Idis Highlights Importance of Standards Compliance and Licensing Verification

As video users globally pay closer attention to the manufacturing origins and standards-compliance of their systems, IDIS is highlighting the value of its fully licensed network cameras and recorders that feature H.265 video compression. IDIS was among the first manufacturers to deliver the benefits of H.265 compression to the market as part of its end-to-end DirectIP® solution. The company has confirmed that it has HVEC Advance and H.265 MPEG patent licenses for all its hardware, with licenses dating back to cover all installed systems. IDIS has made extensive use of…

Read More

NIST Releases Tips and Tactics for Dealing With Ransomware

Used in cyberattacks that can paralyze organizations, ransomware is malicious software that encrypts a computer system’s data and demands payment to restore access. To help organizations protect against ransomware attacks and recover from them if they happen, the National Institute of Standards and Technology (NIST) has published an infographic offering a series of simple tips and tactics. NIST’s advice includes: To use antivirus software at all times and make sure it’s set up to automatically scan e-mails and removable media (e.g., flash drives) for ransomware and other malware. To keep…

Read More

INTERPOL Launches App to Better Protect Cultural Heritage

An app launched by INTERPOL will help identify stolen cultural property, reduce illicit trafficking, and increase the chances of recovering stolen works and artefacts. INTERPOL’s ID-Art app enables users ranging from law enforcement to the general public to get mobile access to the INTERPOL database of stolen works of art, create an inventory of private art collections and report cultural sites potentially at risk. Using cutting-edge image-recognition software, ID-Art is free to download from the (Android or Google) Play Store and the (Apple) App Store. “In recent years we’ve witnessed…

Read More

Refreshed Protection of Assets (PoA) Reference Set Offers Timely Recommendations for Security Best Practice

To keep pace with the ever-evolving security industry, ASIS International released an update to the Protection of Assets (PoA) reference set. Refreshed to reflect the changing times and keep security professionals on the leading edge of best practices in the field, this collection is to assist security management directors and professionals responsible for corporate asset protection. This refreshed reference set, which was first published in 1974, constitutes recommended reading for all four of ASIS’s certifications. Teams of subject matter experts across the security continuum volunteered to write, edit, and update…

Read More

Lack of Transparency over Vaccine Trials, Secretive Contracts and ‘Science by Press Release’ Risk Success of Global Covid-19 Response

A lack of transparency in COVID-19 vaccine trials and secrecy over deals between governments and drug companies risks the success of the global pandemic response, new research from Transparency International Global Health and the University of Toronto warns. For Whose Benefit? is an indepth study of the development and sale of the world’s top 20 COVID-19 vaccines, including those developed by AstraZeneca, Moderna and Pfizer/ BioNTech. Through detailed analysis of clinical trial data and nearly 200 contracts for vaccine sales up to March 2021, the report reveals a pattern of…

Read More

Everbridge Completes Acquisition of xMatters to Accelerate Digital Transformation for Enterprise IT and Cyber Resilience

Everbridge, Inc., the leading global player in critical event management (CEM), recently announced the completion of its acquisition of xMatters, a leading provider of IT Service Operations, Cybersecurity and DevOps incident response management. On April 6, 2021, Everbridge announced a definitive agreement between the parties pursuant to which Everbridge would acquire all of the outstanding equity of xMatters. Everbridge’s end-to-end CEM platform, combined with xMatters’ solutions, digitally transforms how organizations manage, respond to, and mitigate IT and cyber incidents, helping organizations protect and enable revenue while reducing expenses. CEM can…

Read More

Single Bollard Stops and Destroys Simulated Bomb Truck

Delta Scientific has announced the successful testing of its Model DSC635, a single shallow foundation bollard design that stopped and destroyed a 15,000 pound test truck with less than two feet of static penetration and 6.14 feet of dynamic. The simulated bomb load remained intact on contained on the truck bed. The test vehicle weighed 15,000 pounds and was traveling over 50 miles per hour. The fronts wheels were pushed back behind the cab and the engine ended up on the passenger side of the seat. The truck was stopped…

Read More

Operation 30 Days at Sea 3.0 Reveals 1,600 Marine Pollution Offences Worldwide

Thousands of suspects, companies and criminal networks engaged in maritime pollution have been detected and investigated in a global INTERPOL-led operation. Operation 30 Days at Sea 3.0 (1-31 March) saw simultaneous action by 300 agencies across 67 countries resulting in an unprecedented 34,000 inspections at sea and inland waterways, coastal areas and ports to detect marine pollution violations. Frontline action followed five months of intelligence collection and analysis, enabling the identification of specific hotspots and suspects behind the criminal, deliberate pollution of the world’s waterways. Preliminary results from the operation’s…

Read More

NIST Offers Tools to Help Defend Against State-Sponsored Hackers

Nations around the world are adding cyber warfare to their arsenal, employing highly skilled teams to launch attacks against other countries. These adversaries are also called the ‘advanced persistent threat,’ or APT, because they possess the tools and resources to pursue their objectives repeatedly over an extended period, adapting to defenders’ efforts to resist them. Vulnerable data includes the sensitive but unclassified information managed by government, industry and academia in support of various federal programs. Now, a finalized publication from the National Institute of Standards and Technology (NIST) provides guidance…

Read More

Eagle Eye Networks and Sitasys Introduce First of its Kind Automated Alarm Handling for Operation Centers

Eagle Eye Networks, a leading global player in cloud video surveillance, and Sitasys, the leading cloud alarm management platform have now integrated the Eagle Eye Cloud VMS and its analytics functionality into the evalink alarm monitoring platform allowing service operations centers to more efficiently and effectively manage an unlimited number of cameras without additional human resources. This development builds on the existing partnership between Sitasys and Eagle Eye Networks to create an enhanced security monitoring platform by implementing a cloud-to-cloud integration of video surveillance and alarm monitoring. This integration allows…

Read More