Category Archives: Internet Security

Hackers are exploiting the ‘Internet of Things’ – ITProPortal

In 2019, Microsoft made waves at its annual Black Hat conference in Las Vegas, where it confirmed its discovery of a malicious hacker group which was using common Internet of Things (IoT) devices to carry out widespread corporate attacks. The way in? Internet connected devices including a VOIP phone, a Wi-Fi office printer and a video decoder, with compromised devices across multiple customer locations. But these are just a few of the numerous examples of hackers exploiting the so called Internet of Things in recent years. Kirsty Fisher, CFO at Titania explains.

Many of these hacks could have had potentially serious consequences had they gone undetected. For example, in 2017, the Food and Drug Administration (FDA) issued a warning about implantable cardiac devices, which theyd found to be at risk of attack. Used to monitor and control heart function, including heart attacks, vulnerabilities meant hackers could control shocks, alter pacing and deplete the battery.

Tech analyst company IDC predicts that in total there will be 41.6 billion connected IoT devices by 2025. With no central security standards or compliance frameworks underpinning the proliferation of IoT devices, individuals and businesses remain exposed for the near future.

But what makes the Internet of Things and the risks associated with connected devices different from the traditional internet? Largely, the human factor. The IoT doesnt need people to work. It provides technology, media and telecoms companies with the opportunity to create new products and applications, which rely on sensors collecting, reviewing and acting on data. Popular with increasingly tech savvy homeowners, who want the latest smart app-controlled lighting and heating system or interactive media device, the opportunity for suppliers to create new revenue streams is huge.

However, the challenge with this automation is that it creates a huge wealth of sensitive data, which is then being shared amongst more people. Even the FBI has put out warnings about the risks, highlighting to people that hackers can use those innocent devices to do a virtual drive by of your digital life. Businesses are also being targeted through IoT devices as an entry point, with Microsoft and other tech giants highlighting attacks where access to secure networks has been gained via printers and VoIP systems amongst other connected devices.

As networks become increasingly complex and the growth of the Internet of Things shows no signs of slowing, the challenge of keeping businesses cyber secure and minimizing risk is greater than ever.

Spanning the public and private sector from smart cities and transport initiatives to healthcare and smart home/consumer applications, yet with no central standards in place, the onus is very much on those in the IoT ecosystem to work together to create as secure an environment as possible for the time being.

While there is some sector-led collaboration taking place, many organizations are looking to those in technology, media and telecommunications to take the reins and lead the way. Like many large organizations, in the past, businesses in these sectors may have implemented different cyber risk strategies appropriate to a particular department, country or product. With the increased threat from the IoT and new ways in which data is being used and connections to networks made, many are now revising cyber strategies to sit at a corporate, organization wide level. They are also paying more attention to preventative strategies, trying to predict IoT cyber threats before they happen, minimizing attacks that do take place and continuity planning for how they will restore services as soon as possible.

Despite the very real cyber security threat posed by the IoT and the complexity of the networks and parties involved, there is concern that too much control over data could stifle innovation. Many pioneers in the cyber security sector are suggesting the answer lies in the development of more secure devices and improvements in internet security to go alongside this.

Speaking on this issue, Philip Reitinger, President of the not for profit, Global Cyber Alliance neatly summarized the issue: We must move from the Internet of Things to the Secure Internet of Secure Things. First, we must build (more) Secure Things devices, software and services with few vulnerabilities, that are securely configured and automatically updated. Of critical importance, cloud services must come with security embedded and not as an up-sell.

Second, we need the Secure Internet automated collective defense must be built into the network, so that the Internet ecosystem can react as the body does, recognizing infections and fighting them off. We must build Internet Immunity.

Of course, while the industry calls for standards to be developed and the security of devices to be improved, businesses who want to use connected devices without compromising cyber security shouldnt be alarmed. Like the approach some of the larger tech and telcos companies are taking, businesses of all sizes can put in place simple, organization-wide preventative measures to minimize risk to their businesses as well as solutions to help them identify and respond quickly to threats.

Rather than neglecting your core network and putting the focus just on to connected devices, you should seek to improve the security of your network holistically as a weakness in one part can of course impact the rest. To minimize your attack surface and prevent adversarial intrusion by hardening your network, businesses should not underestimate the power of good cyber hygiene. A study by the Online Trust Alliance (OTA) estimated that 93 percent of cyber security incidents large and small could have been avoided if the business in question had basic cyber hygiene practices in place.

In short, cyber hygiene is the continuous cycle of carrying out routine checks on an organizations network, endpoints and applications to identify and fix any network vulnerabilities, protect against cyber threats and maintain online security. Best practice such as deleting old user accounts, firm-wide policies on access and passwords, back up of data, securing physical and cloud databases, checking routers and networks, might seem obvious, but keeping on top of the basics really is the key to cyber hygiene and minimizing the risks associated with security breaches.

Many organizations let basic cyber hygiene practices slip through lack of time and resource, not due to absence of expertise. Indeed, over the last decade many new risk management frameworks have been introduced to combat this; for example, in 2014 in the US, the Federal Government introduced its best practice DHS CDM, or Continuous Diagnostics & Mitigation program.

