By Systems Solutions Group / Science Daily / 0 Comments

By: Science Daily

A recent discovery explains a new family of gravitational instabilities in granular particles of different densities that are driven by a gas-channeling mechanism not seen in fluids. The team observed an unexpected Rayleigh-Taylor (R-T)-like instability in which lighter grains rise through heavier grains in the form of ‘fingers’ and ”granular bubbles, similar to the bubbles that form and rise in lava lamps.

Read More >>

Powered by WPeMatico

By Systems Solutions Group / Security Systems News / 0 Comments

By: Security Systems News

04/22/2019

SSN Staff

CARLSBAD, Calif.—Nortek Security & Control, a global leader in wireless security, home automation, access control, and health and wellness technology, recently appointed Chris Hart as regional manager & solution specialist, Health & Wellness. He is responsible for the sales of Numera healthcare solutions throughout the Central and Western United States and Canada. 
“Chris is an expert in the health and wellness, telemedicine and telehealth industries,” John Carpenter, vice president of Channel Engagement for Health & Wellness, Nortek, said in a release. “We know his knowledge will help elevate the visibility of the Numera brand and we are confident that his contributions to our team will be significant.” 
With extensive industry experience, Hart brings to the table his telemedicine sales experience with proven success cultivating long-term business relationships with key clients and generating revenue growth. He is recognized for his ability to build up a client base and close multi-million-dollar sales. 
Hart earned his Bachelor of Science degree in International Business from American University in Washington, D.C. Prior to joining Nortek Security & Control, he served as: 
Telemedicine Sales Manager at Sentinel Healthcare;
Western Regional Sales Manager at Honeywell HomMed Telehealth and Fluke Biomedical; and  
Medical Institution Territory Manager at Abbott Laboratories. 
“As a senior care advocate, my focus has always been on improving patient outcomes and promoting independence,” Hart said. “I’m excited to join Nortek Security & Control, and I look forward to continuing the Numera legacy as an innovator in the health and wellness industry.” 
 


Read More >>

Powered by WPeMatico

By Systems Solutions Group / Security Systems News / 0 Comments

By: Security Systems News

04/17/2019

Paul Ragusa

YARMOUTH, Maine—With cybersecurity pervading almost every conversation in security today, one topic that is often an afterthought in the discussion is cyber insurance. One fact that everyone can agree on is that it is not just a matter of “if” a company will be impacted by a cyber breach it is a matter of “when.”
“I think there has been a lot of confusion as to what is available in regard to insurance coverage specifically related to cyber threats to business,” said Robert Tockarshewsky, Vice President, Property & Casualty Group for USI Insurance Services, one of the largest mid-market business insurance & consulting brokerages in North America. “An important first step is performing a simple review of your current policies to understand and ensure that you have the right coverage (or at least understand the limitations of your existing coverage), especially as your business changes and grows.”
Tockarshewsky, who has more than 20 years of experience working within the electronic security and life safety industries, including key roles at Honeywell/ADI and at Underwriters Laboratories (UL), focuses heavily on working to marry the collective issues faced by industry with customized business insurance and risk management solutions for his clients.
“Have a conversation with your insurance broker and find out what coverage you actually possess and then have a conversation with them based on what your current and future needs may be.,” he explained. “Once you understand what you have and what you may need, then it comes down to your company’s risk appetite: Insurance is simply a means of transferring risk.  How much risk are you comfortable holding onto and how much do you want to transfer?”
He continued, “What is your greatest concern when it comes to some sort of a cyber breach? Is it your database of customers? Is it your own internal systems controls? Is it the hack-ability of the interoperability of your system if you are a manufactured product that is going in and attaching to a larger ecosystem? So it is understanding what assets  are most vulnerable, or believe are most vital to your business operation in the event of a breach, and that could cause a negative financial impact to your business and interrupt your operations as a whole will influence the type and amount of cyber liability coverage to purchase.”
The problem today, he added, is that many times companies are finding out after the fact — after a breach has happened — how little or how limited the scope of cyber insurance coverage they really possess.
“You speak to some of these guys and they say, ‘I spent so much money on the latest and greatest products and I made sure that all of my operators have gone through x, y and z training and yet my company still experiences daily cyber attacks and I feel no more confident in withstanding these attacks.,” he said.
In addition to having some cyber insurance coverage as part of a company’s general liability policy, Tockarshewsky noted that there are separate individual policies that relate directly to either a piece or a more comprehensive cyber coverage approach. USI cyber and technology risk experts are frequently asked by companies to recommend the best cyber insurance protection.
“The good news is, there are a lot of different ways you can go that are pretty cost-effective, so it is not like we are talking about tens of thousands of dollars to protect your company, big or small, to get a million dollars in cyber coverage,” he explained. “And a lot of times you are going to need larger coverage limits because in the breaches that occur, it is not the just the cost of the breach itself, it is for the costs associated with restoring your reputation, for the down time experienced with the business interruption, whether it is several days or many, until you are up and fully running, as well as litigation costs to defend yourself, for example.”
As cyber threats are becoming more sophisticated, Tockarshewsky is seeing more long-term scenarios playing out, where someone may gain access to your system, or have found a way to hack into your product, yet hold this knowledge until they find the right time to strike. 
“At USI, we witness so much of this, and not enough active (or even corrective) risk mitigation steps being taken to help uncover these ‘bad’ scenarios,” he noted. “USI professionals engage with all levels of our clients’ organization to review best practices specific to the risks of the company, and the industry as a whole. , Because we are a large business insurance brokerage that works across many different industries, we see a lot of the latest and differing types of cyber threats that may not have come to the security/life safety industries yet.  Understanding that this is happening elsewhere in the world today helps industry business owners plan their strategies for the future.”
In addition, it is vitally important that a company has a strong cyber-incident response plan (CIRP) in place.
“We talk about this a lot, as we see many companies having only one or two individuals who are in charge of the response mechanism when a company breach occurs. Surveys have shown that the longer that a breach has occurred or is allowed to occur, the more costly it is,” he explained. “If there is a delay in getting a hold of that person, the CTO, for example, that delay costs money. So having a solid CIRP in place is critically important.”


