Viakoo Blog

Are You Automating Camera Firmware Updates? You Should.

The now infamous Target data breach was transacted by malware being placed on the HVAC system servers. A casino had its “high roller” database stolen by leveraging the network connection of an aquarium thermostat to export the file from the internal network. Leveraging the physical security system’s camera devices a bank was hacked, revealing confidential information. These are just some of the examples of how IoT devices, especially at the edge of a network, can be exploited by cyber-criminals.

Implementing Service Assurance to Improve Operations

There’s a popular business quote that goes something like, “if you can’t measure it, you can’t...

Tips for Avoiding Physical Security IoT Issues

Do you think IoT devices as part of a physical security network are a blessing or a curse?

How to Recover from a Physical Security System Failure

It’s happened: you had a major failure of one (or all) parts of your physical security system....

Opportunity Knocks:  Service Assurance from Integrators

Every security integrator faces this issue. Your customers purchase new physical security systems...

Physical Security, As Told by Numbers

To sense the scale and magnitude of changes happening in physical security it helps to put numbers...

AI Really Will Change Physical Security

Everybody is talking about it, and more and more people are using it. From self-driving cars to...

Why New Grads Are Drawn to Physical Security

Physical Security competes with other industries for talent, and there is (right now) a giant...

2018: Critical Year for Integrators at ISC West

ISC West (International Security Conference & Exhibition) is the largest security industry trade...

Data Gravity and Viakoo

There are ideas and concepts that you come across that you realize immediately were not developed...
Prev 3 4 5 6 7 Next