To comply with this framework, agencies are expected to audit their entire enterprise every three days. In practical terms, if you had 500 devices connected to your network, youd be carrying out nearly 61,000 audits every year. For a bigger organization with 25,000 devices, thatd be over 3 million vulnerability audits every year. Even if youre not aiming for CDM levels of network security, with the number of core network devices increasing across organizations, its not a problem that can be fixed by simply solving the shortage of skilled cyber security professionals in the industry.

Then add to this the need for resources dedicated resources to analyze the threat intelligence needed for effective threat detection and response and the scale of the cyber security challenge is laid bare.

Early threat detection and response is clearly part of the answer to protecting increasingly connected networks, because without threat, the risk, even to a vulnerable network, is low. However, ensuring the network is not vulnerable to adversaries in the first place is the assurance that many SOCs are striving for. Indeed, one cannot achieve the highest level of security without the other.

Even with increased capacity in your SOC to review cyber security practices and carry out regular audits, the amount of information garnered and its accuracy, is still at risk of being far too overwhelming for most teams to cope with.

For many organizations the answers lie in accurate audit automation and the powerful analysis of aggregated diagnostics data. This enables frequent enterprise-wide auditing to be carried out without the need for skilled network assessors to be undertaking repetitive, time consuming tasks which are prone to error. Instead, accurate detection and diagnostics data can be analyzed via a SIEM or SOAR dashboard, which allows assessors to group, classify and prioritize vulnerabilities for fixes which can be implemented by a skilled professional, or automatically via a playbook.

The right automation platforms ultimately provide the capability to check more devices across more networks more frequently, which is essential in combatting the risks that IoT brings. If youre investing in making your network more sophisticated by adding the latest connected devices, it is only wise to make sure that they are secure and also, through regular checks and good cyber hygiene, your core network is as secure as it possibly can be and not exposed to preventable attack.

Kirsty Fisher, Chief Financial Officer, Titania

Visit link:
Hackers are exploiting the 'Internet of Things' - ITProPortal

Distributed Denial of Service (DDoS) Protection Market Will Generate New Growth Opportunities in the next upcoming year – The Daily Chronicle

The Global Distributed Denial of Service (DDoS) Protection Market report serves with all-inclusive, highly-effective, and thoroughly examined information in a well-organized manner, based on actual facts, about the Distributed Denial of Service (DDoS) Protection Market. The whole information from the scratch to the financial and management level of the established industries associated with the Distributed Denial of Service (DDoS) Protection Market at the global level is initially collected by the dedicated team. The accumulated data involves the information about the type and the form of products it manufactures, industrys establishment, annual sales and revenue generation, the demand of the manufactured product in the market, marketing trends followed by the industry, and a lot more important information. The industries majorly comprise the global leading industries that are putting their extreme efforts to maintain the hold over the highly-competitive Distributed Denial of Service (DDoS) Protection Market, about which the thorough information is provided in the report. The global Distributed Denial of Service (DDoS) Protection Market research report thoroughly explains each and every aspect related to the Distributed Denial of Service (DDoS) Protection Market, which facilitates the reports reader to study and evaluate the future market trend and execute the analytical data to promote the business.

Get PDF Brochure:- https://www.coherentmarketinsights.com/insight/request-pdf/1182

This Report Focuses on Top Manufacturers in Global Market, with Sales, Price, Revenue and Market Share for Each Manufacturer, Covering:-

Arbor Networks, Inc., Akamai Technologies, Inc., F5 Networks, Inc., Imperva incapsula, Radware Ltd., Corero Network Security, Inc., Neustar, Inc., Cloudflare, Inc., Nexusguard Ltd., and DOSarrest Internet Security Ltd.

LET US HELP YOU!

1. What are the Known and Unknown Adjacencies Impacting the Distributed Denial of Service (DDoS) Protection Market.

2. What will your New Revenue Sources be?

3. Who will be your Top Customer; what will make them switch?

4. Defend your Market Share or Win Competitors.

5. Get a Scorecard for Target Partners.

On the basis of Product, this report displays the Sales, Revenue, Price, Market Share, and Growth Rate of Each Type &Application Primarily Split into:-

Phenol Formaldehyde Adhesives and Laminates Market Size, Share, Outlook, and Opportunity

Buy-Now this Research Report @https://www.coherentmarketinsights.com/insight/buy-now/1182

Countries Coverage: Worldwide the report contains statistical data for 200 countries and includes comprehensive profiles of the 50 largest consuming countries (United States, China,Italy, India, Canada,Australia, Republic of Korea, Japan, Germany, United Kingdom, France, Brazil, Russian Federation, Spain, Mexico, Indonesia, Colombia, Switzerland, Sweden,Netherlands, Turkey, Saudi Arabia, United Arab Emirates, Belgium, Argentina, Norway,Nigeria, Poland, Austria, Malaysia, Israel, Singapore, Thailand, Denmark, South Africa, Egypt, Philippines, Finland, Chile, Portugal, Kazakhstan, Algeria, Ireland, Pakistan, Czech Republic, Vietnam,Qatar, Peru, Romania, Greece) + the largest producing countries.

