Tag Archive for: Physical

Where cybersecurity and physical security meet


Where cybersecurity and physical security meet

(Image by Pete Linforth from Pixabay
)

By Greg Kemper, Genetec

Data breaches are on the rise worldwide, and the energy sector is among the top five industries targeted most often for hacking and ransomware attacks. While some breaches are caused by weaknesses in an organization’s virtual perimeter that allow hackers to exploit software vulnerabilities, a growing number sneak through connected IoT/IIoT (Internet of Things/Industrial Internet of Things) devices. That figure was more than 112 million in 2022.

Security cameras, access control readers, and other devices that make up physical security systems are likewise often overlooked as a source of vulnerability. With physical security devices of the past, like perimeter fences and door locks, the approach was ‘install what you need and let it do its job.’ As security technology advanced, this mindset persisted. Even as organizations began implementing IP-based technology and IoT devices, they didn’t always think about how these assets might make their networks vulnerable. In some instances, even though a physical security system resides on an organization’s network, it is managed by corporate security instead of the IT department. 

Physical security and information security are linked. There’s no difference in the result whether a hacker accesses an organization’s network physically, or through a video surveillance camera, a piece of HVAC equipment, or an employee’s laptop. As cyber threats grow, physical security and IT must work together to safeguard network infrastructure.  

Unifying physical and cybersecurity

A unified IT-and-physical-security team can develop a comprehensive security program based on a common understanding of risk, responsibilities, strategies, and practices. First, the team should conduct a current posture assessment to identify devices of concern.

  • Create an inventory of all network-connected cameras, door controllers, and associated management systems, identify their functions and confirm their…

Source…

How AI Is Disrupting The Business Of Physical Security


Co-founder and CEO of ZeroEyes with a decade in the U.S. Navy, including six years as a Navy SEAL.

The world of physical security is experiencing a significant transformation thanks to advancements in artificial intelligence (AI), machine learning (ML), deep learning and intelligent video analytics.

The widespread adoption and use of innovations like ChatGPT and DALL-E have demonstrated that AI technology is more than just a passing trend. It has showcased its potential in various applications that extend beyond writing content or answering questions. Businesses looking to protect their staff and visitors would be wise to understand AI-based physical security solutions.

Addressing today’s security threats requires applications that can rapidly analyze massive amounts of data that surpass human capabilities. According to IFSEC Insider,AI-based applications enable operators to respond to potential threats faster than ever, while simultaneously reducing false alarm notifications that plagued earlier analytics models.” As such, AI physical security solutions can enable businesses to protect their customers and staff against physical threats in a much faster and more accurate manner.

In this article, I’ll examine a few examples of high-tech AI solutions that are transforming the way organizations can approach physical security before offering tips about how to implement these solutions properly.

Security Technology: From Passive To Proactive

With the addition of AI, physical security solutions are no longer passive but are actively intelligent devices that can monitor video feeds in real time. This not only can possibly reduce workforce costs but may also increase the likelihood of identifying and catching perpetrators before they commit a crime. Here are a few examples of AI-based security solutions:

Access Control And Intrusion Detection Systems

AI access control systems and intrusion detection systems can monitor various building access authentication factors, such as the location of the access attempt, time of day and user behavior, to determine the risk level associated with granting access.

This technology can analyze sensor data, such as motion detectors or…

Source…

Physical Security Hack Chat With Deviant Ollam


Join us on Wednesday, June 3 at noon Pacific for the Physical Security Hack Chat with Deviant Ollam!

You can throw as many resources as possible into securing your systems — patch every vulnerability religiously, train all your users, monitor their traffic, eliminate every conceivable side-channel attack, or even totally air-gap your system — but it all amounts to exactly zero if somebody leaves a door propped open. Or if you’ve put a $5 padlock on a critical gate. Or if your RFID access control system is easily hacked. Ignore details like that and you’re just inviting trouble in.

Once the black-hats are on the inside, their job becomes orders of magnitude easier. Nothing beats hands-on access to a system when it comes to compromising it, and even if the attacker isn’t directly interfacing with your system, having him or her on the inside makes social engineering attacks that much simpler. System security starts with physical security, and physical security starts with understanding how to keep the doors locked.

join-hack-chatTo help us dig into that, Deviant Ollam will stop by the Hack Chat. Deviant works as a physical security consultant and he’s a fixture on the security con circuit and denizen of many lockpicking villages. He’s well-versed in what it takes to keep hardware safe from unauthorized visits or to keep it from disappearing entirely. From CCTV systems to elevator hacks to just about every possible way to defeat a locked door, Deviant has quite a bag of physical security tricks, and he’ll share his insights on keeping stuff safe in a dangerous world.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, June 3 at 12:00 PM Pacific time. If time zones have you down, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.


Source…

Latin America Data Center Physical Security Market Report 2022: Increased Data Center Deployment Driving Growth


Press release content from Business Wire. The AP news staff was not involved in its creation.

DUBLIN–(BUSINESS WIRE)–Jul 12, 2022–

The “Latin America Data Center Physical Security Market – Industry Outlook and Forecast 2022-2027” report has been added to ResearchAndMarkets.com’s offering.

Physical security layers are installed in data centers to prevent unwanted entry and threats. The Latin America data center market is witnessing strong growth and is dominated by colocation providers, followed by internet and cloud service providers.

KEY HIGHLIGHTS OF THE LATIN AMERICA DATA CENTER PHYSICAL SECURITY MARKET

  • Increased deployment of the cloud-based and edge data center facilities will increase the demand for physical security solutions such as video surveillance and access control systems.
  • Many data centers use Building Management System (BMS) to manage the physical security of their data centers (as part of the overall management of the building), including CCTV cameras, access controls, and even rodent repellent systems.
  • In 2021, Brazil and Mexico significantly contributed to the Latin America data center physical security market. In terms of Product, Video Surveillance is the major contributor to the Latin America data center physical security market.
  • The rise in data center facilities deployed across the region, mainly in Brazil and Mexico, will increase the demand for physical security solutions such as video surveillance and access control systems.
  • There have been advancements in video surveillance systems connected to cloud systems, which provide services such as recording, image captures, analytics, and notification services. These cloud-based video cameras upload constantly and need a reliable connection since they do not come with local storage. Cloud-based video analytics has become the latest trend in data center physical security.
  • Cloud computing and edge processing will drive the adoption of advanced video content analytics in the coming years. IoT-based sensors are also increasingly being deployed along with camera-based surveillance solutions.
  • Augmented…

Source…