Reset Password

New user? Register here

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india


Industrial IoT will score over consumer IoT

With over $20 billion in merger and acquisition (M&A) deals and close to $2 billion in funding, the Internet of Things (IoT) witnessed significant traction in 2015.

Between 2010 and 2015, over $7.5 billion has been invested in IoT companies globally in over 900 deals. While until 2014, consumer-focused IoT solutions (primarily in Wearables and Quantified Self) garnered a slightly higher share of total IoT investments, industrial and enterprise IoT solutions attracted over 75% of funding in 2015 as compared to consumer IoT companies.

This trend is expected to continue in 2016 by a larger order of magnitude—2-3 times more than consumer IoT.

IoT is defined as a worldwide network of “things” that include identifiable devices, appliances, equipment, machinery of all forms and sizes with the intelligence to seamlessly connect, communicate and control or manage each other to perform a set of tasks with minimum intervention. The goal of IoT is to enable things to be
connected anytime, anyplace, and with anything or anyone.

Industrial and enterprise IoT solutions are primarily in the verticals of smart manufacturing, Industry 4.0, smart grids, oil rigs and refineries, wind farms, retail and logistics. Most of these industries have had sensors and been experimenting with sensor-enabled automation for a long time. Now with IoT, the focus is on artificial intelligence and machine learning, security and sensor computing.

Consumer IoT solutions are being developed in segments like home automation, health care, quantified self (gaining self-knowledge by using technology such as sensors on your smartphones or wearables to track your own data such as heart rate, stress levels, etc.), sports, automotives, and entertainment. And, the focus of consumer IoT extends much beyond the three areas of industrial IoT, to include miniaturization, power management, mesh networks, better connectivity protocols, interoperability and convergence platforms.

We are witnessing disruptive innovation in the consumer IoT space across verticals. These include charging pods mounted on street-light poles wirelessly charging electric cars on the move; transparent, non-intrusive heads-up display (HUD) for cars that can handle voice calls, text and e-mail messages, music, radio, and map-based navigation; network-enabled, cloud-powered, AI-driven dolls that can converse with kids and double up as security devices; miniaturized and portable ambulatory/holter and stress analysis ECG (electro cardiogram) machines that one can carry on person, avoiding a visit to the big hospital; smart pots that allow users to remotely monitor soil and light conditions and even water their plants through a mobile application; and smart insoles that measure impact stress on a runner’s feet and knees and provide intelligent analysis and guidance to improve one’s body dynamics and performance.

Comparatively, in industrial IoT, innovation is incremental. Many large technology companies are cautiously participating in the consumer IoT innovation through corporate venture funds and accelerator programmes. But this does not amount to a true open support of the innovation ecosystem.

From a professional venture capital investor’s point of view, industrial IoT has short-term adoption and business potential, hence most consumer IoT products are perceived as point solutions. And, this sentiment is currently driving the investment decisions of professional venture capitalists in the IoT space.

However, one key trend that we are observing in the consumer IoT funding space is the rise of crowd-funding. Many consumer IoT companies, in their early stages are using crowd-funding platforms to raise seed funds.

These companies seek professional venture capital funding only once their idea is validated, the product developed and early adopters garnered, and the solution and the company are ready to scale. This model of democratizing the venture capital through crowd-funding (in the early stages) is the most sustainable and scalable framework for consumer IoT ecosystem growth, and is expected to continue for the next few years.

The recent regulatory breather—JOBS Act (in the US)—that allows investors to buy securities through crowd-funding is effectively a welcome step for the young IoT companies.

Currently, in the IoT evolution timeline, we are at a stage where we were during the early 1990s of the internet era. The Google(s) and Facebook(s) of the IoT are yet to be born and/or yet to come to the fore.

For IoT to evolve as a web of platforms for connected smart objects, the biggest challenge will be to overcome the fragmentation of vertically oriented closed systems and architectures and application areas towards open systems and integrated environments and platforms.

For IoT to go mainstream, the industry needs to solve remaining technological barriers (interoperability, security, etc.), explore integration models, validate user acceptability, promote innovation on sensor/object platforms, and demonstrate cross use-case issues. Moreover, industrial and consumer IoT solutions need to be duly supported and evolve together.

