Zero trust networks, and the implications for video surveillance

    Networks are increasingly vulnerable. A combination of increasingly sophisticated and numerous cyberattacks and the exponential growth in connected devices – each of which creates another network endpoint open to attack – means that organizations are fighting a never-ending battle to keep networks secure. Historically, organizations have relied on ensuring that the corporate firewall is as … Continued

      Securing pharma with video surveillance

      Depending on the sector the challenges of safety and security vary, as the level of protection needs to be adjusted to the circumstances. One of these special fields is (bio)pharmaceuticals. Protecting staff, products and information are one of the main concerns and biggest challenges in the biopharma sector. In the past few years, the pharma … Continued

        The arms race of AI in cybersecurity

        With any advancement in technology, you can bet that the criminal fraternity will be quickly examining its potential in supporting their nefarious goals. Whether cyber criminals planning ransomware attacks or the theft of data and financial information, or nation states looking to disrupt the critical infrastructure of adversaries (if not worse), new technology has the … Continued

          Firmware: To upgrade or not to upgrade?

          I recently installed a new smart home hub. After an undisclosed number of hours well spent, I got it integrated nicely with appliances throughout the house. By the time I emerged from under my duvet, roused by the daylight which flooded in when my shutters automatically opened, my coffee machine was happily bubbling away, and … Continued

            Cybersecurity in process monitoring within Oil and Gas

            I have been involved in the oil and gas industry in one form or another for over thirty-five years. This long tenure has enabled me to witness incredible changes in both the market and technology. There have been busts and booms, the discovery of new oil and gas fields and techniques to reach these reserves. … Continued

              How to maintain cybersecurity across all your devices

              Network administrators are under significant and increasing pressure to make sure their networks are designed and operated securely. So it is important that they have the right knowledge and tools to manage cybersecurity throughout the life cycle of all devices in the system. In this post, we will explore the cybersecurity best practices specific to … Continued