Kiran Pillai, Senior Product Marketing Manager, Bosch Security Surveillance camera data is interesting to cybercriminals, reflected by a growing number of exploits including man-in-the-middle attacks: hackers hijack communications between a camera and VMS to spy on people or industrial processes, inject alternate video image feeds …
Infrastructure
-
-
Steven Kenny, Industry Liaison – Architecture & Engineering, Axis Communications Network administrators are under increasing pressure to ensure networks are designed and operated securely. It is important they have the right knowledge and tools to manage cybersecurity throughout the life cycle of the system. Recent Axis …
-
Robin Hughes, Sales Director, Secure Logiq Regardless of the build quality of a server, over a long period some component failures are inevitable. HDDs in an Enterprise server build are spinning disks, and in a security environment are being worked harder than conventional IT-centric applications. …
-
Ross Wilks, Head of Marketing Communications, Vanderbilt The obvious place to start is by choosing equipment from reliable suppliers with a knowledge of integration and who are focused on protecting people, assets and data. When an integrated system is designed to protect against cyberattacks, an …
-
Uri Guterman, Head of Product & Marketing, Hanwha Techwin Europe Cybersecurity has been a priority in the security sector for some time. Cameras and recorders from leading manufacturers should incorporate measures to prevent unauthorised access to images and data. However, it is important not to …