Russia declassified additional information about weapons in space the Soviets who had a keen interest in defense projects in space. The Cold War and the arms race were projected to take place in the space. Hence, the development of the weapons for such war. In the early 1970s, the Soviets launched a space station for defense purposes– Almaz, which contained the artillery system Chit-1. The system was one of a kind. The Almaz program was a highly secret Soviet military space station program begun in the early 1960s. Three crewed military reconnaissance stations were launched between 1973 and 1976: Salyut 2, Salyut 3 and Salyut 5.
Iran’s first Vice President Eshaq Jahangiri Kouhshahi attended an annual meeting organized by the Shanghai Cooperation Organization (SCO). An 18th meeting of the Council of Heads of Government of Member States of the SCO was held Saturday in Tashkent, the capital of Uzbekistan. The SCO, or Shanghai Pact, is a Eurasian political, economic, and security alliance, the creation of which was announced on June 15, 2001 in Shanghai. Iran is not an official member of the SCO but very interested in joining. He was observed having great interest in reciprocal agreements with Uzbekistan.
Russia announced a new project pertaining to the satellite system Gonets 2.0. The system will have satellite phone options and a myriad of government applications. It is on par with Putin’s plan to have Russia closed off in the same way as Russia is developing its own intranet, similar to the Great Fire Wall of China and eliminating privacy. The deployment of the system is scheduled for 2024. It will also have large data storage capabilities and the ability to create automatic subsystems. Russia estimates by 2025 that their satellite channel will be used by millions of devices in Russia. Besides the military applications, Gonets 2.0 can be used in the drone, energy, transport, oil and gas industries across Russia and some of the former Soviet block nations, like Belarus.
In a world in which digital transformation is key it can be difficult for small and medium-sized businesses (SMBs) to keep up – and harder still to get ahead, especially when everything is moving forward except budgets.
The State Archive of the Russian Federation in St. Petersburg has, for the first time ever, made declassified documents available pertaining to Russian President Vladimir Putin’s KGB history (as wee as a few other key people in the KGB). The KGB, translated in English as Committee for State Security, was the main security agency for the Soviet Union from 1954 until its break-up in 1991. As a direct successor of agencies such as the Cheka, NKGB, NKVD and MGB, the committee was attached to the Council of Ministers.
Russian theoretical physicist Yevgeny Avronin kept notes that were released pertaining his lifelong work in nuclear weapons. Avronin was a theoretical physicist, nuclear engineer and Scientific Director at the Russian Federal Nuclear Centre (RFNC). He was a co-developer of the RDS-37, the first Soviet two-stage thermonuclear bomb. He died in 2018.
The Human Genome Organization (HUGO) and the European Union developed genetic information privacy regulations to protect the public. A majority of experts have agreed for the need for genetic information privacy. In 2014 the HUGO Committee on Ethics, Law and Society (CELS) presented a human rights approach to an international code of conduct for genomic and clinical data sharing. The code of conduct is supposed to prevent human rights violations during the research of genomes, allowing enough protection to allow scientific research in the genome field.
Defense ministers from Croatia, Hungary, Slovakia, and Slovenia singed a memorandum of understanding (MOU) creating a regional command of special operations. The signing of the MOU took place in the NATO headquarters in Brussels.
The North Atlantic Treaty Organization, also called the North Atlantic Alliance, is an intergovernmental military alliance between 29 North American and European countries. The organization implements the North Atlantic Treaty that was signed on 4 April 1949. There is a possibility Austria can join in the future. Austria is not a NATO member. There are five countries which declared their non-alignment with NATO, including Finland, Ireland, Sweden and Malta. Although Austria is not a NATO member and a neutral country, they have a robust strategic military budget, and they share a physical border between Russia and NATO.
The Federal Security Service of the Russian Federation is the principal security agency of Russia and the main successor agency to the USSR’s KGB. The FSB’s main responsibilities are within the country and include counter-intelligence, internal and border security, counter-terrorism, and surveillance as well as investigating some other types of grave crimes and federal law violations.
