south korea smart city

Security in South Korea: The convergence of physical and cyber security

The demand for security convergence is on the rise as 4th Industrial Revolution factors such as Smart Factories, Smart Cities, and 5G commercialization urges communities to form a more connected society. This concept of a more connected society also applies to physical and cyber security, which makes the boundary between those two even harder to define. The Government in South Korea is planning to create the world’s first ‘5G Plus

Global supply chain vulnerable to cybersecurity risks by failing to secure their Industrial IoT deployments

Snippet : Two-thirds of companies agree that they must strengthen their cyber defence capabilities, but say they lack the skills and technology Enterprises across the global supply chain recognise their approaches to cybersecurity must be strengthened, but are not yet taking the practical steps to safeguard their Industrial Internet of Things (IoT) deployments, according to a study undertaken on behalf of Inmarsat, the world leader in global, mobile satellite communications. The

Regulation is the only way to control the IoT cyber-security threat, says Databarracks

The Internet of Things (IoT) will be the source of more data breaches, as we see mass adoption and rapid growth in the number of connected devices, both in consumer products and the Industrial Internet of Things (IIoT). This is according to business continuity and disaster recovery firm, Databarracks. The scale of vulnerability of IoT was recently highlighted by Trend Micro, which found flaws in two of the most popular

Age and size: hindrance or opportunity?

The age and size of a building shouldn’t serve as a restriction for upgrading safety protocols and security measures. Andrew Shaw, architectural consultant at Allegion UK, discusses how to maximise safety and security based on your building’s age and design. It’s easy to understand why the age and size of a building can be seen as a problem when assessing and upgrading safety protocols. The myriad of products and solutions

Dojo launch free-to-use intelligent IoT Vulnerability Scanner App

Dojo by BullGuard, a market leader in consumer cybersecurity, has launched its Dojo Intelligent IoT Vulnerability Scanner, a free-to-use mobile app that scans all of the IoT devices connected to your home Wi-Fi network – laptops, web cameras, smart locks, smart alarms, Philips Hue Lights, Amazon Echo, the router and more – and detects which IoT devices are at the greatest risk of cybersecurity flaws. Available on iOS and Android,

Pulse Secure attains industry first with Common Criteria certification NAC and VPN

Pulse Secure has announced a cyber security industry first by achieving Common Criteria certification for both its network access control (NAC) and virtual private network (VPN) solutions under NIAP’s most current collaborative protection profile for network devices. The integrated approach increases cyber security assurance for pre-connect and post-connect endpoint visibility, compliance and threat mitigation for government agencies, as well as private-sector enterprises. Common Criteria certification is governed by ISO/IEC standards

Honeywell to offer Edge Video Analytics Software to security OEMS

Honeywell has announced that its Xtralis VCA suite of security software is now available for licensing by third parties. Now, both Xtralis LoiterTrace video detection software and Xtralis IntrusionTrace video detection software will be made available to third parties looking to improve the analytics capabilities of their security offerings. Xtralis IntrusionTrace, a high-performance intrusion detection software solution designed for continual outdoor operation is now integrated into its first external partner,

ESET launches protection against malware attacks on connected TVs

IT security leader ESET has launched ESET Smart TV Security – an advanced technology protection solution against targeted malware attacks on connected TVs and other devices with the Android TV operational system. According to statistics, there could be as many as 30 billion devices connected to the internet by 2020. While these gadgets bring numerous benefits to households, they also pose a threat to consumers’ everyday lives. Smart TVs in

IoT botnet discovered exploiting online devices & IP cameras

Researchers have discovered a large “Internet of Things” (IoT) botnet with similarities to Mirai. Known as “IoT Troop” or “Reaper”, this threat targets IoT devices by exploiting vulnerabilities on internet connected devices such as IP cameras and consumer grade routers. Compromised devices could be used to support Distributed Denial of Service attacks (DDoS) against targets worldwide. While this botnet appears to be in the early stages of formation, organisations are

Milestone Systems and Live Earth achieve Common Operational Picture through video integration

Driven by customers’ needs to visualise live video synchronised with real-time weather, traffic, city surveillance, IoT sensors, and transportation feeds, Milestone Systems and Live Earth have achieved a simple and powerful way to integrate video into a Common Operational Picture. As demand rises for smarter cities, campuses and buildings, organisations are investing heavily in sensors, cameras, access control, and other IT systems. Ensuring the best possible response time in a

Do NOT follow this link or you will be banned from the site!