Visit Here, for More Information:https://www.coherentmarketinsights.com/blog

STAY HOME!! STAY SAFE!!

See the rest here:
Distributed Denial of Service (DDoS) Protection Market Will Generate New Growth Opportunities in the next upcoming year - The Daily Chronicle

IT Security Market to Remain Competitive | Major Giants Continuously Expanding Market – The News Brok

Latest added Global IT Security Market research study by HTF MI offers detailed product outlook and elaborates market review till 2025. The market Study is segmented by key regions that is accelerating the marketization. At present, the market is sharping its presence and some of the key players in the study areBlue Coat, Cisco, IBM, Intel Security, Symantec, Alert Logic, Barracuda Networks, BT Global Services, CA Technologies, CenturyLink, CGI Group, CheckPoint Software Technologies, CipherCloud, Computer Sciences, CYREN, FishNet Security, Fortinet, HP, Microsoft, NTT Com Security, Panda Security, Proofpoint, Radware, Trend Micro, Trustwave & Zscaleretc. The study is a perfect mix of qualitative and quantitative Market data collected and validated majorly through primary data and secondary sources.

Request Sample of Global IT Security Market Size, Status and Forecast 2019-2025

This report studies the Global IT Security market size, industry status and forecast, competition landscape and growth opportunity. This research report categorizes the Global IT Security market by companies, region, type and end-use industry.Scroll down 100s of data Tables, charts and graphs spread throughPages and in-depth Table of Content on IT Security Market by Type (, Internet security, Endpoint security, Wireless security, Network security & Cloud security), by End-Users/Application (Commercial, Industrial & Military and Denfense) and Region Forecast to 2025. Early buyers will get 10% customization on study.

to Avail deep insights of Global IT Security Market Size, competition landscape is provided i.e. Revenue Analysis (M $US) by Company (2017-2019), Segment Revenue Market Share (%) by Players (2017-2019) and further a qualitative analysis is made towards market concentration rate, product/service differences, new entrants and the technological trends in future.

Enquire for customization in Report @https://www.htfmarketreport.com/enquiry-before-buy/1870628-global-it-security-market

Competitive Analysis:The major players are focusing highly on innovation in technologies to improving efficiency level. The industry growth outlook is captured by ensuring ongoing process improvements of players and optimal strategies taken up by companies to fight COVID-19 Situation. Company profile section of players such as Blue Coat, Cisco, IBM, Intel Security, Symantec, Alert Logic, Barracuda Networks, BT Global Services, CA Technologies, CenturyLink, CGI Group, CheckPoint Software Technologies, CipherCloud, Computer Sciences, CYREN, FishNet Security, Fortinet, HP, Microsoft, NTT Com Security, Panda Security, Proofpoint, Radware, Trend Micro, Trustwave & Zscaler includes its relevant information like name, subsidiaries, website, headquarters, market rank, gain/drop in market position, historical background or growth commentary and top 3 closest competitors by Market capitalization / revenue along with contact information. Each companys revenue figures, Y-o-Y growth rate and gross & operating margin is provided in easy to understand tabular format for past 5 years and a separate section on recent development like mergers & acquisition, patent approval and new launch etc.

Market Segments: The Global IT Security Market has been divided into type, application, and region.

On The Basis Of Type: , Internet security, Endpoint security, Wireless security, Network security & Cloud security.On The Basis Of Application: Commercial, Industrial & Military and Denfense

On The basis of region, the IT Security is segmented into countries, with production, consumption, revenue (million USD), and market share and growth rate in these regions, from 2014 to 2025 (forecast), see highlights below

North America (USA & Canada) {Market Revenue (USD Billion), Growth Analysis (%) and Opportunity Analysis} South Central & Latin America (Brazil, Argentina, Mexico & Rest of Latin America) {Market Revenue (USD Billion), Growth Share (%) and Opportunity Analysis} Europe (The United Kingdom., Germany, France, Italy, Spain, Poland, Sweden, Denmark & Rest of Europe) {Market Revenue (USD Billion), Growth Share (%) and Opportunity Analysis} Asia-Pacific (China, India, Japan, ASEAN Countries, South Korea, Australia, New Zealand, Rest of Asia) {Market Revenue (USD Billion), Growth Share (%) and Opportunity Analysis} Middle East & Africa (GCC, South Africa, Kenya, North Africa, RoMEA) {Market Revenue (USD Billion), Growth Share (%) and Opportunity Analysis} Rest of World

Buy Single User License of Global IT Security Market Size, Status and Forecast 2019-2025 @https://www.htfmarketreport.com/buy-now?format=1&report=1870628

What we can offer in the Strategic OpportunitiesHTF MI analysts identify in broad terms why some companies are gaining or losing share within a given market segment. Every company have its own story and changes in market share are knowingly the most important indicator of management effectiveness & corporate strategies; it is important to identify those who are succeeding in the market and those who are failing, and the cause of the market flux. Key Financial Ratios are also considered to get towards root-cause analysis of each companies such as Return on Assets, ROCE, and Return on Equity etc. From this understanding of the forces driving the market, the analyst team prepares its strategic recommendations. Ultimately, its that market wisdom, beyond the market data and forecasts, which is the most valuable component of HTF MI market research studies and provides our clientele with the greatest competitive edge with top level quality standards.

