featured item

Perimeter Security, Now A Simpler Mission

Standard Comms presented its Smart Sound Perimeter system that has the ability, using audio and infrasonic sensors, to not just detect perimeter breaches but details of the breach, according to Zach Thompson, a company representative. The company’s sensor technology is already used to help NASA detect caves on Mars among other applications on Earth, even in the harsh environment of Antarctica, Thompson explained.

featured item

Smart Cities? Not Until Those Cyber Weaknesses Get Sorted

Smart Cities aren’t that smart at the moment, argues Vince Warrington at Protective Intelligence, primarily because they ultimately create greater cyber security risks for citizens.

What does Benny Hill have to do with the Smart Cities of the future? You may think very little, but there is a connection. Back in 1969 Hill played Professor Simon Peach in the classic caper movie The Italian Job, where his character is recruited into Michael Caine’s criminal gang. Computer expert Peach’s role in the heist was to replace the programming of the Turin traffic control system, causing a paralysing traffic jam which enables three Mini Coopers to escape with rather a lot of gold.

featured item

Advancing Asia’s Digital Strategy and Roadmap at CommunicAsia, EnterpriseIT and BroadcastAsia 2017

Newly created ConnecTechAsia2018 to comprise CommunicAsia, NXTAsia and BroadcastAsia

Singapore – CommunicAsia, EnterpriseIT and BroadcastAsia 2017 wrapped up last week after a three-day exhibition and conference addressing technologies and strategies for smart cities and digital ecosystems driving the digital strategies and transformation roadmaps of governments and enterprises in Asia.

featured item

How To Make 2017 the Year of IoT Security

People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real.

Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale.

featured item

IoT Fuels Next-Gen Law Enforcement

Investments in equipment and services related to the internet of things by the Departments of Homeland Security and Justice have tripled over the past six years, contributing a $600 million smart security industry, a new study finds. Spending on cloud services, which underpin IoT technologies, is only expected to continue to climb as companies like Amazon and Google increasingly invest in the federal space.

featured item

Why Security Must Become Part of the IoT Design Process

For all the talk about how the Internet of Things is the wave of the future, the fact is that the future is here. The IoT is now a part of our everyday lives, and is only continuing to grow and advance.

The simple fact that there are so many connected devices now — the average home has about seven connected devices operating each day, while the most connected families have 15 or more devices — has made the IoT an attractive target for hackers. No longer do we only have to worry about computers, tablets, and mobile phones, but we also need to be concerned about the security of televisions, refrigerators, smart hubs, and more.

featured item

CBP Reports Advances in Biometrics

Customs and Border Protection may be in the final lap in a long-running effort to develop a workable solution to biometrically verify the identity of travelers when they arrive and depart from U.S. airports, a top agency official told Congress.

The Department of Homeland Security has been searching for years for ways to implement a biometric entry/exit system to verify the identities of foreign travelers moving through U.S. airports.

featured item

Personalising Energy Security With Robust Analytics

Recent security concerns surrounding WannaCry ransomware are all the more relevant to prosumers because they might be connected to utilities in terms of both a supply and demand. Suppose a prosumer sells excess power back to the local utility for wind turbines or solar panels, for example. This special connectivity to the power grid could make the technology that runs renewable energy transmissions even more susceptible to debilitating ransomware attacks.

featured item

Dahua Technology Opens a Subsidiary in Sofia, Bulgaria

Dahua’s Bulgarian office will be the first Dahua office in the Balkans and will be responsible for activities regarding sales, marketing and other services within the region

Dahua Technology, a leading security solution provider in global security industry, is establishing an office in Sofia, Bulgaria at the beginning of June, 2017. Headquartered in China, Dahua is planning to offer all its security solutions and services to Bulgarian market. This will be the first Dahua office in the Balkans and all future activities within the region will be managed from here.

featured item

International Academia Visit to Dahua Technology

On the afternoon of May 9th, 2017, a group of distinguished guests from Belarusian State University and Zhejiang Shuren University visited Dahua technology, to gain in-depth understanding of Dahua’s engineering establishment and seek cooperation with Dahua. Mr. Michael Chen, Dahua Vice President, General Manager of Overseas Business, hosted the reception.