When Surveillance Meets AI

Security camera shipment continues to grow at 14.1% CAGR to reach 190 million units in 2020 (according to IHS report, September 2016) however, revenue growth slowed to 8.1% CAGR. There are too many cameras and video footage to be consumed by human operators. Most security video footages are erased or over-written without being watched. Video analytics technology was once perceived as a solution to automate the utilization of the abundant video footage resources. By means of identifying and tagging the appearance of certain patterns in a video, the system could…

Read More

Keeping Data Under Lock and Key

BCDVideo looks at how you can protect yourself against cyber attacks with its latest SMARTtechnology In recent months, there has been a multitude of cyber-attacks targeting video surveillance systems and the Internet of Things (IoT). In the aftermath of the Mirai botnet attack, an incredibly powerful distributed denial-of-service (DDoS) attack, some of the largest surveillance manufacturers scrambled to address the extreme vulnerabilities built into their devices. During the October 2016 attack, Mirai, an open-source malware strain that scans the Internet for routers, cameras, DVRs, and IoT devices only protected by…

Read More

IP Camera Settings for Difficult Lighting Conditions

If you’re a technician installing IP cameras for a bank or credit union, you know how challenging it can be to capture clear video surveillance images in dynamic lighting conditions. While some banks have controlled indoor lighting, others have bright sunlight pouring in through floor-to-ceiling windows in ATM vestibules. Other businesses, including quick service restaurants (QSRs), face similar challenges. To help you get the best video quality possible, some tips on which IP camera settings to use in different lighting scenarios will be pertinent. It’s important to note that surveillance…

Read More

Two Things to Demand from the Access Control Provider

In today’s highly competitive environment, it is extremely important that providers have both the experience to deliver the right solution and the ability to deliver strong customer service. In the security industry, one solution in high demand is the use of mobile apps for critical functions such as credentialing, remote operations and alerts. Mobile credentialing frees the user from having to carry physical credentials such as tokens or ID badges. Further, mobile access control solutions are well-suited to applications that experience numerous spontaneous events such as lockdowns or weather related…

Read More

Distributed Cybercrime Attack the World

Ransomware and banking Trojans dominate the cybercrime mainstream today, and their technical operations are heavily analyzed. But little attention has been given to the business model which plays a large role in dictating their behavior, targets, and tactics. A revolutionary concept in cyber crime is what I call ‘distributed cybercrime,’ a business model in which cyber criminals attack many victims in the same campaign. Like many other inventions now common in modern life, distributed cybercrime may seem trivial today. But this concept emerged little more than a decade ago and…

Read More