New tech will give cops access to residents’ private security video

Police in Mississippi’s homicide-wracked capital are one step closer to being able to access residents’ livestreaming home security video — in a move opposed by privacy advocates.

The police department in Jackson will soon become one of two dozen places across the country to sign on with Fusus, a company that makes its easier for cops to create a network of real-time video from public and private cameras, NBC News reported.

Residents in the city of 160,000 — which recorded a decade-high 84 murders in 2018 — can opt into the service with their doorbell cameras, like Ring.

The livestream feed would then be funneled directly to the city’s new real-time command center.

“What you see behind us is an opportunity, an opportunity to better observe and fill in the gaps,” said Jackson Mayor Chokwe Lumumba at the center’s ribbon-cutting last month, NBC News said.

Authorities in Jackson are scrambling

Read More

New Tech Gives Cops Ability to Access Live Footage From Home Security Cameras

Illustration for article titled New Technology Could Provide Police Access to Real-Time Footage From Home Security Cameras

Photo: pixinoo (Shutterstock)

I don’t know why anyone thought this was a good idea, but apparently Jackson, Miss. is experimenting with a pilot program that would give police the ability to access real-time video surveillance from your home security camera.

So did none of these people play Watch Dogs? Watch Psycho-Pass? Consume literally any media about the dangers of a surveillance state? No? Go figure.

According to NBC News, police in Jackson, Miss. have partnered with Fusus, a Georgia-based company whose focus is on creating cost-effective surveillance networks for law enforcement, to build a new surveillance network. The proposed network would give law enforcement the ability to access live, real-time footage of private and public security cameras.

Why are they doing this? Well, for the same reason anyone does anything in this country: money.

The pilot program is being explored by cities that are experiencing rising

Read More

Hackers try to penetrate the vital ‘cold chain’ for coronavirus vaccines, security team reports

The hackers took measures to hide their tracks, and the cyber-sleuths did not name which state might be behind the campaign.

The IBM team said it was not known why the hackers were trying to penetrate the systems. It suggested that the intruders might want to steal information, glean details about technology or contracts, create confusion and distrust, or disrupt the vaccine supply chains.

The hackers probably sought “advanced insight into the purchase and movement of a vaccine that can impact life and the global economy,” the IBM team said.

Because there was “no clear path to a cash-out” as there is in a ransomware attack, there was an increased likelihood of a state actor’s being involved, IBM said. However, the IBM investigators cautioned, it was still possible that criminals could be looking for ways to illegally obtain “a hot black-market commodity” such as an initially scarce vaccine.

The new

Read More

Kigen Continues to Blaze a New Trail Towards Crucial Security for Cellular IoT Scale

BELFAST, Northern Ireland–(BUSINESS WIRE)–Kigen, a security leader for cellular IoT, has enabled 2 billion SIMs in IoT devices and has new state-of-the-art eSIM and integrated SIM (iSIM) deployments with leading chipset providers, module vendors and network operators. As an independent but wholly-owned subsidiary of Arm, Kigen will focus on addressing device-maker demand for greater choice in affordable security for trusted IoT devices.

Kigen, after incubating within Arm, has a well-established ecosystem with mature partners and has now added several new customers, including Alif Semiconductor, KORE, Qualcomm Technologies and Sequans Communications.

“If we are to accelerate global IoT innovation, security and trust for connected devices can never be an afterthought,” said Vincent Korstanje, Chief Executive Officer, Kigen. ”By making iSIM the future foundation for trust in the IoT, Kigen, together with our partners, are offering all device-makers greater freedom in how they manufacture secure devices and deliver the services

Read More

Dell Technologies announces new security solutions to protect customer data

Dell Technologies Inc. today announced a range of new intrinsic security solutions and services designed to protect customer data across the supply chain, infrastructure, devices and services.

Focusing on helping customers lower security risk and become more cyber-resilient, the announcement includes a new secure supply chain offering designed to make secure commercial personal computers more secure. There’s also enhanced server supply chain assurance that includes cryptographic hardware verification integrity across its server portfolio, as well as an extension of data security-focused services to the entire infrastructure portfolio and third-party products. Finally, a Dell Technologies-only capability brings a new layer of server security to the boot process.

