Networking & IP

Clearfix
Thu
16
Nov
JohnA's picture

Physical Security's Future: Will We be IT or Not IT?

Future of physical security and IT woven together
Future of physical security and IT woven together

It doesn’t take a genius to recognise that the physical security industry is undergoing what is arguably its most significant, and most rapid period of disruption and transformation; and if the industry fails to recognise, react, and respond, it will be subsumed IT and cyber security providers.

PHYSICAL security’s survival offers the opportunity for some robust debate over whether this is a good or a bad thing, however, I’m going to suggest that an equal partnership between physical and cyber security will provide the best outcome. Every physical security conference and most presentations I’ve attended in recent years has had some focus on cyber security, however the level of cyber security expertise in the physical security industry remains poor at best.

Read More
Wed
25
Oct
JohnA's picture

Attila the Hub and the Future of Alarm Monitoring:

Hubs can be scary...
Hubs can be scary...

When you look at the hydra-headed beast alarm monitoring has become it’s difficult to see a clear path forward, regardless of whether you’re an installer or a monitoring provider. But at times like these, the facts you need to focus on are the operational demands of end users. 

DURING the week I was speaking with engineers at a famous intrusion detection company who pointed out that alongside their networkable security and automation controllers they would soon be releasing a home automation hub of the type that immediately made me worry the traditional alarms market is going to tear itself apart. This company’s not the only one playing in the hub-type home automation market – everyone seems to be getting in. 

Read More
Fri
18
Aug
JohnA's picture

Cyber Security: Untangling Fundamentals of IT, OT and IOT

Untangling the wires of IT, OT, and IoT
Untangling the wires of IT, OT, and IoT

As networking technology charges ahead it’s getting more difficult to categorise groups of networked things we think of as IT, OT, and IoT. Is there a difference any longer? Let’s find out. 

GIVEN the many recent cyber security incidents involving non-traditional computing, and the propensity to call anything that’s not a computer IoT, it seemed timely to write an article discussing the 3 different classes of technology, their key differences, and their differing vulnerabilities and security management requirements. There are many reasons for this blurring, not the least of which is that many technologies that traditionally operated on a ‘dumb’ machine now run on a computer, and that there’s a lot of uncertainty about what’s under the hood of these devices.

Read More
Thu
10
Aug
JohnA's picture

Australian Digital Health Agency Seeks IT Security Consultant

Australian Digital Health Agency is seeking a security consultant
Australian Digital Health Agency is seeking a security consultant

AUSTRALIAN Digital Health Agency is seeking a security consultant to plan, design, develop and conduct a desktop cyber security real-time critical incident exercise. 

The desktop exercise should invoke the security incident management process for the My Health Record System, including all parties involved in a significant cyber security incident.

1. Designing desktop exercise:

* Project management plan 
* Scoping of incident triggering appropriate incident response. 
* Identification of key stakeholders. 
* Design realistic cyber security incident on the My Health Record System. 
* Define metrics to assess the effectiveness of the response process. 

2. Conduct the exercise 

Read More
Wed
21
Jun
JohnA's picture

Leveraging the Internet for Operational Security Benefits

The internet - it's for more than just fun...
The internet - it's for more than just fun...

Internet connectivity is an important means of delivering business and security value, not just a recreational vehicle and a consummate aggregator of attention.

THERE’S a common belief in the security industry that remote access, internet connection, and external connections are bad; and in the wake of the Mirai bot net and near daily IoT security warnings, it’s not all that surprising that we want to keep security systems air-gapped.

While unarguably well intentioned, this line of thinking will have physical and electronic security providers relegated to the realm of tin foil hat wearers as businesses and users continue to demand more and more efficiency from their systems. Does that mean that we should plug everything in, open everything up, and embrace a fully connected ecosystem – certainly not. It’s all about benefit and risk.