Read More >>

Powered by WPeMatico

By Systems Solutions Group / Science Daily / 0 Comments

By: Science Daily

A new learning system improves robots’ abilities to mold materials into target shapes and make predictions about interacting with solid objects and liquids. The system, known as a learning-based particle simulator, could give industrial robots a more refined touch — and it may have fun applications in personal robotics, such as modelling clay shapes or rolling sticky rice for sushi.

Read More >>

Powered by WPeMatico

By Systems Solutions Group / Security Systems News / 0 Comments

By: Security Systems News

Second annual summit hosted by ISC Security Events, PSA Security Network and SIA

04/17/2019

SSN Staff

DALLAS—ISC Security Events, PSA Security Network and the Security Industry Association (SIA) have revealed the preliminary agenda for the 2019 Cyber:Secured Forum, a conference connecting the worlds of cybersecurity, physical security and systems integration. This second annual cybersecurity educational summit will be held at the Westin Dallas Park Central July 29-31 in Dallas, Texas.
Cyber:Secured Forum 2019 will begin on the evening of Monday, July 29, with a welcome networking reception and continue with two days of in-depth content on cybersecurity trends and best practices related to the delivery of physical security systems and other integrated systems. Attendees will enjoy presentations featuring top cybersecurity leaders and sponsor exhibits showcasing solutions related to cybersecurity, integrated systems and physical security solutions.
Key presentations for Cyber:Secured Forum 2019 include:-    A View From the Chief Information Security Officer’s (CISO’s) Office(Including Panelist James O’Shea, Head of Reengineering and Global Security Engineering, RBC Capital Markets)-    Technologies Shaping the Converged Cyber-Physical World(Including Panelist Edward Lee, Security and Trust Advisor, Google Cloud)-    What Physical Security Can Learn From Cybersecurity…and Vice Versa(Presenter: George Finney, CISO, Southern Methodist University)
Additionally, Cyber:Secured Forum 2019 will include an expanded program featuring breakout sessions tailored to audience members’ unique interests and level of familiarity with cybersecurity as it relates to the physical security industry. Breakout sessions will include:-    Dissecting the Attack: How Hackers Target and Compromise Products and Systems Just Like Yours(Presenter: Valerie Thomas, Executive Information Security Consultant, Securicon)-    Selling Deterrance by Denial: Security Products, Hard Targets and Protecting Your Customers’ Crown Jewels(Presenter: Adam Firestone, Chief Engineering Officer, Secure Channels, Inc.)-    Building a NIST-Compliant Cybersecurity Program(Presenter: Larry Wilson, CISO, University of Massachusetts President’s Office)
See the full list of sessions and their descriptions here.
Leaders in the IT and physical security industries will gather at Cyber:Secured Forum to connect and share information on risks and liabilities, responding to cybersecurity threats and establishing security control standards across IT systems, particularly when integrating physical security solutions and devices on IT networks. This event is designed for security systems integrators, IT, Internet of Things and cybersecurity leaders, integration engineers, product developers, vendors and manufacturers, senior technology business executives, security specifiers and engineers, security consultants, top security leadership and anyone responsible for the cybersecurity of integrated security systems.
Cyber:Secured Forum 2019 registrants will have access to a special room rate at the conference hotel — the Westin Dallas Park Central — conveniently located just north of the city’s downtown district.
To learn more about Cyber:Secured Forum and register to attend, click here. The conference is offering an early bird registration discount through April 30. SIA members, PSA members and members of the ISC Executives Club receive additional discounts off registration rates.


Read More >>

Powered by WPeMatico