NIST Offers Tools to Help Defend Against State-Sponsored Hackers

Nations around the world are adding cyber warfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called the ‘advanced persistent threat,’ or APT, because they possess the tools and resources to pursue their objectives repeatedly over an extended period, adapting to defenders’ efforts to resist them. Vulnerable data includes the sensitive but unclassified information managed by government, industry and academia in support of various federal programs. Now, a finalized publication from the National Institute of Standards and Technology (NIST) provides guidance…

Read More

Eagle Eye Networks and Sitasys Introduce First of its Kind Automated Alarm Handling for Operation Centers

Eagle Eye Networks, a leading global player in cloud video surveillance, and Sitasys, the leading cloud alarm management platform have now integrated the Eagle Eye Cloud VMS and its analytics functionality into the evalink alarm monitoring platform allowing service operations centers to more efficiently and effectively manage an unlimited number of cameras without additional human resources. This development builds on the existing partnership between Sitasys and Eagle Eye Networks to create an enhanced security monitoring platform by implementing a cloud-to-cloud integration of video surveillance and alarm monitoring. This integration allows…

Read More

3xLOGIC Launches the VIGIL Video Solutions in EMEA to Help Organisations Leverage Detailed Data Insights

3xLOGIC, the leading provider of server and cloud-based technology, is launching its VIGIL suite of video solutions across the UK, Europe, the Middle East and Africa (EMEA). The ecosystem, comprising software and hardware such as cameras, recorders, thermal imagers, people counters, and accessories, is designed to provide a scalable security solution that’s tailored to every business need. Business leaders have increasing amounts of data available to analyse, with the total amount of data in the world forecast to reach 59 zettabytes in 2020. The 3xLOGIC ecosystem taps into this, by…

Read More

March Networks’ End-toEnd Video Solution Earns Approval From Dubai’s SIRA

March Networks®, a global video security and video-based business intelligence provider, has announced that its products have obtained approval from Dubai’s Security Industry Regulatory Agency (SIRA). SIRA is a regulatory body that governs best practices in security systems and services in Dubai (UAE). Its Security Equipment Approval certificates help businesses in the UAE determine which products meet its rigorous standards. By obtaining SIRA approval on its Command Enterprise video management system and recording platform, along with a wide range of its IP cameras, March Networks can now offer a complete,…

Read More

Face Recognition Software Shows Improvement in Recognizing Masked Faces

A new study of face recognition technology created after the onset of the COVID-19 pandemic shows that some software developers have made demonstrable progress at recognizing masked faces. The findings, produced by the National Institute of Standards and Technology (NIST), are detailed in a new report called Ongoing Face Recognition Vendor Test (FRVT) Part 6B: Face Recognition Accuracy with Face Masks Using Post-COVID-19 Algorithms (NISTIR 8331). It is the agency’s first study that measures the performance of face recognition algorithms developed following the arrival of the pandemic. A previous report…

Read More

Fujitsu Strengthens Cyber-Security with AI Technology to Protect Against Deception Attacks

Fujitsu Laboratories Ltd. recently announced the development of a technology to make AI models more robust against deception attacks. The technology protects against attempts to use forged attack data to trick AI models into making a deliberate misjudgment when AI is used for sequential data consisting of multiple elements. With the use of AI technologies progressing in various fields in recent years, the risk of attacks that intentionally interfere with AI’s ability to make correct judgements represents a source of growing concern. Many suitable conventional security resistance enhancement technologies exist…

Read More

Honeywell Introduces Virtual Reality-Based Simulator to Optimize Training for Industrial Workers

Honeywell recently introduced an advanced industrial training solution that combines 3D immersive technology with industry-leading operator training simulation to create a collaborative learning environment for plant operators and field technicians. Honeywell’s Immersive Field Simulator is a virtual reality (VR) and mixed reality-based training tool that incorporates a digital twin of the physical plant to provide targeted, on-demand, skill-based training for workers. “Faced with increasingly complex technology and an experienced workforce nearing retirement, operators need robust technical training and development solutions that accurately depict real-world environments,” said Pramesh Maheshwari, Vice President…

Read More

Rising to Meet the INTERPOL Digital Security Challenge

Imagine that a well-known company has been hit by a cyberattack – criminals have conducted a business email compromise (BEC) scam against the company, compromising the email of the CEO to trick an employee into making a payment of USD 100 million to an account controlled by the criminals. Now imagine you are a police officer working at the INTERPOL National Central Bureau (NCB) in your country, and you are asked to work with cybercrime investigators as well as other digital forensics examiners around the world to investigate the incident.…

Read More

Wisenet7 Cameras Acquired International Cybersecurity Certification ‘UL CAP’

  Global security company Hanwha Techwin has recently acquired the UL CAP (Cybersecurity Assurance Program) certification, an international cybersecurity standards, for its newly launched network video surveillance cameras equipped Wisenet7 SoC (System on Chip). UL CAP is a certification program by UL, a leading global safety science company with over 127 years of history. The program assesses network-connectable products for the potential cybersecurity issues such as security vulnerabilities of system software and the security level against security threats. Since the program evaluates not only products but also relevant software development…

Read More

Vanderbilt add QR500 Reader to in-depth Access Control Portfolio

Vanderbilt recently announced the addition of ZKTeco’s QR500 readers to their access control portfolio. The QR500 reader is a new generation of intelligent access control readers. It has fast scanning speeds, high recognition rates, high compatibility, and importantly, it can be connected to ACT365 Access Control Units. “Access control QR readers offer a convenient and cost-effective method of maintaining order and flow,” began Paul McCarthy, Product Manager at Vanderbilt, “Moreover, they have proven to be easy to use, not only for system users but also for end-users. Now Vanderbilt is…

Read More