes deep neural networks to analyze video streams from existing video camera systems to automatically detect developing safety, environmental and security risks, and issue real-time alarms to authorized personnel to take remedial action. The early notification of impending and real-time events of interest enables responders to take faster action, effectively reducing or eliminating negative outcomes from potentially threatening or harmful events. viisights intelligent behavioral recognition video understanding technology is currently deployed in critical applications around the world, helping create safer and more secure workplaces.  

Read More

California Dairies Chooses Veeam to Secure Critical Data, Ensure Business Continuity and Protect Against Ransomware

Veeam® Software, a company in Modern Data Protection, recently announced it was selected by California Dairies, Inc. (CDI) to protect their Microsoft 365 data and mitigate cyberattacks. Veeam is also ensuring business continuity through verified disaster recovery (DR) strategies, fast-tracking data protection for multi-cloud ecosystems and offering additional ransomware resilience for the #1 dairy processing cooperative in California that produces safe, fresh milk for all 50 states and more than 50 countries. CDI is the largest farmer-owned milk-processing cooperative in California, producing approximately 40% of the state’s milk and 20% of the nation’s butter. The company is comprised of more than 300 dairy farms producing nearly 17 billion pounds of milk annually, which CDI processes to make butter, fluid milk products and milk powders. CDI’s production of fresh, high-quality dairy products every day is key to its ongoing success, but this can be a challenge if there’s an unforeseen IT incident. After facing a near-catastrophic failure where an on-premises Microsoft Exchange server became unavailable, CDI was able to restore data using Veeam Backup & Replication™. Following this incident, CDI recognized the benefits of migrating its on-premises environment to the cloud and decided to deploy Veeam Backup for Microsoft 365 for its ease of use, simplicity and reliability. “Each dairy farm is integral to everything we do as an organization, so protecting the data that helps us collect, market and process milk while providing services to our members is critically important,” said Matthew Prieto, Director of Infrastructure and Security at CDI, “From the first time we started using Veeam solutions, we have not been let down. We know our data is protected and always available when we need it. Veeam has been absolutely core to business continuity, so as we’re moving more backups to the cloud, we know we’re covered.” Like many manufacturing companies, CDI was an early adopter of virtualization. After CDI determined that backing up physical servers to tape, wasn’t suitable for virtual machines, CDI chose Veeam Availability Suite™. Veeam is cloud agnostic, offering flexible, native-cloud backup capabilities and solutions to defend against ransomware attacks and other threats. Veeam backs up 72TB of data across 240 virtual machines (VMs) to ExaGrid, which replicates to a DR site. CDI’s DR strategies include Veeam DataLabs™ to verify recovery of backups and replicas (SureBackup® and SureReplica) and Instant VM Recovery® to restore in minutes. In addition, Veeam creates immutable backups in Amazon S3 storage for additional ransomware protection. Veeam also backs up and protects 14TB of data in Microsoft 365 (OneDrive, SharePoint, Teams and Exchange) directly to an off-site cloud repository, which replicates to a DR site for additional protection. Veeam sends backup data to Microsoft Azure Blob Storage and Amazon S3, allowing for protection, security and resiliency of data in longterm, low-cost object storage.  

Read More