Chinese Hackers Target 27 Universities to Acquire Military Technology


Chinese Hackers Target 27 Universities to Acquire Military Technology | #TpromoCom #China #Hacker #Hackers | Over two dozen universities in the U.S. and around the world have been singled out for access to maritime military research. (please scroll for more)

Dozens of universities have fallen victim to a cyberattack conducted by Chinese hackers attempting to steal information on military technology.

The University of Washington, the University of Hawaii and the Massachusetts Institute of Technology (MIT) are among at least 27 universities that have been targeted, reports ZD Net.

To read the remainder of this news article, click here.

[divider (image)]
Security company owners, operations managers, and sales managers are invited to join The Coaching Forum on Facebook!

American Dynamics Announces the End of Manufacturing SpeedDome Optima

American Dynamics Announces the End of Manufacturing SpeedDome Optima | #TpromoCom #Tyco #VideoSurveillance #Manufacturing | We would like to let you know that as of March 2019, SpeedDome Optima will no longer be manufactured. The SpeedDome Optima has been a successful part of the American Dynamics Video portfolio for a number of years.

As the industry has migrated from an analog-centric world to an IP/Network centric one, American Dynamics has been migrating too with an established and successful range of IP/Network products.

To download the full announcement, click here.

[image] Security professionals in the electronic protection of commercial and residential structures are invited to join other owners and managers in The Security Coaching Forum on Facebook.
Security professionals in the electronic protection of commercial and residential structures are invited to sell their excess equipment in Security and Fire Buy or Sell Forum on Facebook. –Al Colombo

Boon Edam Presents Integrated Entry Solutions that Mitigate Tailgating at ISC West 2019

Boon Edam Presents Integrated Entry Solutions that Mitigate Tailgating at ISC West 2019 | #TpromoCom #ISC #AccessControl #Security | Boon Edam Inc., a global leader in security entrances and architectural revolving doors, today announced they are emphasizing tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show.

Access technologies are critical for granting or denying entry to secure areas within a building. However, these solutions are only effective at mitigating tailgating when coupled with security entrances. This complete solution ensures only one person enters per valid authorization. The following solutions will be on display in Boon Edam’s booth…

To read the remainder of this news release, click here.

[image] TpromoCom is a social media and web content company. Call or email us at tpromo@mail.com.
TpromoCom is a social media and web content company. Call 330-956-9003 or email us at tpromo@mail.com.

Gartner says nearly 50% of PaaS offerings are now cloud-only

Gartner says nearly 50% of PaaS offerings are now cloud-only | #TpromoCom #Security #Cloud #Data | Nearly half of today’s platform as a service (PaaS) service offerings are cloud-only, according to Gartner, Inc. Currently, there are more than 360 vendors across 21 market segments, delivering more than 550 PaaS offerings. Forty-eight percent of these offerings are cloud-only. Not a single vendor has a foothold across all 21 segments, and 90 percent of them only operate within a single PaaS market segment.

“Business and technology leaders are shifting to strategic investment in cloud computing,” said Yefim Natis, research vice president and analyst at Gartner. “Cloud computing is one of the key disruptive forces in IT markets that is gaining mainstream trust.”

“Although many organisations anticipate a long-term retention of on-premises computing, the vendors of nearly half of the cloud platform offerings bet on the prevailing growth of cloud deployments and chose the more modern and more efficient cloud-only delivery of their capabilities,” said Mr. Natis. Enterprise IT spending for cloud-based offerings will surpass spending for noncloud IT offerings by 2022, according to Gartner.

The total PaaS market revenue is forecast to reach $20 billion in 2019, and to exceed $34 billion in 2022, according to the latest forecast from Gartner. In this shift to cloud, database and application platform services represent the largest market segments, with blockchain, digital experience, serverless and artificial intelligence/machine learning (AI/ML) platform services as the newest.

To read the remainder of this news article, click here.

[divider (image)]
NTC is the most recognized name in training for the fire protection and low voltage industry. NTC develops and conducts training for NICET Certification, Continuing Education and career development. For more info, click here!

