Is the Public Cloud Secure?

While deciding amongst a public, private or hybrid cloud offerings, any organization considers the involved security risks as one of the most important parameters. The prefix ‘Public’ alone can make some people think that public cloud is not as secure as a hybrid, or a private offering. But is that really true – or is the public cloud secure enough for your organization’s data? Let’s try to analyze this question and arrive at an answer post validation of some facts. However, before we do the analysis let’s give a brief…

Read More

Corporate Security in the Age of IoT

Internet has undoubtedly been one of the most significant developments in humanity’s technological journey since the industrial revolution. Rapid advances in telecommunication, especially wireless coupled with software application development, has led to the proliferation of internet to almost all facets of human activity. The ‘Internet of Things’ or ‘IoT’ amalgamates the strengths of network, wireless, miniaturised hardware, software, and cloud to create an even greater medium that pushes the frontiers of day-to-day usage of technology in a multitude of facets of human life. Simply put, the IoT is a computing…

Read More

Revolutionizing Trade-Related Surveillance with SURVEIL-X

NICE Actimize’s next-generation SURVEIL-X solution fundamentally changes surveillance detection to help FSOs detect all forms of risky behavior and better comply with global regulations. Traditional surveillance technology is adept at detecting obvious market abuse, but it doesn’t commonly address the ‘unknowns.’ That’s why regulators around the globe are adopting next generation surveillance technology in growing numbers, and advising financial services organizations (FSOs) to do the same. To meet this demand, NICE Actimize has introduced SURVEIL-X, the industry’s first AI-powered, cloud-native, true holistic trade-related surveillance solution that detects all forms of…

Read More

Securing IP Surveillance Cameras in the IoT Ecosystem

The security for devices connected to the Internet of Things (IoT) has been a hot topic, and Internet Protocol (IP) surveillance cameras, in particular, have been the subject of growing scrutiny. IP cameras have become a top target for hackers because of their relatively high computing power and good internet traffic throughput. A case in point was the incident toward the end of 2016 where a Linux-based botnet called Mirai was used to facilitate the largest distributed-denial-of-service (DDoS) attack in history. As a result, packet flow experienced outbursts of up…

Read More