State of Security Training in India

The Private Security Sector (PSS), which employs the second largest manpower in India after the agriculture sector, is a moderately motivated sector of the country. The sector engages approximately seven million people today and is growing at an annual rate of 25 per cent. But unfortunately, majority of job-seekers and already employed members of the sector are found unwilling to adopt security profession and resort to it as their last option. The employment normally comprises youth who lack in education and training, and hail from the weaker sections of the…

Read More

Paradigm Shift in the Security Threat Landscape

With the evolution of Internet of Things (IoT) the security challenges for industrial security are increasing exponentially. The 25 billion globally connected devices in 2015 are expected to double by 2020. On an average, each individual is expected to be connected to six things online in terms of sensors, smart objects and device clustered systems. Under this scenario, and given the fact that the weakest link will continue to define the robustness of any organizations security architecture, security vulnerabilities are poised to increase manifold, in terms of the scale, intensity…

Read More

How to know Access Control in The Cloud is Secure?

Access Control as a Service (ACaaS) has grown into a mainstream product offering from many access control manufacturers, and it is gaining significant growth in the market. With the adoption of this technology, end users and integrators need to ask several pertinent questions. It is extremely important to understand the security of the communications, the quality of service, who the provider of the cloud service is, the redundancy of the servers, disaster recovery, scalability of the platform, and finally the stability and availability of the service. With this information end…

Read More

Change Approach to Vulnerability Management

Skybox™ Security has announced the availability of threat-centric vulnerability management (TCVM) for the Skybox™ Security Suite, signalling a fundamental shift in the approach to managing and prioritizing vulnerabilities. TCVM changes vulnerability management from an exercise of trying to patch ‘everything all the time’ to focused, intelligent action that considers real-world threats. TCVM does this by correlating multiple factors to determine vulnerability risk, including: The context of an organization’s environment such as potential attack paths and security controls in place, each asset’s exposure and importance to the business, and details of…

Read More

Critical Infrastructure Security and Smart Cities

Recently there have been several policies, simulations, active designing and implementation of smart city concepts in several locations around the world including India. Today, the world is talking about connecting everything to the internet. The fourth industrial revolution (Industry 4.0), a term used to draw together cyber-physical systems, the Internet Services and Internet of Things (IoT), has started to revolutionize projects such as smart grids and smart cities. There is no universally accepted definition of a smart city, with different schools of thoughts describing this concept in terms of annotations…

Read More

When Surveillance Meets AI

Security camera shipment continues to grow at 14.1% CAGR to reach 190 million units in 2020 (according to IHS report, September 2016) however, revenue growth slowed to 8.1% CAGR. There are too many cameras and video footage to be consumed by human operators. Most security video footages are erased or over-written without being watched. Video analytics technology was once perceived as a solution to automate the utilization of the abundant video footage resources. By means of identifying and tagging the appearance of certain patterns in a video, the system could…

Read More

Keeping Data Under Lock and Key

BCDVideo looks at how you can protect yourself against cyber attacks with its latest SMARTtechnology In recent months, there has been a multitude of cyber-attacks targeting video surveillance systems and the Internet of Things (IoT). In the aftermath of the Mirai botnet attack, an incredibly powerful distributed denial-of-service (DDoS) attack, some of the largest surveillance manufacturers scrambled to address the extreme vulnerabilities built into their devices. During the October 2016 attack, Mirai, an open-source malware strain that scans the Internet for routers, cameras, DVRs, and IoT devices only protected by…

Read More

IP Camera Settings for Difficult Lighting Conditions

If you’re a technician installing IP cameras for a bank or credit union, you know how challenging it can be to capture clear video surveillance images in dynamic lighting conditions. While some banks have controlled indoor lighting, others have bright sunlight pouring in through floor-to-ceiling windows in ATM vestibules. Other businesses, including quick service restaurants (QSRs), face similar challenges. To help you get the best video quality possible, some tips on which IP camera settings to use in different lighting scenarios will be pertinent. It’s important to note that surveillance…

Read More