News

featured item

Ariana Grande Concert Bombing: Safety Focus Shifts to Venue Perimeters

The bombing of departing audience from an Ariana Grande concert in Manchester, England, late Monday serves as an alarm bell that protecting public venues in the future will have to focus more on hardening building perimeters, security experts said Tuesday.

featured item

Manchester Suicide Attack Lays Bare Limits of Security Measures

Countries across the world will tighten security ahead of major cultural and sports events after a suicide bombing in Britain that killed at least 22 people, but experts say reinforced measures will do little to prevent determined individuals.

Given the target being a Manchester pop concert, the latest attack to hit Europe had echoes of the coordinated attacks in November 2015 by Islamist militants on the Bataclan concert hall and France's national soccer stadium that killed 130 people.

featured item

Security Service Failure Lead to Manchester Bombing Attack, Says Expert

A failure by the security and intelligence services is likely to have led to the Manchester bomb attack which killed at least 22 people at an Ariana Grande concert, according to a leading terror expert.

Low tech attacks using stolen and hired vehicles to randomly ram into crowds have become increasing common by terrorists unable to get hold of guns and explosives.

But the latest outrage shows a break from this recent tactic for more complex and planned attacks.

featured item

Local Event Security in Focus After Manchester Arena Bombing

Security at local events coming up this summer are in focus after a suicide bombing in Manchester England at an Ariana Grande concert.

Security experts say "soft targets" like the area that was bombed at Manchester Arena Monday night continue to pose challenges for law enforcement. The bombing took place outside the secured arena, but in an area with lots of people.

featured item

Perimeter Security, Now A Simpler Mission

Standard Comms presented its Smart Sound Perimeter system that has the ability, using audio and infrasonic sensors, to not just detect perimeter breaches but details of the breach, according to Zach Thompson, a company representative. The company’s sensor technology is already used to help NASA detect caves on Mars among other applications on Earth, even in the harsh environment of Antarctica, Thompson explained.

featured item

Smart Cities? Not Until Those Cyber Weaknesses Get Sorted

Smart Cities aren’t that smart at the moment, argues Vince Warrington at Protective Intelligence, primarily because they ultimately create greater cyber security risks for citizens.

What does Benny Hill have to do with the Smart Cities of the future? You may think very little, but there is a connection. Back in 1969 Hill played Professor Simon Peach in the classic caper movie The Italian Job, where his character is recruited into Michael Caine’s criminal gang. Computer expert Peach’s role in the heist was to replace the programming of the Turin traffic control system, causing a paralysing traffic jam which enables three Mini Coopers to escape with rather a lot of gold.

featured item

Advancing Asia’s Digital Strategy and Roadmap at CommunicAsia, EnterpriseIT and BroadcastAsia 2017

Newly created ConnecTechAsia2018 to comprise CommunicAsia, NXTAsia and BroadcastAsia

Singapore – CommunicAsia, EnterpriseIT and BroadcastAsia 2017 wrapped up last week after a three-day exhibition and conference addressing technologies and strategies for smart cities and digital ecosystems driving the digital strategies and transformation roadmaps of governments and enterprises in Asia.

featured item

How To Make 2017 the Year of IoT Security

People who make Internet of Things (IoT) devices still aren’t getting the message on security. And as these devices proliferate, the danger of increased attacks is getting more real.

Late last year, popular internet services such as Netflix and Twitter were temporarily taken down amid a massive distributed denial-of-service (DDoS) attack that involved hackers deploying malware to simple webcams that many of us use without thinking. Authorities in the U.S. and U.K. were investigating the Mirai malware used in the attack to create a botnet, an army of zombie devices commanded by hackers. In fact, the Mirai code is still available online, allowing those with only modest technical skills to continue disrupting internet services on a major scale.

featured item

IoT Fuels Next-Gen Law Enforcement

Investments in equipment and services related to the internet of things by the Departments of Homeland Security and Justice have tripled over the past six years, contributing a $600 million smart security industry, a new study finds. Spending on cloud services, which underpin IoT technologies, is only expected to continue to climb as companies like Amazon and Google increasingly invest in the federal space.

featured item

Why Security Must Become Part of the IoT Design Process

For all the talk about how the Internet of Things is the wave of the future, the fact is that the future is here. The IoT is now a part of our everyday lives, and is only continuing to grow and advance.

The simple fact that there are so many connected devices now — the average home has about seven connected devices operating each day, while the most connected families have 15 or more devices — has made the IoT an attractive target for hackers. No longer do we only have to worry about computers, tablets, and mobile phones, but we also need to be concerned about the security of televisions, refrigerators, smart hubs, and more.