“As digital value is created, security threats follow,” John Roese, global chief technology officer for Dell Technologies, said in a statement. “Security is the foundation of everything we do and our intrinsic security approach addresses our customers’ need for trusted technology and partners to

Read More

Global Intelligent Security Market 2020 Key Business Strategies, Technology Innovation and Regional Data Analysis to 2025

The MarketWatch News Department was not involved in the creation of this content.

Dec 02, 2020 (CDN Newswire via Comtex) —
Global Intelligent Security Market 2020 by Company, Type and Application, Forecast to 2025 released by tries to cover the authenticate information of market size, share, revenue, and progress rate along with detailed insights related to the market. The report focuses on major statistical evidence for the global Intelligent Security industry as it offers guidance to readers through which they can encounter the obstacles surrounding the market. The report throws light on fluctuating tendencies that directly or indirectly impact the market. Several factors such as global distribution, manufacturers, market factors that affect the global contributions are reported in the study. Further an in-depth competitive landscape, defined growth opportunities, market share coupled with product type and applications, key companies responsible for the production have been highlighted in the report.


Read More

3 Ways Security Technology Is Keeping Businesses Open during COVID-19

By, John Kedzierski, Senior Vice President, Video Security and Analytics, Motorola Solutions

After almost a year of dealing with COVID-19, it’s no exaggeration to say that the pandemic has negatively impacted a number of industries. Forced closures, massive drops in consumer spending, and the prohibitive cost of operating with the appropriate measures in place are decimating businesses across the world. In fact, as enterprises across the country lose billions of dollars to keep their doors open, Yelp claims that nearly 100,000 small businesses throughout the US have closed permanently as a result of the pandemic.

COVID-19 is also forcing organizations to rethink what it means to keep their employees and customers safe. Beyond traditional security considerations, like preventing theft or assault, leaders and security operators are also on the hook for ensuring that their workforce and customers are protected from an invisible virus. To stay ahead of this challenge, they

Read More

LifeLabs’ Chief Information Security Officer recognized by leading security professionals as ‘CISO of the Year’

Toronto, Dec. 01, 2020 (GLOBE NEWSWIRE) — Congratulations to Mike Melo, LifeLabs’ Chief Information Security Officer (CISO), for being awarded ‘CISO of the Year’ at the 2020 CISO Forum Canada. The award, presented by the world’s leading Cybersecurity and e-Business certification awarding body (and the creator of the world famous Certified Ethical Hacker certification) EC-Council and siberX, recognizes one individual who has truly navigated through the new normal with an innovative and strong mindset.

A member of the LifeLabs Information Technology team since 2018, Mike Melo was appointed CISO last year.

“This is such an honour and not just because this comes from global leaders in the security industry,” says Mike. “What counts is that this also recognizes everyone in my team and those who work with us. Our team continues to work both hard and with agility (especially during this unique time) to help realize our vision in strengthening

Read More

How to set up HomeKit security camera activity zones in macOS Big Sur

With macOS Big Sur, you can make your HomeKit Secure Video camera notify you of movement only in selected portions of its field of view.

As convenient and reassuring as security cameras are, it’s also hard to position them in exactly the right place. You need them to cover certain areas, but you don’t want them covering others.

So for instance, maybe the security camera on the back of your house can see your neighbor’s garden, and they are forever having barbecues there. Or perhaps the one on the front of your house has to be tilted to see the end of your drive, but then can’t help but include where the school bus stops.

Now with macOS Big Sur, HomeKit cameras can have the option to set what are called activity zones. The cameras will still show their entire field of view, and if they are recording then

Read More

IBM aims for quantum computing safe encryption, security tools

IBM Cloud said it will offer cryptography technology that will be futureproofed for quantum computing deployments.

Big Blue, which is among the key players in the quantum computing race, launched Quantum Safe Cryptography for Key Management and Application Transactions.

Quantum computing promises to solve new problems, leap past supercomputers and possibly used to easily break encryption algorithms and data security measures.

IBM’s bet is that it can combine its security and hybrid cloud knowhow with its quantum computing research.

The new tools under the quantum-safe effort from IBM include:

  • Quantum Safe Crypto Support, a service to secure data transmissions between hardware externally and internally via a quantum-safe algorithm.
  • Extended IBM Cloud Hyper Protect Crypto Service, a design to protect transactional data within applications. The protection covers encryption schemes in databases and digital signature validation.

These services will support the following:

  • IBM Key Protect and for Red Hat OpenShift on IBM
Read More