How insights and forecasts from the reports could benefit you:

To understand latest market dynamics and Demand & Supply situation Gauging timing and size of R&D activities to gear up or down production cycle to meet demand Ways to increase or decrease sales force activities Supporting & Adjust Investment/business decisions Benchmark and judge own competitiveness Assisting in allocating marketing investments Supporting company financial and cash flow planning Open up New Markets To Seize powerful market opportunities Identify Key Business Segments, Market proposition & Gap Analysis

Browse for Full Report at:https://www.htfmarketreport.com/reports/1870628-global-it-security-market

Thanks for reading this article; you can also get individual chapter wise section or region wise report version like GCC, Australia, LATAM, North America, Europe or Asia.

About Author:HTF Market Report is a wholly owned brand of HTF market Intelligence Consulting Private Limited. HTF Market Report global research and market intelligence consulting organization is uniquely positioned to not only identify growth opportunities but to also empower and inspire you to create visionary growth strategies for futures, enabled by our extraordinary depth and breadth of thought leadership, research, tools, events and experience that assist you for making goals into a reality. Our understanding of the interplay between industry convergence, Mega Trends, technologies and market trends provides our clients with new business models and expansion opportunities. We are focused on identifying the Accurate Forecast in every industry we cover so our clients can reap the benefits of being early market entrants and can accomplish their Goals & Objectives.

Contact US :Craig Francis (PR & Marketing Manager)HTF Market Intelligence Consulting Private LimitedUnit No. 429, Parsonage Road Edison, NJNew Jersey USA 08837Phone: +1 (206) 317 1218[emailprotected]

Connect with us atLinkedIn|Facebook|Twitter

Read the rest here:
IT Security Market to Remain Competitive | Major Giants Continuously Expanding Market - The News Brok

Internet Of Things Iot Security Market : Global Industry Analysis And Opportunity Assessment 2026 Cisco Systems, Inc., Ibm Corporation, Intel…

An analysis of competitors is conducted very well in the Internet Of Things Iot Security Market report which covers vital market aspects about the key players. Moreover, the report gives out market potential for many regions across the globe based on the growth rate, macroeconomic parameters, consumer buying patterns, their preferences for particular product and market demand and supply scenarios. It gives significant information and data pertaining to their insights in terms of finances, product portfolios, investment plans, and marketing and business strategies. Detailed market analysis has been performed here with the inputs from industry experts. GlobalInternet Of Things Iot Security MarketReport the new research report adds in Data Bridge Market Researchs reports database. This Research Report spread across 329 Page, 53 No of Tables, and 244 No of Figures with summarizing Top companies, COVID-19 impacts and supports with tables and figures.

Global Internet Of Things (Iot) Security Market Is Set To Witness A Healthy Cagr Of 34.10% In The Forecast Period Of 2019 To 2026. The Report Contains Data Of The Base Year 2018 And Historic Year 2017. This Rise In The Market Can Be Attributed Due To Surging Demand For Enhanced Privacy And Increasing Government Efforts To Implement Stringent Regulations To Restrict The Amount Of Data Collected By Iot Devices By Industries Such As Bfsi, Retail, And Healthcare.

Access Sample Copy Of Internet Of Things Iot Security Market @https://www.databridgemarketresearch.com/request-a-sample/?dbmr=global-internet-of-things-iot-security-market&skp

Internet Of Things Iot Security Market Key Players:

Few Of The Major Competitors Currently Working In The Global Internet Of Things (Iot) Security Market Are Cisco Systems, Inc., Ibm Corporation, Intel Corporation, Infineon Technologies Ag, Symantec Corporation, Gemalto Nv, Allot, Fortinet, Inc., Zingbox, Mocana, Securithings, Centri Technology, Armis, Inc., Forgerock, Newsky Security, Mcafee, Llc, At&T Intellectual Property, Check Point Software Technologies Ltd., Trustwave Holdings, Inc., Verizon, Ptc Among Others

Highlights of Internet Of Things Iot Security Market the report:

The report contains extensive usage of both primary and secondary data sources. The report involves the study of various factors affecting the Internet Of Things Iot Security market, including the market environment, government policy, historical data, competitive landscape, and present trends. Further, it also involves upcoming technologies, innovations, and the technical progress in related industry, along with market barriers, opportunities, market risks, and challenges.