SINET Announces 16 Most Innovative Cybersecurity Technologies of 2016

SINET, an organization focused on advancing Cybersecurity innovation through global public-private collaboration, announced today the winners of its annual SINET 16 competition. The companies, which were selected from a pool of 82 applicants and nine different countries, including Australia, Canada, Israel, Japan, Norway, Singapore, Sweden and the United Kingdom, represent a range of solution providers who are identifying cutting-edge technologies to address Cybersecurity threats and vulnerabilities. The selected companies will share their work with buyers, builders, investors and researchers during the SINET Showcase on Nov. 2 – 3, 2016 at the National Press Club in Washington, DC.

“With the dramatic increase in attacks, we must be relentless in identifying and supporting innovative solutions. The SINET Showcase provides an excellent opportunity to highlight advanced technologies in order to stay ahead of our global adversaries”

The competition requires that revenues be under $15 million and this year’s applicant pool of early stage and emerging technology companies was the most competitive since SINET began this initiative seven years ago. The entries were evaluated in a two-stage process by the SINET Showcase Steering Committee, which was comprised of 100 Cybersecurity professionals, including chief security information officers from leading organizations worldwide, experts in government intelligence and defense agencies and distinguished venture capital firms specializing in security.


The following companies were selected as the 2016 SINET 16 Innovators:

BlackRidge Technology: BlackRidge provides an identity-based network and cyber security solution that authenticates identity and applies policy on the first packet of network sessions. This provides a new level of real-time protection that cloaks and protects servers, segments networks, and provides identity attribution.

Contrast Security, Inc: Contrast Security provides continuous protection of enterprise applications and services against both vulnerabilities and attacks. Contrast uses “deep security instrumentation” for unprecedented speed, accuracy, coverage, & scalability without experts or SLC changes. Think “New Relic for Security.”

CyberX: CyberX secures the Industrial Internet, providing real-time detection and deep insight into control systems’ vulnerabilities while ensuring business and operational continuity. With field-proven technology and accredited research, CyberX protects dozens of major industrial sites worldwide.

DataVisor: DataVisor is the only online fraud detection service utilizing unsupervised big data analytics to identify attack campaigns before they conduct any damage to consumer-facing online services.

Digital Shadows: Digital Shadows provides cyber situational awareness, through our SearchLight platform, which provides truly relevant, contextual intelligence and protects organizations against cyber attacks, loss of intellectual property, and loss of brand integrity by providing them an “attacker’s eye view.”

Interset: Interset provides an intelligent, accurate threat-detection solution. Interset detects threats through machine learning and advanced analytics running on a big-data platform, either on premise or in the cloud.

Menlo Security: Menlo Security protects organizations from cyber attacks by eliminating the threat of malware from Web and email with its patented Isolation Platform that easily scales for any size organization and requires no end point software, making it simple and cost effective to deploy.

Ntrepid Corporation (Passages): Passages provides a secure virtual browser that protects enterprises from all web-based attacks. By isolating browsing activity from the local computer and network, users can access any website and follow any link without the risk of infecting their machines or company infrastructure.

Phantom Cyber Corp.: Phantom is a security automation & orchestration platform that integrates existing security products to provide a layer of “connective tissue” between them. Phantom executes digital playbooks to achieve in seconds what may take hours to accomplish with the horde of products enterprises use daily.

Post-Quantum: Post-Quantum is a science-driven UK company with a mission to protect the world's data by deploying secure and innovative authentication, communications, encryption and access technologies. Our modules are ready for use today, but will remain strong in the future, even with quantum computer threats.

Elastic/Prelert: Prelert provides behavioral analytics for IT security, IT operations and business operations teams. It analyzes massive amounts of log data, finds anomalies, links them together and lets the data tell the story behind advanced security threats, IT performance issues and business disruptions.

ProtectWise: ProtectWise™ is disrupting the security industry with its network security platform, that captures high fidelity network traffic, creates a lasting memory for the network, and delivers real time and retrospective alerting and analysis in a rich, innovative visualizer.

RiskSense: RiskSense is the leader in cyber risk management. We enable organizations to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

SafeBreach: SafeBreach is a pioneer in continuous security validation. Our groundbreaking platform simulates breach methods with an extensive and growing Hacker’s Playbook™ of research and real-world investigative data to provide a “hacker's view” of an enterprise’s security posture.

