What are the cybersecurity issues in video surveillance?

    Cybersecurity should be an ongoing concern for consumers and companies in every sector, within their own organizations, amongst their stakeholders and throughout supply chains. The video surveillance industry is no exception. Far from the days of CCTV cameras, which held little to no information and were not connected to a network, the advances in digital […]

      The arms race of AI in cybersecurity

      With any advancement in technology, you can bet that the criminal fraternity will be quickly examining its potential in supporting their nefarious goals. Whether cyber criminals planning ransomware attacks or the theft of data and financial information, or nation states looking to disrupt the critical infrastructure of adversaries (if not worse), new technology has the […]

        Zero trust networks, and the implications for video surveillance

        Networks are increasingly vulnerable. A combination of increasingly sophisticated and numerous cyberattacks and the exponential growth in connected devices – each of which creates another network endpoint open to attack – means that organizations are fighting a never-ending battle to keep networks secure. Historically, organizations have relied on ensuring that the corporate firewall is as […]

          The critical role of lifecycle management in maintaining strong cybersecurity

          It there’s one thing the rise in highly-publicized data breaches has taught us it’s that cybersecurity should be a priority for every organization with a network. Threats from unauthorized and unwanted intrusion are real. And if you’re not vigilant in protecting your devices and systems, the results can be catastrophic—anything from loss of customer confidence […]

            Common cyber threats in a video surveillance system

            For the last seven years I have been working with questions related to cybersecurity.  I have been investigating concepts and defining methodologies, security controls, vulnerabilities, policies and processes.  In more recent years, I have been looking at common cyber security threats, common mistakes, and common concerns within in our ecosystem, and felt it would be […]