Hackers Exploit Critical Flaws In Car Alarm Apps – What Drivers Need To Know

Hackers Exploit Critical Flaws In Car Alarm Apps – What Drivers Need To Know | #TpromoCom #Hackers #Auto #Car #Alarm | Researchers at the penetration testing specialists invested nearly £4,000 ($5,000) in high-end smart car alarms systems in order to put them to the test. Ken Munro, the founder of Pen Test Partners, explains that an advert by one of the vendors concerned and stating the system was unhackable had piqued interest initially. That’s never a great claim to make as any security expert will tell you that there is no such thing as being 100% secure.

Allan B. Colombo, Tech Writer
Allan B. Colombo, Tech Writer

“As we see more and more of what we have connect itself to the Internet, such as ordinary household appliances, we’re also going to see more hacking. Unless we do something to stop this hacking, the world of IoT will become a nightmare for all of us,” says Al Colombo, Senior Design Specialist with TpromoCom of Canton, Ohio. “When are we going to learn NOT to put critical infrastructure on the Internet for our enemies, both foreign and domestic, to diddle with? How many billions of dollars and people’s vocational means of making a living must be lost before we learn?”

The vulnerabilities were not even that hard to uncover and enabled the researchers to use the legitimate account of one user to access the profiles of others. This was because one simple ‘modify user’ request in the code was not being correctly checked for validation. Once accessed they were able to change the user passwords and take control of the account, and the car it related to.  Written by Davey Winder with Forbes.

To read the remainder of this informative news article, click here.

New IoT Security Bill: Third Time’s the Charm?

New IoT Security Bill: Third Time’s the Charm? | #TpromoCom #IoT #Legislation #Government | The latest bill to set security standards for connected devices sold to the US government has fewer requirements, instead leaving recommendations to the National Institute of Standards and Technology.

For the third time in as many years, lawmakers have introduced a bill that would require Internet of Things (IoT) products sold by federal contractors and vendors to abide by government guidelines to ensure a baseline of cybersecurity.

The current bill, supported by members of both parties and known as the Internet of Things Cybersecurity Improvement Act of 2019, eschews specific recommendations and instead calls for the National Institute of Standards and Technology (NIST) to develop security guidelines for IoT devices sold to the US government. 

The hope is that such legislation, if signed into law, would mean more secure IoT equipment overall, including in the consumer and commercial sector.

To read the remainder of this news article, click here.

TpromoCom is the go-to source for effective, SEO-compliant Web Content. Click on the butterfly to find out why.

THERMAL CAMERAS AND SAFETY SYSTEMS PREVENT FACTORY FIRES

THERMAL CAMERAS AND SAFETY SYSTEMS PREVENT FACTORY FIRES | #TpromoCom #LifeSafety #Fire #FireAlarm | Things get hot when pots and pans are polished in the production process at Kuhn Rikon AG, the number one Swiss brand for crockery and kitchen aids. Dust explosions can easily occur if the temperature rises above a certain threshold, which in the worst-case scenario can lead to significant fire damage and production outages.

In June 2015, overheated polishing plates caused a dust explosion at the Kuhn Rikon main facility in northern Switzerland, starting a devastating fire that destroyed the production system and parts of the factory building. Together with the associated production outage, the total damage amounted to approximately $7 million.

“Luckily no-one was hurt, but the incident made us drastically aware that we urgently require reliable protection of our production processes that exceeds the scope of normal fire protection,” says Paul Brunschwiler, production technician at Kuhn Rikon.

To read the remainder of this informative article, click here.

Click on the banner above to find out more about Human Investigation Management.

How Does IoT Fit into Enterprise Access Control?

How Does IoT Fit into Enterprise Access Control? | #TpromoCom #AccessControl #IoT #Internet | Internet of Things (IoT) is emerging in the enterprise everywhere from manufacturing floors to AV systems. How does it fit into the access control landscape?

Physical security (access control, surveillance, emergency management, etc.) is one of the most important hot buttons of modern times as is the Internet of Things (IoT). Both are important to everyone, whether it involves your place of business, where you eat, shop, or where you drop at the end of a long, hard day.

On the corporate side, access control is one of the most important security precautions in place today. A well designed, installed, and serviced system will effectively keep unwanted, unsavory people out of your facility while allowing authorized employees, visitors, and vendors. When we add IoT to the equation, the prospects for an even safer, more user-friendly environment is higher than it has ever been before. In this Corporate Tech Decisions article, we’ll explore IoT (Internet of Things) and how it enhances a facility’s access control.

To download this article, click here.

Click on the banner above to find out more about managing the truthfulness of a specific person.