ThreatQuotient Inc: ThreatQuotient provides ThreatQ, a threat intelligence platform that centrally correlates unlimited external sources with internal security solutions for contextual, operationalized intelligence in one easy to comprehend view to help customers tailor indicators of compromise to their industry.

Vera: Vera is an enterprise data security and information rights management company that allows IT to secure, track and audit any type of digital information. With Vera, security and policy travels with the data, so enterprises can maintain visibility and control over who can access sensitive information.

"With the dramatic increase in attacks, we must be relentless in identifying and supporting innovative solutions. The SINET Showcase provides an excellent opportunity to highlight advanced technologies in order to stay ahead of our global adversaries,” says Robert Rodriguez, Chairman and Founder of SINET. “This year’s SINET 16 process was our most competitive yet, with many of the winners scoring just hundredths of a point ahead of other candidates.”


SINET Showcase provides a platform for the business of Cybersecurity to take place as emerging technology companies are able to present their solutions and connect with a select audience of nearly 400 venture capitalists, investment bankers as well as industry and government buyers. The program, which is supported by the Department of Homeland Security, Science & Technology Directorate, also features commentary on the latest investment and Cybersecurity trends from the industry’s foremost experts. The program includes educational workshops, panel sessions, an interactive luncheon hour and a networking reception.

To register for SINET Showcase and to see a complete list of speakers and a program agenda, see here.


SINET is a Super-connector that accelerates Cybersecurity innovation into the global marketplace by providing trusted platforms for the business of Cyber to take place between investors, entrepreneurs and industry and government buyers. SINET events, membership program and strategic advisory services have delivered unsurpassed value within the ecosystem of the entrepreneur: academia, science, private industry, investment banking, system integration, policy, innovators, venture capital and the Federal Government including civilian, military and intelligence agencies. Our programs consistently attract the highest level of international industry and government executives, and take place in Silicon Valley, New York, London, Sydney and Washington DC.

Bengaluru: Cyber security vendor Fortinet opens new Wi-Fi facility

Fortinet, the Nasdaq-listed cybersecurity vendor has announced the setting up of its new innovation centre in Bengaluru to build Wi-Fi solutions. The centre is the company’s largest R&D facility outside North America. The team at the Fortinet Innovation Centre will develop algorithms that secure large enterprise networks running mobile and IoT devices, and location-based services. The Wi-Fi research facility adds to the vendor’s distributed denial of service (DDoS) R&D team in Hyderabad, which builds the hardware logic for its DDoS attack mitigation appliances.

“In Bangalore, we are building enterprise class Wi-Fi systems that seamlessly onboard and switch customers between Wi-Fi and LTE networks,” said Kishore Reddy, vice-president of engineering & country manager, Fortinet Innovation Centre. “Our research team will also provide business intelligence to customers who have very large on-premise Wi-Fi deployments. The investments to expand the R&D infrastructure here augment Fortinet’s plans to increase its share in the global wireless market.” The company did not share any investment figures with the media.

Fortinet also inaugurated its new 60,000 sq ft office, spread across three floors in Bengaluru, which consolidates various offices to one location, including the 25,000 sq ft innovation centre. The company’s senior executive vice president, worldwide sales and support , Patrice Perche inaugurated the centre and shared Fortinet’s business expansion plans in India.

The cybersecurity vendor is strengthening its presence in the Indian market with the appointment ofdomain specialists to provide network security expertise to every major industry—government, telecom, healthcare, BFSI, retail, manufacturing and education.

“Today, most connected devices use Wi-Fi as their default connectivity standard. With the proliferation of IoT, seamlessly blending Wi-Fi access with network protection is an integral part of the Fortinet security fabric. With the Wi-Fi industry growing at double-digit rates, the research activities
carried out by this team are highly relevant not only in the Indian market but all over the world,” said Perche.

India, UK cybersecurity watchdogs sign pact for cooperation

NEW DELHI: State-run cybersecurity bodies of India and the UK have signed a Memorandum of Understanding for close cooperation on counter cyberattacks these countries face.

"The Union Cabinet under the Chairmanship of Prime Minister Narendra Modi has been apprised of the MoU signed on May 20, 2016, between Indian Computer Emergency Response Team (CERT-In) and Ministry of Cabinet Office, UK, as represented by CERT-UK, a unit of the Cabinet Office on Cyber Security," an official statement today said.

