Survey Highlights Needs for Intelligent Video Surveillance Solutions

Pelco by Schneider Electric recently surveyed 489 end-users within the surveillance industry about their surveillance needs and where they see the industry headed. The survey analyzed how end-users view their current surveillance systems and the expectations they have for emerging technologies. Key findings The study revealed significant and valuable insights into the current state of the video surveillance market, and how users rate their existing systems and market offerings in terms of meeting their business needs. Here are five of the top findings of the study: One-third of end-users believe…

Read More

Safe Cities: Collaborative Monitoring

Cities across the world are constantly changing and evolving faster than at any point in their history. They have become more congested, and criminal activities have soared leading to the destruction of public assets. Compounding the problems, terrorism has become a major concern that presents communities and neighbourhoods with new security problems. Faced with a wealth of challenges, which are often elusive, cities are expected to manage and control the change to allow their communities to have a standard of living that meets modern day expectations. The terror attacks around…

Read More

The Convergence of Physical & Logical Access

For many security professionals, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. While external threats are very real, working to confront internal vulnerabilities can prevent incidents from happening in the first place.…

Read More

Security Considerations for Code Signing

Recent security-related incidents indicate the need for a secure software supply chain to protect software products (also referred to as code) during the development, build, distribution, and maintenance phases. Of particular concern is provisioning and updating software that plays a critical role in platform security. A wide range of software products including firmware, operating systems, mobile applications, and application container images must be distributed and updated in a secure and automatic way to prevent forgery and tampering. An effective and common method of protecting software is to apply a digital…

Read More