Attributes

Details

Base year

2019

Historic data

20152019

Forecast period

20202029

Regional scope

North America, Asia Pacific, Europe, Latin America, and Middle East & Africa

Report coverage

Company share, market analysis and size, competitive landscape, growth factors and trends, and revenue forecast

Table Of Contents: Global Internet Of Things Iot Security Market

Part 01: Executive Summary

Part 02: Scope Of The Report

Part 03: Research Methodology

Part 04: Internet Of Things Iot Security Market Landscape

Part 05: Pipeline Analysis

Part 06: Internet Of Things Iot Security Market Sizing

Part 07: Five Forces Analysis

Part 08: Internet Of Things Iot Security Market Segmentation

Part 09: Customer Landscape

Part 10: Regional Landscape

Part 11: Decision Framework

Part 12: Drivers And Challenges

Part 13: Internet Of Things Iot Security Market Trends

Part 14: Vendor Landscape

Part 15: Vendor Analysis

Part 16: Appendix

Get In-depth TOC of Internet Of Things Iot Security Market Report @ https://www.databridgemarketresearch.com/toc/?dbmr=global-internet-of-things-iot-security-market&skp

Segmentation of the Internet Of Things Iot Security market is analysed on the basis of market share, production, consumption, market size, revenue, CAGR, and more factors.

Competitive landscape Analysisprovides mergers and acquisitions, collaborations along with new product launches, heat map analysis, and market presence and specificity analysis.

The report offers a valuable source of guidance on the state of the industry and provides key statistics and direction for companies and individuals interested in the Internet Of Things Iot Security market. The regional market segment covers North America, Europe, Asia-Pacific, Latin America, Middle East, and Africa and incorporates clear market definitions, arrangements, cost structures, producing forms, improvement approaches, and plans.

Regional and Country- level Analysisdifferent geographical areas are studied deeply and an economic scenario has been offered to support new entrants, leading market players, and investors to regulate emerging economies. The top producers and consumers focus on production, product capacity, value, consumption, growth opportunity, and market share in these key regions, covering

Region

Countries

North America

U.S. & Canada

Europe

U.K., Germany, France, Italy, Spain, Hungary, BENELUX, NORDIC, Rest of Europe

Asia-Pacific

China, India, Japan, South Korea

Australia, New Zealand, Rest of Asia-Pacific

Latin America

Brazil, Mexico, Argentina, Rest of Latin America

Middle East and Africa

Israel, GCC, South Africa, Rest of Middle East and Africa

Detailed analysis of the COVID-19 impact will be given in the report, as our analyst and research associates are working hard to understand the impact of COVID-19 disaster on many corporations, sectors and help our clients in taking excellent business decisions. We acknowledge everyone who is doing their part in this financial and healthcare crisis.

Some important Questions Answered in Internet Of Things Iot Security Market Report are:

Contact For Any Query or to Get Customized Report @ https://www.databridgemarketresearch.com/speak-to-analyst/?dbmr=global-internet-of-things-iot-security-market&skp

Thanks for reading this article you can also get individual chapter wise section or region wise report version like North America, Europe, MEA or Asia Pacific.

About Data Bridge Market Research:

Data Bridge set forth itself as an unconventional and neoteric Market research and consulting firm with unparalleled level of resilience and integrated approaches. We are determined to unearth the best market opportunities and foster efficient information for your business to thrive in the market. Data Bridge endeavours to provide appropriate solutions to the complex business challenges and initiates an effortless decision-making process. Data bridge is an aftermath of sheer wisdom and experience which was formulated and framed in the year 2015 in Pune.

Contact:

Data Bridge Market Research

US: +1 888 387 2818

UK: +44 208 089 1725

Hong Kong: +852 8192 7475

[emailprotected]

See more here:
Internet Of Things Iot Security Market : Global Industry Analysis And Opportunity Assessment 2026 Cisco Systems, Inc., Ibm Corporation, Intel...

Click Fraud Risk as Smartphone Is Discovered with Pre-Installed Malware – Infosecurity Magazine

Security researchers have discovered malware pre-installed on a Chinese smartphone and designed to facilitate mobile ad fraud on a massive scale.

Upstreams Secure-D Lab said it recorded 19.2 million suspicious transactions, which would have covertly signed-up unsuspected usersto subscription services without their permission.

It traced them back to around 200,000 Transsion Tecno W2 handsets used mainly in Egypt, Ethiopia, South Africa, Cameroon and Ghana although suspicious transactions were also detected in 14 other countries.

The security firm analyzed Tecno W2 handsets to find out more, and discovered that they had been pre-installed with well-known backdoor and malware downloader Triada. This in turn installed a Trojan known as xHelper onto compromised devices as soon as they connect to the internet, Secure-D explained.

When xHelper components were found in the right environment and connected to Wi-Fi or 3G network (e.g. inside a South African network), they made queries to find new subscription targets, and then proceeded to make fraudulent subscription requests, it continued.

These happened automatically and without requiring a mobile phone operators approval. The investigation found evidence in the code that linked at least one of the xHelper components (com.mufc.umbtts) to subscription fraud requests.

The umbtts application was apparently capable of generating clicks on ad banners without users knowledge.

According to a Google investigation, Triada is the result of a vendor somewhere in the manufacturing supply chain placing it on device firmware, usually without the knowledge of developers or manufacturers.

Users of the device were urged to check for high data usage and unexpected charges.

While Transsion may not have been aware of the malware when the devices were sold to consumers, they do suffer the consequences and negative press related to this issue, argued KnowBe4 security awareness advocate Erich Kron.

This is an example of how important it is to take supply chain security seriously, as something done by a supplier or business partner can seriously impact your brand or even lead to legal liabilities.