The MoU intends to promote closer cooperation between India and the UK for exchange of knowledge and experience in detection, resolution and prevention of security-related incidents, it added.

"With this MoU, participating countries can exchange technical information on Cyber attacks, response to cyber security incidents and find solutions to counter the cyber attacks. This MoU helps to strengthen cyber space of both countries, capacity building and improving relationship between them," the statement said.

Earlier CERT-In signed MoUs with counterpart/similar organisations in about seven countries - Korea, Canada, Australia, Malaysia, Singapore, Japan and Uzbekistan. Ministry of External Affairs has also signed MoU with Cyber Security as one of the areas of cooperation with Shanghai Cooperation Organisation.

Wirepas and u-blox offer scalable and easy-to-use industrial IoT solutions

Wirepas and u-blox are partnering to offer an advanced decentralised radio communications solution (comparable with advanced mesh technology) for industrial Internet of Things (IoT) applications in order to make large scale deployments easier to achieve.

The solution looks to address problems associated with the speed and complexity of deployments associated with the IoT, an industry that is still quite young and fragmented, tending to make deployments both slow and complex for end customers.

The NINA-B1 is a small, stand-alone Bluetooth low energy module. It is being targeted at several different applications, such as healthcare, connected buildings, manufacturing and telematics. The module has been certified for a range of countries world-wide, reducing risk and time to market for customers integrating the module in their devices.

“The NINA-B1 in combination with the Wirepas Connectivity software will enable shorter time to market for easy-to-install, large scale, decentralised industrial IoT applications in segments such as lighting, sensor, asset tracking and beacons,” explained Hakan Svegerud, Head of Product Strategy, Short Range Radio, at u‑blox.

Cyber Security student researches how to keep cars safe from hacking

In 2015, two researchers remotely hacked a Jeep Cherokee being driven by a reporter who documented how the researchers controlled everything from the car's radio and media console to its brakes and steering.

For Dr. Shucheng Yu, an associate professor of computer science at the University of Arkansas at Little Rock, the exercise demonstrated how vulnerable smart cars with GPS, Bluetooth, and internet connections are to cyberattacks.

"These cars have become the trend of the future," Yu said. "There could be some very severe consequences if someone hacked into the car. A car can be fully controlled by the hacker if it is not protected."

So Yu and his student, Zachary King, a junior majoring in computer science at UALR, spent the summer researching how to keep cars safe from cyberattacks. They worked on the project during an intensive eight-week summer research program at UALR.

King was one of 10 college students from across the country recruited through a National Science Foundation grant-funded project, "REU Site: CyberSAFE@UALR: Cyber Security and Forensics Research at the University of Arkansas at Little Rock."

The goal of the program is to decrease cyberattacks on people using mobile technology and social networking sites, said Dr. Mengjun Xie, an associate professor of computer science and director of the CyberSAFE@UALR program.

"The basic idea is to integrate cybersecurity and cyber forensics research with the latest technology in mobile cloud computing and social media to provide research opportunities to students," Xie said.

More than 130 students applied for 10 spots. Participants included undergraduate college students with a grade point average of 3.0 or higher who are majoring in computer science, computer engineering, math, physics, or electrical engineering.

Those selected spent eight weeks conducting research full time with a faculty mentor at the University of Arkansas at Little Rock. Participants received a $4,000 stipend, on-campus housing, a meal plan, and travel expenses.

How to protect your smart car?

In his project, "Investigating and Securing Communications in the Controller Area Network (CAN), King created a security protocol to protect smart cars from hacking. He also built an experimental environment that simulates the communication system in a smart car, which allows the security protocol to be tested through simulations

The research focuses on the development of a security protocol to protect the Controller Area Network (CAN), an internal communications system in vehicles.

"There are many ways that hackers can control CAN," King said. "Once they access it, hackers can pretty easily control your car however they want. We are proposing to add a layer of security, so if an unauthorized person accesses it, they still wouldn't be able to control your vehicle."

The security protocol protects the CAN in two ways. It authenticates messages sent through the network by creating an authentication code. This authentication code allows nodes on the network to differentiate between a valid message and an attacker's message.

The second security feature protects against replay attacks, when a hacker attempts to breach the network by repeatedly sending an old message. The protocol uses a timestamp to calculate when the network last received the message, which verifies the message's "freshness."

