Chuck Davis, MSIA, CISSP-ISSAP, is Senior Director of Cybersecurity at Hikvision, a global company with more than 40,000 employees and 59 branch offices and subsidiaries around the world. Based in the U.S., Davis leads the global cybersecurity team and, under his leadership, Hikvision has achieved several cybersecurity milestones to include the establishment of the Source Code Transparency Center at Hikvision USA’s Los Angeles headquarters, where government and law enforcement officials may examine the source code for Hikvision’s cameras and NVRs.
The Cybersecurity and Infrastructure Security Agency (CISA) and AVANGRID, a sustainable energy company providing services in 24 states, conducted a virtual tabletop exercise to test and identify the safety procedures AVANGRID has implemented since the beginning of the COVID-19 pandemic and identify additional procedures necessary to ensure employee safety operations and business continuity in the out years.
How will artificial intelligence (AI) transform video surveillance in 2021? Below, we speak to Satish Raj, CTO of Pro-Vigil, who believes AI in digital video surveillance systems will become much smarter next year, to the point where it will be able to actually predict crime before it happens.
Mass shootings in the U.S. have increased despite widespread closures of schools, businesses, and many public places due to the coronavirus pandemic. There were 615 mass shootings in 2020 resulting in 521 deaths and 2,541 injuries. Compared to the previous year, there were 181 more incidents. The stress of the COVID-19 pandemic, job loses, unemployment, and the economic crisis is a potential for a disaster which could lead to an increase of violence at the workplace. The recent spike in gun incidences and stolen weapons across the United States is alarming. Businesses need to take heed and increase security measures to protect their employees and staff.
Some 200 individuals have been charged with federal offenses connected to the siege at the U.S. Capitol on January 6, 2021. Among them are at least 15 examples of family affiliated extremism. These instances include: five sets of husbands and wives; two cases of fathers and sons, mothers and sons, brothers, and cousins; and an instance of father/daughter and brother/sister participation. Although of a different strain and less serious offenses—none specifically terrorism nor involving murder —such kin-connected radicalism is neither a new phenomenon nor one unique to the United States or elsewhere.
In the latest twist in the bidding war to purchase guarding company G4S, GardaWorld declined to raise its bid for the company, moving Allied Universal into what appears to be the winning position.
International SOS recently released its Risk Outlook report, unveiling the top security risks for the international workforce in 2021. Here, we talk to Jeremy Prout, Director of Security at International SOS, to discuss how to protect the workforce against the top risks found within the report.
Jon Litt, Senior Manager, Government Solutions (US) at Christie shares his five key considerations to ensuring an impactful, efficient professional video collaboration solution.
Having a secure and efficient video collaboration system has evolved from a ‘useful to have’ technology to an indispensable capability in 2020, allowing teams to feel more connected to remote locations and distributed team members. With travel restrictions and social distancing limiting in-person meetings, remote face-to-face video communication is more imperative than ever in security environments. Systems integrators around the globe have been upgrading technologies to support the mission of operators. Before you work with an integrator to either upgrade an existing video collaboration system or invest in a new one, there are a host of considerations. Below are the key ones that will help you with your conversations with the systems integrator.
One of the biggest threats to wireless security devices is radio jamming, which occurs when a malicious actor illegally purchases a radio frequency jammer tool and uses it to block alarm devices’ connections to their affiliated security company. If alarms can’t properly communicate through their network—which is typically cellular—then they cannot notify security providers when there’s a crisis.
A combination of factors are likely to keep the world on this path in the near term regarding social unrest. An atmosphere of social unrest has potential consequences at the enterprise level in terms of risk and resiliency and business continuity. Here are five concrete steps security leaders can take to prepare for or reevaluate their existing response plans.