Cloud security - Case studies
ComplyAdvantage, a global data technology company transforming financial crime detection announced that Gemini, a crypto exchange and custodian selected ComplyAdvantage’s hyperscale platform for anti-money laundering risk management. Compliance teams around the world need access to intelligent technologies that can uncover risk in real-time and decrease operational costs so their companies can transact with trust and grow with confidence. With the accelerated adoption of cryptocurrency an...
Midway Car Rental, the privately-owned car rental company in Southern California, caters to both an exclusive and expansive clientele, including VIPs, high-end hotels, and replacement vendors like dealerships and body shops. The company currently owns and operates 15 locations and has aggressive plans for expansion, with 6 or 7 more sites planned for this calendar year. The challenge With a portfolio that includes Ferraris, Lamborghinis, and Jaguars, Midway can have up to a million dollars of...
As the largest non-gaming, in-hotel exhibition space in the world, the Marriott Gaylord Opryland needed to upgrade its unstable security system to an open platform VMS, in order to protect against false claims and liability. With nearly 3,000 rooms and 15 restaurants, the 700,000-square-foot Marriott Gaylord Opryland Resort & Convention Center offers a wide range of attractions, including an outdoor golf course and nine acres of indoor gardens, all underneath climate-controlled glass atrium...
Check Point Research (CPR) discovered new malware on Google’s Play Store that spreads via WhatsApp messages. The malware is designed to automatically respond to incoming WhatsApp messages on the victim’s device, using content that the malware downloads from a remote server. Hidden in fake Netflix app CPR found the malware hidden in a fake Netflix application on the Play Store called FlixOnline, which promised unlimited entertainment from anywhere in the world. If successful,...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, today shared the results of its ‘Physical Security in EMEA 2021’ report, based on insights from over 1,500 physical security professionals. The report takes a closer look at how physical security teams across Europe, Middle East, and Africa (EMEA) are leveraging technology to manage both short-term needs and long-term priorities. The findings offer useful insights...
SATO, a global company in the development of auto-ID and labelling solutions, has announced the launch of its innovative TEMPCHECK TouchFree solution to enable a 100% contactless approach to verify the identity, health, and safety of all on-site employees and visitors. The fully automated solution combines a tablet device, which has facial recognition and temperature scanning capabilities, with the SATO CT4-LX intelligent label printer to facilitate triple confirmation at the point of entry. Wi...
Reiknistofa bankanna (RB) is a provider of mission-critical IT systems for Icelandic financial institutions, responsible for the country’s central clearance and settlement system and a number of multi-tenant core banking solutions. It also operates an e-invoicing and e-payment system for corporates and consumers. It is jointly owned by the three main Icelandic banks, two saving banks, the Icelandic Savings Bank Association, and the three main payment card processors in Iceland. RB&r...
The Brazilian state of Mato Grosso has deployed a multi-agency communications solution using Sepura’s SC20 TETRA radios to support security operations on the border with neighbouring Bolivia. The solution enables coordination between the Border Task Force, Military and Civilian Police forces, the Military Fire Department, and other supporting agencies. Robust communication solution The solution is an extension of the TETRA network currently in operation in the Brazilian state, built on...
IRS email impersonations are widespread across all industries. These attacks vary in scale and victim, targeting both individuals and companies as a whole. This particular attack follows the growing trend of utilising social engineering strategies for malicious engagement, allowing attackers to easily bypass email security solutions that focus on a link or attachment-based threat vectors. Summary of attack Platform: Office 365 Mailboxes:5K-50K Bypassed Email Security: Office 365...
ISONAS Inc., an IP access control and hardware solution provider and part of the Allegion family of brands announced that the ISONAS™ Pure IP™ access control solution has been deployed at Our Lady of Perpetual Help Parish in Grove City, Ohio. The parish is comprised of seven buildings, which include the church, preschool, elementary school, rectory, storage garage, athletic building, and modular classrooms. The parish grew from around a dozen visitors daily to more than...
Stark Property’s shared working environment sees about 150 people from 40 different companies co-working across their Panama properties. Stark Property sought to overcome the challenges of a shared working space by fostering a sense of community within the Panama buildings, streamlining processes, and ensuring a safe and secure environment for all. Panama app Stark Property worked with digital technology developers, Dynamo6, to develop the Panama app. Easy to operate, the app integrates...
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Centre, a unified security platform that blends IP security systems within a singl...
PostNord needed to ensure that only the right people get access to each of their 1,500 branches. After installing AEOS, they can manage authorisations centrally and have reduced administration time dramatically. In 2009, the Danish and Swedish postal companies merged to become PostNord, which is still owned by both states and also serves the rest of the Nordic region. Before the merger, each of the 1,500 branches had its own building manager who had freedom of choice in purchasing access contro...