Yu and King are continuing their research this fall. In the future, Yu hopes to collaborate with industry and funding agencies to implement the security protocol in commercial vehicles and protect cars from hackers.

As for King, participating in this summer research program has left him considering a career in cybersecurity once he graduates in 2018.

"Three months ago, I wouldn't have been able to tell you much about cybersecurity and what a security protocol would look like," he said. "After having completed this program, I am more interested in cybersecurity than I was before, and I may end up going that route."

Wipro picks up minority stake in Israeli cybersecurity firm for $1.5mn

Country’s third largest software services firm Wipro has bought minority stake in Israeli cyber security company Intsights Cyber Intelligence for $1.5 million. Wipro, in a BSE filing, said, "The target entity (Intsights) is an early-stage company founded in 2015… Intsights offers a threat intelligence driven security platform employing cyber intelligence, rapid mitigation and one-click remediation."

Wipro has acquired a minority stake of less than 20 percent on a fully diluted basis in the Tel Aviv-headquartered firm for a cash consideration of $1.5 million, it added.

The Bengaluru-based company expects the transaction to be completed by August 31, 2016. In the past few quarters, Wipro has announced a string of investments, including acquisition of companies like HealthPlan Services ($460 million), Cellent of Germany (for $77 million) and US-based Viteos Group for $130 million. However, it later called off the buyout of US-based Viteos Group, citing inordinate delays in completion of closing conditions.

Wipro’s net profit for the June quarter had declined 6.7 percent to Rs 2,059 crore, while its total income from operations rose 10.7 percent to Rs 13,697.6 crore from the year-ago period. Shares of Wipro closed 0.75 percent down at Rs 524.80 apiece on BSE.

Few months back the firm joined multinationals names like Microsoft, IBM, and Target with its Startup Launchpad. The mission of this launchpad was to partner with startups to leverage their technology solutions in the market. According to Amit Phadnis, President, Engineering and India Site Leader, these could be both early as well as late-stage startups.

Amit believes that the next wave of technology will come through a ‘consortium’ approach to problem solving. A consortium approach essentially means that different ecosystems will come together, along with different stakeholders, to test technologies for a variety of use cases. The areas LaunchPad aimed to address include education, healthcare, manufacturing (following the industry 2.0 revolution), and smart cities along with adjacent solutions such as e-governance.

Blockchain ripe for IoT security and monetization

Both the securing of the Internet of Things, as well as the monetizing of it, are roles for blockchain technology, experts say.

In one developing case, the Isle of Man, a self-governing British dependency located just off the U.K. mainland, is testing the use of a blockchain prototype to try to preemptively see-off IoT hacking, according to Financial News, which wrote about the island’s efforts.

The island is a financial center and is looking to expand its offerings through fintech. It’s already involved in digital currency.

In another thrust, blockchain could be a way to add security, privacy and micro-payments to sensors and devices, says Craig Bachman of TM Forum’s Open Digital Program, writing in an unrelated blog post.

What is blockchain?

Blockchain, for those who need to get their heads around this revolutionary authentication and transactional system, is a securely managed database—or ledger—that’s distributed by a network.

The network nodes all maintain a copy of the encrypted database, and new records can be added only through complicated hash validation functions. The records are added in blocks that link securely to the previously added block—hence the name.

Each node-held database contains the entire transactional history, so central databases become redundant. The record is supposedly secure in part because no one person can manipulate it—the database is replicated on all the nodes and can’t be changed on all of them without the right cryptographic key.

Perhaps the most important element is that all of the transactions or events are indelibly recorded, making fraud hard to perpetrate—data anomalies are transparent.

Blockchain ledger system for IoT devices

In the Isle of Man project, Blockchain startup Credits, along with the government there, has started to develop its blockchain-based distributed ledger system that assigns and manages unique digital identities for IoT devices, Financial News explains.

The idea behind that system is that “a unique, non-forgeable identity” is assigned to “physical items,” says Credits CEO and co-founder Nick Williamson, “and what the blockchain provides is the way of managing and maintaining an identity.”

In other words, registration of an asset—the IoT device— takes place, then authentication, provided by the blockchain, guarantees it.

Monetization, is another facet. That’s where Bachman is coming from in his blog post.

“The Internet of Things needs a Ledger of Things. It needs a way to score what’s talking to what, who owes who money, and reconcile all of that,” says Alex Tapscott, co-author with Don Tapscott of Blockchain Revolution, in Bachman's post.