Workforce mobility today is an essential part of any business, but it creates a number of challenges for IT. Data spread across devices and cloud services, unpredictable schedules, and varied network connections all complicate efforts to protect and govern enterprise information. With inSync, companies can protect their data stored in the cloud or on mobile devices while also addressing rising compliance and legal needs.
The report “Vision Processing Unit Market End-Use Application (Smartphones, ADAS, Camera, Drones, AR/VR Products), Vertical (Consumer Electronics, Automotive, Security and Surveillance), Fabrication Process and Geography – Global Forecast to 2024″, is estimated to grow from $1.3 billion in 2019 to $3.2 billion by 2024; it is expected to grow at a CAGR of 18.7%. The market is mainly driven by the increasing adoption of premium smartphones, growing adoption of edge AI, and rising demand for high-end computing capabilities for computers and machine vision.
A new market research report by Future Market Insights on cyber security in robotics market includes industry analysis 2014-2018 and opportunity assessment 2019-2029. As per the findings of the report, the cyber security in robotics market reached a value of $2.4 billion in 2018.
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents.
On October 9, 2019, the Interfax-Ukraine conference center held a press conference for journalists. The Interfax-Ukraine News Agency is a Kiev-based Ukrainian news agency founded in 1992. The company belongs to the Russian news group Interfax Information Services. The press conference allowed for the release of supposed facts pertaining to the US embassy influence on the Ukrainian law enforcement agencies meddling in the US democratic elections process.
The US Department of Energy’s (DOE) Argonne National Laboratory and the University of Illinois Urbana-Champaign’s Grainger College of Engineering announced on October 14th their intend to form the Midwest Hydrogen and Fuel Cell Coalition to raise awareness of the potential for hydrogen and fuel cells to provide energy resilience and security, reduce emissions and foster economic growth.
China’s Ministry of Industry and Information Technology announced that from December 2019, it will use facial recognition to control over 800 million mobile internet users. According to China’s laws, a person using any online service needs to be identified. There is no such thing as anonymity in China.
The chronology of the evolution of the Chinese totalitarian laws:
Modern agile development practices, microservices, containers and cloud infrastructure have combined to empower application developers to innovate faster and update applications more frequently than ever before. This adoption of agile development and operational strategies requires more scalable and flexible infrastructure teams and processes, ensuring that production network, Layer 4-7 application services and applications can scale as needed. Therefore, development and test resources are ready whenever requested.
Another new amendment to the Wi-Fi standard! Every new generation of Wi-Fi brings an opportunity to pause and consider the transformational changes that will be affecting us in the coming years. Today, Wi-Fi networks already experience bandwidth-intensive media content and multiple Wi-Fi devices per user. Moving forward, networks will face a continued dramatic increase in the number of devices, a tripling of the total global IP traffic, and a diverse range of new technologies that will all heavily rely on Wi-Fi.
One of the greatest challenges to protecting a business against cybercrime is the shape shifting nature of security threats. Innovation is not the sole domain of the good guys: cyber criminals are constantly finding ingenious new ways to tunnel into consumer, enterprise and institutional IT systems. They are increasingly professional, more aggressively funded, and better-equipped than ever to exploit any weak link in the security chain.
Replacing servers is often delayed. Confronted with competing business priorities, limited budgets and personnel, and a sense of comfort as current servers reliably hum along, delay is easy to rationalize. Yet, delays are not without risk and trade-offs. Cases in point are two circumstances that small and midsized enterprises (SMEs) should seriously consider and, in our opinion, initiate action now.
Enterprise security groups today face a daunting task. While their core responsibility of protecting corporate data and resources remains unchanged, they are asked to do so while enabling line-of-business teams and individual employees to drive growth through innovation and transformation via the cloud.
Automotive Cyber Security Market is expected to grow at approximately $32 million by 2023, at 9% of CAGR between 2019 and 2023. Automotive Cyber Security Market, By Security Type (Cloud Security, Endpoint Security, Wireless Security, Application Security), By Vehicle Type (Passenger Cars), By Application (Communication Channels, Safety Systems) and Regional Forecast 2023.
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site.