Link:
Click Fraud Risk as Smartphone Is Discovered with Pre-Installed Malware - Infosecurity Magazine

The ability to hear, be heard and be understood is vital The importance of audio communication devices in security – IFSEC Global

IFSEC Global sits down with Lars Paulsson and Erik Hoffmann from audio communications expert Zenitel, to discuss why networked audio devices are becoming an integral part of the security and safety ecosystem.

No longer do security systems simply comprise a lone CCTV camera generating distorted feedback to a security guard. Instead, integrated solutions work together to ensure access control systems and surveillance cameras provide a much more well-rounded and responsive information management platform, communicating between each other and offering genuine insight into risks and potential breaches.

And increasingly it seems, network audio solutions are becoming a key part of this process. As a communication device, it can provide the final piece of the jigsaw to ensure security and safety measures are met, with devices now more interoperable with access control and surveillance platforms than ever before.

This, explains Zenitel, is why businesses need to be considering the use of audio devices to operate within their own systems. As technology continues to evolve, the company believes that audio is set to play a key role in the future of biometric systems and everyday life, with audio analytics playing a major part.

Its certainly a belief met by those in the likes of Silicon Valley, too. Worldwide shipments of smart audio devices reached nearly 100 million units in Q1 2020, while Amazons Alexa and Apples Siri are now as much household names as Dyson and Sky TV.

Why then, is an integrated audio solution so beneficial to an overall security system? Put simply, communication, answers Lars Paulsson, Executive Vice President at Zenitel. For any security team, this is vital. Any security and safety system ultimately needs three key parts: access control, video surveillance and the ability to communicate.

We now have integrations with all the major platforms in the security industry our solutions are interoperable and therefore easy to combine with VMS platforms from major vendors such as Genetec and Milestone, as well as access control systems from AMAG, LenelS2 and many others. Were committed to the open standards route, so customers are able to provide the most well-rounded system to provide the highest levels of security and safety.

And the quality in our audio systems is now excellent, so end-users no longer need to be concerned with muffled tones or poor-quality sound, which could result in miscommunication.

Cyber security remains a concern for many when adding new devices to networks. Hackers are always on the lookout for devices on internal networks that may be vulnerable to attack, often utilising backdoors in physical security devices to gain access to the entire system. Working with major customers in sectors such as healthcare and transport, Zenitel is quick to highlight its work in this sphere.

Weve been driving cyber security initiatives in our products for several years, explains Erik Hoffmann, Head of Product Management. It is crucial that installers and end-users can be confident that when integrating our audio devices onto a network, it will be robust and well protected both in the physical and cyber environments. Were a member of the for Internet Security and were one of the first to implement CIS controls into audio devices.

While its taken a little longer than its surveillance counterpart, audio devices have experienced a revolution in connectivity and integration with other systems since the move to an IP-based solution, as Zenitels Head of Product Management, Erik Hoffmann, explains.

We launched the first major IP/SIP-based products around 2006. Since then more and more devices have been able to integrate into a single system. As well as being quicker and more advanced than analogue systems, the move has enabled greater integration with partner technologies, such as video management services and access control systems.

Going forwards, were now moving on to utilising edge architecture. Edge devices are far more powerful and advanced than weve previously seen, in a cost-efficient way. This wont take away from the importance of the cloud or the local server, but instead edge solutions will leverage the strengths of computing in the cloud and at the edge bringing unprecedented levels of security, scalability and resilience.

Like many industries, COVID-19 has had an impact on the sector though Lars and Erik believe this could actually result in a greater uptake of networked audio systems. As a touchless method of communication to relay information to occupants, it provides an easy method for interaction.

Lars expands on this point: We certainly believe there will be a growing uptake of biometric and touchless devices, of which audio can form a key part of such a solution. I believe this will be because of two key developments. There is the need to interact and communicate with individuals moving in and out of spaces, and with this comes the need to provide frictionless access without physical intervention. Audio provides a solution to both challenges.

Its not just COVID, either, that is set to affect the growth in the audio market. While analytics have been a relatively standardised part of video surveillance devices for some time now, it would appear audio is now receiving investment in this field.

It took some time for users to really understand and utilise analytics in video, because the concept was relatively new to many. However, with customers now more aware of this type of technology, audio analytics is proving beneficial almost straight away. Were now working with technology partners who can provide possibilities such as voice identification, mood identification (where tone and volume of speech is assessed) and gunshot identification, explains Erik.

Speaking to Lars and Erik, it appears that networked audio devices are set to play an increasingly important role in the entire security and safety ecosystem. As Lars summarises: The ability to hear, be heard and be understood is crucial to the role of all security professionals, in all environments.

Find out more about Zenitels network audio solutions.

Read more here:
The ability to hear, be heard and be understood is vital The importance of audio communication devices in security - IFSEC Global

Wrap your ears around Episode 451 of the Two Blokes Talking Tech podcast – Tech Guide

Join the Two Blokes Talking Tech Tech Guide editor Stephen Fenech and EFTMs Trevor Long for Episode 451 of the entertaining and informative podcast which discusses the weeks biggest tech stories and products.