In effect, the IoT’s numerous sensors could monetize through micro-transactions, Bachman says.

Service-level agreements could be one example, say, where the checking and enforcing of contracts takes place as sensors or chips are used.

The IoT genre could conceivably end up in the trillions-of-devices stratosphere, and one could argue that a method needs to be devised to audit potentially trillions of minuscule transactions. Blockchain allows for “recording the data and also ensuring it can’t be changed,” Bachman says. So, it would be a good way to do that, he says.

Provisioning of services, time-stamping and digital assets such as music and other intellectual property, tied in with IoT devices and sensors, might mesh well with blockchain, too.

Interestingly, much time-stamping, including global banking, uses the GPS constellation’s atomic clocks, and GPS isn’t authenticated at the civilian level, so that system could conceivably use the fraud detection inherent in blockchain.

Elections, along with public auditing of ballots, and indeed some say banking itself, might be ideal for blockchain adoption, too.

Wavefront and Vandrico accelerate industrial IoT through collaboration with wearable OEMs

Designing wearable devices that can withstand industrial IoT (IIoT) applications is an ongoing challenge for IoT solutions providers. Few wearable technologies and sensors are suitable for industrial working environments where hazardous conditions, such as extreme temperatures and pressure, make current wearables useless. It’s a challenge that Vandrico wants to overcome.

Vandrico is in the business of developing enterprise software that makes data a sixth sense. The firm does this by gathering data through wearables and IIoT sensors and translating it into personalized, actionable insights for improved safety and productivity. Currently headquartered at Wavefront’s accelerator in Vancouver, the company is building an ecosystem that is propelling the creation of wearables and IIoT solutions.

Wavefront program has been very effective

Working together with Wavefront, Vandrico has been able to use the mentorship and international exposure only offered through this accelerator to propel their ‘Connected Worker’ software platform for use in industrial applications. “We are proud to have helped Vandrico, who participated in our Global Market Entry Program to Silicon Valley last year, where we facilitated introductions to several global market operators and large eco-system players,” says Alan Swain, VP technology & operations, Wavefront. “This particular Wavefront program has been very effective and, in fact, we have taken over 170 companies into 35 different countries.”
Vandrico’s Connected Worker is a very flexible platform that allows businesses to deploy wearables to their employees, from mining companies, utilities, manufacturers or any industrial enterprise. This software platform is currently being tested in underground mines to increase safety while driving down operating costs.

Significant opportunity for industrial wearable device OEMs

“Our ongoing challenge is to find industrial grade sensors and wearable devices that are the highest possible quality and can interface with our open software platform,” says Paola Telfer, chief commercial officer at Vandrico. “In our search, we have created a wearables database that currently tallies 39 industrial devices. Of these, only a handful are suitable for our industrial clients’ working environments creating a significant opportunity for industrial wearable device manufacturers who want to leverage the IoT and are looking for applications.”

The international wearables design community refers to Vandrico’s online database as the current “industry bible” for finding high quality wearable sensors and devices. Vandrico wants to inspire the creation of more industrial wearables and establish a new industrial ecosystem according to Telfer.

How do you get on Vandrico’s wearables list? By creating a high quality device or sensor that is:-

* Wearable – Device must be worn on the body throughout its use; it should not be carried.
* Controllable – Device must be controllable by the user; this could be done either actively or passively.
* Enhancing – Device must augment knowledge, facilitate learning or enhance experience.

For industrial IoT applications, it should also be able to withstand large high temperature and pressure changes as well as being waterproof and durable. It is also critical that the battery life for a device survive an entire shift for an industrial worker. Engineers and hardware designers can seize upon the IIoT opportunity by interfacing with Vandrico’s open communications platform. The Connected Worker works best with Android devices but uses open source standards, making it interoperable with most hardware and easy to integrate with other best-in-class enterprise software (such as SCADA and ERPs).

Vandrico’s relationship with Wavefront has enabled the company to use best business practices to develop and fine tune their product roadmap for use by an international base of clients. “We’ve made so much progress,” states Telfer, “and we are excited about bringing systems together to make better sense of data being gathered, and offer actionable information to front line decision makers.”
“We are looking to collaborate with hardware manufacturers,” says Telfer “to accelerate the Industrial IoT revolution, making the future for enterprises smarter, safer and more connected.”