We know you’re tired of reading about the cyber skills gap; many organizations are obviously facing challenges in recruiting, skilling, and retaining security professionals. We haven’t written this cheat sheet to tell you what you already know. Instead, we will outline a realistic strategy for workforce-wide cyber skills development, focusing on the solution, not just the problem.
An mPOS or mobile point-of-sale terminals is a portable point of sale (POS) on smartphone or tablet used for electronic transaction. The mobile POS terminals are replacement for the traditional cash registers and point-of-sale devices. The global mPOS terminal market is estimated to value at around $6 billion in 2019, and is expected to register a CAGR of 20.7%.
After sharp spikes in ransomware attacks in recent years, the total number of incidents is trending downward in 2018. But that’s not necessarily good news because these attacks also are becoming more targeted and potentially more dangerous.
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven.
Since 2014, China has been developing a social score system for its citizens. The official system launch will take place in 2020. A negative score will result in punishment. The criteria include: wrong religion, late payment of taxes, financial loan default, political critique against the current government, smoking, loud music and even the condition of your front lawn. Consequences under the above criteria will include being banned from overseas travel, public transport, hotel stays, etc.
According to a new market research report “Network Security Software Market by Component (Solutions (Firewall, Antivirus/Antimalware, and SWG) and Services (Professional Services and Managed Services)), Deployment Mode, Organization Size, Vertical, and Region – Global Forecast to 2024″, published by MarketsandMarkets, is expected to grow from $13.5 billion in 2019 to $22.8 billion by 2024, at a Compound Annual Growth Rate (CAGR) of 11.0% during the forecast period.
The global rubber tracks for defense and security market is apprehended to follow gradual growth over a 10-year forecast period 2017-2027. According to a recently published research report by Future Market Insights, titled “Rubber Tracks for Defense and Security Market: Global Industry Analysis 2012 – 2016 and Opportunity Assessment 2017-2027,” the market is poised for a CAGR of 3.9% over the assessment period and will reach $144.5 million by 2027 end, up from $98.4 million registered in 2017. Volatile rubber pricing scenario is considered to be a predominant factor restraining rubber sales, ultimately affecting the rubber tracks market performance.
The Global Retail Automation market is expected to register a global CAGR of 11.7% during 2017 – 2027, with North America, Western Europe, and APEJ accounting for significant market value shares by the end of the forecast period.
The demand for CCTV is on the rise across the world, due to an increase in safety concerns. CCTV systems are widely used by the government as well as private institutions, to avoid or reduce potential security threats. The increase in the demand for CCTV ultimately increases the demand for the CCTV testers.
A building automation controls as well as monitors an establishment’s systems consisting of air conditioning, ventilation, heating, lighting, mechanical, flood and fire safety in addition to security.
Video management software (VMS) is a component security camera system, specifically designed for processing, storing and managing signals for more than one camera feed. Video management software is expected to witness robust market growth owing to factors such as an increasing security concerns and escalating demand for high quality video processing.
The global pedestrian entrance control systems market stood at US$ 1.6 Bn in 2016 and is estimated to expand with a CAGR of 5.1% from 2017 to 2025, according to a new market research report published by Credence Research “Pedestrian Entrance Control Systems Market.
The pedestrian entrance control systems market has been majorly driven by rising terrorist threats across the world. With increasing instances of terror attacks in major cities across the world, it has become imperative for various organizations and government bodies to deploy advanced physical security solutions to ensure public safety. In addition, technological advancements in security doors and speed gates have enabled organizations to deploy state of the art entrance control systems within facilities. Factors such as rapid response and higher accuracy of personnel identification have led to the growing popularity of advanced entrance control systems in some of the developed markets across the world.
Some of the factors driving the growth in the pedestrian entrance control systems market include rise of terror activities across the world. With increasing threats and rising vulnerability of various buildings and facilities, there has been growing investment towards ensuring physical safety. In addition, it has become crucial to deploy advanced security solutions to strengthen public confidence and ensure social harmony. Thereby, the overall pedestrian entrance control systems market is expected to grow due to increasing government and commercial budgets towards public safety during the forecast period.