Read More
Thu
08
Jun
JohnA's picture

Special Report: Securing Networked Security Devices

Securing networked-connected security devices
Securing networked-connected security devices

In the wake of attacks against hundreds of thousands of networked connected devices, including cameras and controllers, network security is finally receiving the recognition it deserves as a vital component of any networked electronic security solution. 

NETWORK security is a science that exists in the backend of many electronic security solutions – a disparate realm that at first glance seems unconnected, yet is the hearthstone of most of our infrastructure. From networked access control, intrusion, automation, and video surveillance solutions, to cloud-based alarm systems and direct-connected NVRs, access controllers and even single devices, this is a deep and complex area. No electronic security solution with an exposed network port can be considered secure without the application of network security policy. 

According to Brendan White of Mobotix, the greatest vulnerabilities of network devices are unauthorised access and backdooring. 

Read More
Fri
09
Dec
JohnA's picture

Securing Networked CCTV Cameras

Securing IP cameras
Securing IP cameras

After the recent DDoS botnet attack, integrators and end users are right to be thinking seriously about securing IP cameras and the networks they run on. Fortunately, there are many practical measures that can be taken to harden devices exposed to local networks and the Internet. 

WHEN you’re thinking about securing IP cameras, the first thing to do is work on the password that gains access to the camera browser. Default user names and passwords like admin and admin, root and pass, admin and no password, admin and 123456 are a sure way to leave cameras open to hacking. Passwords are more difficult than they sound. They need to be complex enough to defy easy breaching and they need to be manageable. There’s nothing worse than losing a password and having to reset every device on a network, in effect recommissioning the system to re-gain communication. Passwords need to be managed and securely stored. 

Read More
Tue
08
Nov
JohnA's picture

Cyber Security At the Heart of Electronic Security Solutions

Cyber security vital to modern electronic security solutions
Cyber security vital to modern electronic security solutions

Like all good fairy tales, we begin with “Once upon a time…” Once upon a time, security systems were analogue and not connected to anything, or at most, a phone line, cameras connected to a time lapse VCR, and we saved footage on shelves full of video tape.

IT’S now 2016 and most security systems are network or internet-connected, yet it’s still far too common for people in the security industry to believe we’re living in a fairy tale world typified by a comment I recently read suggesting that physical security can survive without cyber security. However, in the world of modern security systems everything is a computer. 

Acknowledging that there’s an element of hyperbole in that statement, let’s consider some of the key aspects that would have us consider a device to be a computer:

Read More
Wed
20
Jan
JohnA's picture

BGWT Takes On Auriga PAVA Distribution

BGW Technologies will distribute Auriga IP-based public address and alarm verification systems
BGW Technologies will distribute Auriga IP-based public address and alarm verification systems

BGWT Takes On Auriga PAVA DistributionBGW Technologies will distribute Auriga IP-based public address and voice alarm (PAVA) system from Inform Technology Solutions

BGW Technologies will distribute Inform’s full range of public address and voice alert software as well as its locally produced Aries 100v and low impedance amplifiers, and the new Dynatá range of plane wave speakers.

Auriga, enables a tailored response to any event or required action and provides intelligible alert communication over local or wide area networks. To complement Auriga, Inform also manufactures and supplies a range of peripheral products for wide area alert and public address including the Dynatá range of high performance flat panel ‘planar’ speakers.

Read More
Thu
03
Dec
JohnA's picture

Senstar Tungsten Secures Physical Security Networks

Senstar Tungsten secures physical security networks
Senstar Tungsten secures physical security networks

SENSTAR Tungsten is a high security Ethernet switch, distributed locally by BGWT and specifically designed to cyber-secure physical security networks, SCADA-based systems and safe-city applications.

Tungsten provides ironclad security with full control and customizable networking capabilities. Cutting-edge hardware, coupled with network intelligence and policy enforcement software engines, offer an effective tool for securing sites and installations.

Read More

Pages

Subscribe to RSS - Networking & IP