The impact of IIoT wearables in Canada’s mining

Being a Canadian company, Vandrico is working closely with the mining sector to leverage their Connected Worker platform. Not only is mining one of Canada’s most important economic sectors, it is also a major job creator. Knowing this, Vandrico is testing its platform in several mining operations enabling them to receive data in near real-time, making mines more efficient and safe.

It is now possible for mining operations management to obtain a 3D visualization of people, sensors and equipment from data gathered in the field and displayed in Vandrico’s Connected Worker dashboard. Front line operations managers and field workers are empowered to close the gaps between planned and actual operations in underground or open pit mines.

Vandrico’s Connected Worker platform is helping miners identify and respond to potentially dangerous issues. Miners are now given gas level warnings based on their proximity to triggered sensors – saving lives. Proximity alerts also protect miners from large moving vehicles when a field worker is in the vicinity of a large vehicle on the move, preventing serious accidents. Mine workers can use a one-touch distress call feature to send an urgent notice to the surface. The surface system is designed to send immediate alerts to key personnel and emergency responders based on the type of incident being reported – reducing response time and risks to other workers. All of this is accomplished using a mine-specific IoT across a Wi-Fi network using data from wearable devices and sensors placed throughout the mine.

What critical functionality is essential when designing durable IIoT wearables and sensors?

* Stand-alone wireless connectivity (SIM and/or WiFi enabled) which doesn’t rely on tethering via Bluetooth to a smartphone
* An interface to communicate medium-fidelity information.
* A method for the user to respond, which can be operated in all industrial environments (e.g. robust tactile buttons or rotary switches).
* Means to attract the user’s attention in loud industrial environments (using a combination of vibrators, speakers and/or lights).
* The device operating system must be flexible and completely open to customization.
* The device or sensor must be sufficiently durable and waterproof (IP67 standards).

RetroScope can be the next frontier in cybercrime investigation

WASHINGTON: Scientists, including one of Indian-origin, have developed a new technique that could help law enforcement officials gather data from smartphones while investigating crimes.

The increasing use of mobile technology in today's society has made information stored in the memory of smartphones just as important as evidence recovered from traditional crime scenes.

The new technique, called RetroScope, moves the focus from a smartphone's hard drive, which holds information after the phone is shut down, to the device's RAM, which is volatile memory.

"We argue this is the frontier in cybercrime investigation in the sense that the volatile memory has the freshest information from the execution of all the apps," said Dongyan Xu, professor at Purdue University, who led the research along with colleague Xiangyu Zhang.

"Investigators are able to obtain more timely forensic information toward solving a crime or an attack," Xu said.

Although the contents of volatile memory are gone as soon as the phone is shut down, it can unveil surprising amounts of forensic data if the device is up and running.

It was discovered that apps left a lot of data in the volatile memory long after that data was displayed, Xu said.

To uncover that data, researchers including doctoral students Rohit Bhatia theorised that rather than focusing on searching for that data, the phone's graphical rendering code could be re-targeted to specific memory areas to obtain and bring up several previous screens shown by an app.

RetroScope makes use of the common rendering framework used by Android to issue a redraw command and obtain as many previous screens as available in the volatile memory for any Android app.

The screens recovered, beginning with the last screen the app displayed, are presented in the order they were seen previously.

"Anything that was shown on the screen at the time of use is indicated by the recovered screens, offering investigators a litany of information," Xu said.

In testing, RetroScope recovered anywhere from three to 11 previous screens in 15 different apps, an average of five pages per app. The apps ranged from popular social media platforms Facebook and Instagram to more privacy-conscious apps and others.

In testing, RetroScope recovered anywhere from three to 11 previous screens in 15 different apps, an average of five pages per app. The apps ranged from popular social media platforms Facebook and Instagram to more privacy-conscious apps and others.

"We feel without exaggeration that this technology really represents a new paradigm in smart phone forensics," Xu said. "It is very different from all the existing methodologies for analysing both hard drives and volatile memories,"

Prev Next


Sign Up for Monthly Newsletter

Recent Tweets


Crux Center for Security
Research and Events (CCSRE)
316-317, Bestech Chambers,
Sushant Lok – 1, Gurgaon,
Haryana, 122002

0124- 4207903, 05, 06