On this weeks show, Hisense unveils Dual Cell TV, Fitbit releases new range of devices, Google offer Duo for Android TVs, Norton internet security adds Dark Web monitoring, LG introduce Tone Free earbuds with a UV case that can kill germs and we get the first look at Call of Duty Black Ops Cold War.

You can listen to the show right here on the Tech Guide site using the audio player below.

Click on the Two Blokes Talking Tech link at the top of the page and youll be able to find earlier episodes of Two Blokes Talking Tech to listen to.

It is also possible to subscribe to the popular weekly tech podcast onApple Podcasts.

Stephen is the Tech Guide editor and one of Australia's most respected tech journalists. He is a regular on radio and TV talking about the latest tech news, products and trends.

Read more here:
Wrap your ears around Episode 451 of the Two Blokes Talking Tech podcast - Tech Guide

Taking stock of the Chinese factor in American elections – Arab News

There is no doubt that Beijing will attempt to take advantage of developments in US politics until and after the presidential election in November.There are complex opportunities for China to conduct a wide range of activities against Washington and its allies. The US, meanwhile, will be putting up defensive walls, coordinating with allies and aiding them as a countermeasure to Chinas typical interfering strategies.US counterintelligence officials have found that foreign states are using covert and overt influence measures to sway the vote. They said that China does not want Donald Trump to be re-elected, while Russia wants to damage the chances of Democratic challenger Joe Biden. More generally, foreign powers are trying to sway voter preferences, change US policies, increase discord in the country and undermine the American peoples confidence in our democratic process.The counterintelligence report stated that China prefers that President Trump whom Beijing sees as unpredictable does not win re-election, and has been expanding its influence efforts. However it added that it would be difficult for our adversaries to interfere with or manipulate voting results at scale.The relationship between the US and China, the worlds largest economies, is confrontational in nature. It was already strained before the coronavirus outbreak as a result of Asian security issues, in particular Chinas expansion of its maritime interests and threats to neighbors.Two years ago, Trump began escalating a trade dispute with Beijing that has now deteriorated into retaliatory tariffs and become a trillion-dollar trade war. Meanwhile, the pandemic has caused an economic slowdown in the US that has the Trump campaign worried about his chances of re-election.China knows that applying additional pressure on trade in the run-up to the election could hurt Trumps chances, so it is no surprise that this is exactly what it is doing. Beijing is reported to have a history of interfering in US elections. Intelligence agencies concluded that Chinese hackers meddled in the 2016 presidential election and the 2018 midterms. Internet security experts said there are signs that hackers linked to China are engaged in attacks on US political targets ahead of this years poll.While some other countries, including Russia and Iran, might also be identified as having an interest in undermining the election by creating strategic distractions and tactical challenges, carrying out cyberattacks and disinformation campaigns and, perhaps, engineering confrontations in international maritime waters, Beijing is challenging US to a greater extent than usual because of the pandemic.China is emerging from the first wave of infections while much of the West continues to suffer. Beijing is using this to apply pressure through mechanisms such as aid programs, and in its negotiating tactics. The ultimate aim is to influence the US election so that the unpredictable Trump is defeated.China denies US claims that it hacks American businesses, politicians or government agencies. The US presidential election is an internal affair (and) we have no interest in interfering in it, said Foreign Ministry spokesman Geng Shuang. This is, of course, a common response by Washingtons rivals during US election cycles.

Trump might sense an opportunity to boost his chances by turning up the heat on China or its interests just to goad Beijing. If so, Chinas response will be critical.

Dr. Theodore Karasik

Chinese leaders have long emphasized the importance of influencing foreign public opinion as part of their strategic doctrine. In 2006, President Hu Jintao said China must strengthen the construction of foreign-related media and networks that promote the country. He called for the Chinese to innovate in foreign propaganda methods and strengthen external propaganda in a language that is easily understood and accepted by the public in other countries. He also underlined the need for China to do a good job with work in the Western mainstream media to increase trust and dispel doubts about the nations rise. Such words, coupled with advanced information-warfare tools, help to augment well-planned campaigns that take advantage of online resources.Chinas aggressive posture toward the US during the upcoming election might require some uncomfortable decisions. Trump might sense an opportunity to boost his chances by turning up the heat on China or its interests just to goad Beijing. If so, Chinas response will be critical.

Disclaimer: Views expressed by writers in this section are their own and do not necessarily reflect Arab News' point-of-view

See more here:
Taking stock of the Chinese factor in American elections - Arab News

How to choose and set up a business VPN – TechRadar

Safety and security remain essential goals while online, especially when employees are conducting business activities. After all, so many businesses suffer security breaches, and these types of attacks on businesses are on the rise.

A VPN, or virtual private network is a way to route communications through a network of private servers via an encrypted tunnel, rather than just by using the public internet.

And having a business VPN established is an essential step for employees to be able to enhance their internet activities. They allow more secure communication, anonymity, and the ability to bypass geo-restrictions to be able to conduct business with ease in other countries.

When talking about business VPNs, they can generally be divided into two types. The first is client-to-site, where an individual user via their PC (or other device) connects to the VPN provider, which secures the business network from the public environment. The second is site-to-site, which is for remote access VPN connections between entirely different networks.

