Is your organization struggling with false alarms? If so, consider artificial intelligence-based video analytics using machine learning technology to spot and virtually eliminate false alarms. But before selecting an advanced analytic software offering, ask yourself these seven questions.
As a former Marine with expertise in counterintelligence, Human Intelligence (HUMINT) and Technical Surveillance Counter-Measures (TSCM), Jason Passwaters leveraged his international war fighting experience and built uniquely qualified teams at iSIGHT Partners, and then in co-founding Intel 471. His military service taught him to emphasize three areas that can make threat intelligence more targeted and actionable for organizations.
As the light at the end of the tunnel becomes brighter, rethinking the hiring and onboarding process for security talent can be the difference between recovering out-of-work employees, getting them up to speed, and enduring unnecessary difficulties.
What the COVID-19 crisis is ultimately doing to the cybersecurity industry is shining a spotlight on the cybersecurity talent shortage. What is one of the only benefits of the critical issue, it's that it has allowed many in Northern Virginia to elevate and extend a slew of innovative measures that companies and region are implementing to combat the problem. As they set out to solve the industry talent shortage, Northern Virginia found the following strategies to be impactful steps in tandem toward a solution.
While authentication and authorization might sound similar, they are two distinct security processes in the identity and access management (IAM) space. Authentication is the security practice of confirming that someone is who they claim to be, while authorization is the process of establishing the rights and privileges of a user. Here, we talk to Tehila Shneider about authorization, authentication, and why authorizations remains a problem that is mostly unsolved.
The threat landscape that organizations are facing is changing rapidly. Increasingly, senior leadership of multinational companies will have to think about the impact of an array of physical, cyber and digital risks to their organizations. To mitigate risk within the enterprise, there should be a renewed emphasis on how to restructure corporate security teams and how to reframe them within corporate structure. Here are some practical considerations.
The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year. These healthcare and first responder networks are among the more than 400 organizations worldwide victimized by Conti, over 290 of which are located in the U.S.
Two common options for surveillance and perimeter protection are visible cameras with near infrared illumination capabilities and thermal imaging cameras—both are optimal for distinct situations. However, optimal lighting isn’t always available or guaranteed, especially when a scenario calls for 24-hour awareness for security applications, including outdoor, remote, or rural locations, or if there is need to see beyond the fence line to identify and react to incoming threats.
Breakthroughs in artificial intelligence (AI) and other digital technology, including faster, more affordable bandwidth, are revolutionizing the ways cities conduct surveillance and provide security. Major cities throughout the U.S. are utilizing turnkey systems that integrate video footage, access management, traffic monitoring and body-worn cameras into central high-speed networks.