In this attack, attackers impersonate a message from the United States government, claiming to provide information on the Paycheck Protection Program in an attempt to steal valuable credentials. Summary of the attack target Platform: Office 365 Mailboxes: Less than 10,000 Bypassed Email Gateway: Proofpoint Victims: Employees Payload: Link Technique: Impersonation What was the attack? 1) Setup: Fraudulent actors continue to capitalise on the ongoing pandemic by intercepting...
Rohde & Schwarz has installed Ireland’s first Quick Personnel Security (QPS) scanner at Kerry Airport, Farranfore, Ireland, delivering state-of-the-art technology that enables a high throughput, enhanced security, and increased safety for airport customers and staff. The airport has chosen the latest model, the latest generation R&S QPS201 launched earlier in 2020, becoming the first Rohde & Schwarz security scanner installation in Ireland. R&S QPS201 security scanner Th...
Pluralsight, Inc., the globally renowned technology workforce development company, has announced that Irish airline - Ryanair has selected Pluralsight as its strategic partner, in order to optimise the speed and workflows of its engineering team, using Pluralsight Flow. Headquartered in Dublin, Ireland, Ryanair has routes to over 40 countries in Europe, Africa and the Middle East and relies on its engineering teams to ensure its technologies deliver the best quality service for its passengers....
In the ‘LinkedIn Identity Theft’ attack, the attacker impersonates a policy change notification from the company, LinkedIn, in order to steal highly confidential information, such as the victim’s social security number. ‘LinkedIn Identity Theft’ attack Cybercriminals constantly search for unique social engineering tactics, in order to dupe their victims. However, in this type of cyber-attack, attackers rely on the reputability and trust bestowed in social media an...
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud. The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council&rsq...
Synectics, a globally renowned company in the design, integration and support of advanced security and surveillance systems, announced that the company has won a new contract with Irish Rail (Iarnród Éireann) to upgrade all InterCity Mark 4 rolling stock on the Dublin to Cork route to an IP-based video surveillance solution, following a competitive bid process. The IP video security system contract will see Synectics develops and installs an innovative safety-critical...
The first phase in a pioneering smart transport project to transform security, passenger service, and operational management across Berlin’s S-Bahn rail network has officially gone live. Teams based at S-Bahn’s ‘4S’ operational headquarters are now, via the latest developments in Synectics’ Synergy hybrid cloud software platform, able to connect, respond, and collaborate with passengers and staff on-board trains, at stations, and with field personnel working anywhe...
HID Global, the globally renowned company in trusted identity solutions, has announced that Bay State College safely brought its students back to its campuses in Boston and Taunton, Massachusetts using a digitised contact tracing solution that includes HID Bluetooth BEEKs Beacons to provide real-time location services. HID Bluetooth beacon The HID Bluetooth beacon is in the form of a simple badge holder that is used to carry existing ID badges for students, faculty, staff and guests. The beaco...
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authent...
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell&...
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekda...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
Super Micro Computer, Inc., a global pioneer in enterprise computing, storage, networking solutions, and green computing technology announced that it has deployed an additional cluster at Lawrence Livermore National Laboratory (LLNL) to augment existing computing capabilities available for national security and to help discover therapeutics for SARS-CoV-2, the virus that causes COVID-19. Called the “Ruby” cluster, Supermicro’s TwinPro 2U 4 node servers leverage advanced 2nd Ge...
In the fast-growing legalised cannabis industry, extensive security measures are a necessity. VIVOTEK, the pioneering IP surveillance provider has collaborated with Existo, a collective of cannabis industry professionals, to establish an IP surveillance solution for a cannabis cultivation facility in Northern Michigan, the United States. The results not only exceeded the state of Michigan’s expectations to allow for licensing at the state level but are also user friendly and add a level o...
In this attack, scammers impersonate the IRS to collect a fraudulent payment from their target. Summary of the attack target Platform: Office 365 Bypassed Email Gateway: Proofpoint Mailboxes: 50,000 to 70,000 Payload: Text Technique: Spoofing / Impersonation What was the attack? 1)Setup: The IRS has long been a popular target for impersonation by attackers. This email highlights a more sophisticated IRS impersonation, where a targeted attack is sent from a spoofed sender domain...
This week, Abnormal Security researchers have been tracking recent well-disguised attacks from a Russian criminal enterprise, which are using the Emotet Trojan to drop Ryuk ransomware and BazarLoader for financial gain. Ryuk ransomware attack The Federal Bureau of Investigation (FBI) and the Department of Homeland Security (DHS) issued a warning of an impending attack, using Ryuk ransomware, earlier this week, noting that healthcare and the public sector are the intended targets. Abnormal Sec...
Stuart Codack, Information Security Manager and Steve Roberts, Head of IT at West Midlands Trains (WMT), gave an inside look into working with SureCloud’s cyber security team. As an operator of essential services and part of the critical national infrastructure, West Midlands Trains (WMT) are constantly reviewing the service that they provide and the supporting processes to ensure that they are giving customers the very best service. WMT will routinely carry over 200,000 passengers over a...