There is also a key difference between a personal VPN and a corporate VPN. With a personal VPN, a consumer gets their individual connection to access the internet with their device. While they gain privacy, and anonymity, this does not offer the additional benefits that a business would need from their VPN connection.

Rather, with a business VPN (also known as a corporate VPN), the goal is to be able to have employees be able to connect, securely and privately to the corporate network, whether when working from home, or at a satellite location. These employees also need the privacy that an encrypted connection provides, but in addition, benefit from access to the shared resources on a corporate server, typically work files.

Previously, most companies set up their business VPN by running their own corporate server. This has the downsides of needing a server up and running 24/7, with the need for dedicated IT support, and the requirement of administering this network. This is referred to as an On-premises Deployment.

The more modern solution is to outsource all of this to a cloud VPN provider. This makes things much simpler, as there is no need to run a server locally at the business, as it gets run by the provider.

Not every VPN provider offers the option for a business VPN, but some larger ones do. Perimeter 81 and NordVPN Teams are two prime examples of those that do.

The offering from Perimeter 81 is excellent - particularly if you and your team tend to work frequently with multiple devices. Its zero-trust network and customizable secure systems means that security is second-to-none, while the feature list goes on and on. Plus it gives you the flexibility to choose the ideal plan for you from a number of options.

With NordVPN, its business-centric features include using existing business credentials, so there is no need to create new password credentials. It also includes priority support, that works at the speed of your business, with the promise to assist within three hours. It has a centralized control panel which allows management of every user account from a single location. Finally, it allows for secure remote access of company resources, and can protect all platforms, from phones, to computers and laptops.

Perhaps most importantly, using a business VPN from a cloud provider makes it quite simple, as they do the heavy lifting on their end.

Compare the best overall VPNs for business and consumers:

Here is the original post:
How to choose and set up a business VPN - TechRadar

Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020 – Social News XYZ

Home General Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020

Business Wire IndiaVeriSign, Inc. (NASDAQ: VRSN), a global provider of domain name registry services and internet infrastructure, today announced that the second quarter of 2020 closed with 370.1 million domain name registrations across all top-level domains (TLDs), an increase of 3.3 million domain name registrations, or 0.9 percent, compared to the first quarter of 2020.1,2 Domain name registrations have grown by 15.3 million, or 4.3 percent, year over year.1,2

The .com and .net TLDs had a combined total of 162.1 million domain name registrations in the domain name base3 at the end of the second quarter of 2020, an increase of 1.4 million domain name registrations, or 0.9 percent, compared to the first quarter of 2020. The .com and .net TLDs had a combined increase of 6.0 million domain name registrations, or 3.8 percent, year over year. As of June 30, 2020, the .com domain name base totaled 148.7 million domain name registrations, and the .net domain name base totaled 13.4 million domain name registrations.

New .com and .net domain name registrations totaled 11.1 million at the end of the second quarter of 2020, compared to 10.3 million domain name registrations at the end of the second quarter of 2019.

Verisign publishes the Domain Name Industry Brief to provide internet users throughout the world with statistical and analytical research and data on the domain name industry. The second quarter 2020 Domain Name Industry Brief can be obtained at Verisign.com/DNIB.

About Verisign

Verisign, a global provider of domain name registry services and internet infrastructure, enables internet navigation for many of the worlds most recognized domain names. Verisign enables the security, stability, and resiliency of key internet infrastructure and services, including providing root zone maintainer services, operating two of the 13 global internet root servers, and providing registration services and authoritative resolution for the .com and .net top-level domains, which support the majority of global e-commerce. To learn more about what it means to be Powered by Verisign, please visit Verisign.com.

VRSNF

2020 VeriSign, Inc. All rights reserved. VERISIGN, the VERISIGN logo, and other trademarks, service marks, and designs are registered or unregistered trademarks of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.

1 The figure(s) includes domain names in the .tk country-code TLD (ccTLD). .tk is a free ccTLD that provides free domain names to individuals and businesses. Revenue is generated by monetizing expired domain names. Domain names no longer in use by the registrant or expired are taken back by the registry and the residual traffic is sold to advertising networks. As such, there are no deleted .tk domain names. https://www.businesswire.com/news/home/20131216006048/en/Freenom-Closes-3M-Series-Funding#.UxeUGNJDv9s.

2The generic top-level domain (gTLD) and ccTLD data cited in the brief: (i) includes ccTLD Internationalized Domain Names (IDNs), (ii) is an estimate as of the time the brief was developed and (iii) is subject to change as more complete data is received. Some numbers in the brief may reflect standard rounding.

3 The domain name base is the active zone plus the number of domain names that are registered but not configured for use in the respective TLD zone file plus the number of domain names that are in a client or server hold status. The .com and .net domain name registration figures are as reported in Verisigns most recent SEC filings.

View source version on businesswire.com:https://www.businesswire.com/news/home/20200827005704/en/

Like Loading...

Related

Read the original:
Internet Grows to 370.1 Million Domain Name Registrations at the End of the Second Quarter of 2020 - Social News XYZ