Hi-Tech Security Solutions Magazine


Featured articles


Services to get things done
The world has seen exponentialgrowth in cybercrimes. Syndicatesand individuals have turned to ourhyper-connected world to profitfrom our shortcomings.

Read more...

New intelligent video wall station
IDIS Intelligent Video Wall Station allows affordable and effective centralised monitoring by extending dynamic video wall benefits to smaller and mid-size users.

Read more...

The worst of times
Cyber resilience in terms of people, processes and technology is where it’s at when it comes to prevailing in a world beset with cybercriminals.

Read more...



Eagle Eye opens data centre in Qatar
Eagle Eye Networks, News, CCTV, Surveillance & Remote Monitoring

Purpose-built for video surveillance, cybersecurity and AI-enabled, Eagle Eye Networks’ new Doha, Qatar data centre is designed to meet the needs of large enterprise and multi-location customers.
read more


Oxeye mitigates Log4Shell vulnerability
Cyber Security, Products

Free Cloud native open-source payload deobfuscation tool spearheads initiative and supports developers, AppSec pros in stopping this threat.
read more


Speed up service delivery
News, Integrated Solutions, Government and Parastatal (Industry)

My Smart City platform speeds up service delivery in Cape Town, driven by private and public sector collaboration.
read more


Exposure in remote consultation
Cyber Security

More than a third of clinicians across META have had their patients’ data compromised when conducting remote telehealth sessions.
read more


SA’s industrial challenge
Cyber Security

Local enterprises need to consider the less desirable consequences of being connected to colleagues, suppliers and services providers all over the world: vulnerability to cybercrime.
read more


Unlocking the future of connectivity with Wi-Fi 6E
IT infrastructure

The pandemic has caused rapid acceleration of digital transformation initiatives across sectors and with it a host of new connectivity challenges that have yet to be solved.
read more


Don’t bash your head over unsecured credentials
Paxton, News, Access Control & Identity Management

Server administrators are likely to perform the same commands repeatedly, so it makes sense that all executed commands are stored, however, this also makes it easy for adversaries to compromise systems.
read more


Securing business systems goes beyond the technology
Vox , Cyber Security

While companies invest a great deal of time and effort in securing their systems, remote and hybrid working has forced businesses and their staff to acknowledge that security goes beyond technology.
read more


Getting the basics right
Technews Publishing, Editor's Choice

Cybersecurity is like any other discipline, you can’t start at the top, you need to get the basics right. Hi-Tech Security Solutions asks how to best do this.
read more


Cybersecurity for the board of directors
Editor's Choice

Bike-shedding is a common distraction in boardrooms, especially when discussing issues board members are responsible for, but don’t understand – like cybersecurity.
read more


SecurityHQ to enhance crucial security operations in southern Africa
Cyber Security

SecurityHQ helpsbusinesses detect,respond to and mitigate the growing number of cyber threats targeting the region.
read more


How to plan a cybersecurity attack response
Duxbury Networking, Entertainment and Hospitality (Industry)

After experiencing a breach, organisations often realise they could have avoided a lot of cost, pain and disruption if only they’d had an effective incident response plan in place.
read more


Cybercrime’s evolution and how we can fight back
Cyber Security

Good security isn’t bought off a shelf. It’s a complex and ongoing system and culture, like servicing your vehicles or balancing your books.
read more


A back to basics layered approach
Cyber Security

Cybercrime has risen exponentially since the start of the global pandemic. While no security is foolproof, crafting a security posture with multiple layers, built on the basic tenets of cybersecurity is certainly a good start.
read more


Security monitoring of user behaviour
Cyber Security

SaaS Alerts has released the capability for managed service providers to monitor the user behaviour associated with their instances of IT Glue, the IT documentation platform for MSPs.
read more


Gallagher achieves CPNI standards
Gallagher, Perimeter Security, Alarms & Intruder Detection

Gallagher’s Electronic Perimeter Intrusion Detection System (E-PIDS) has an extra seal of approval by achieving the latest Centre for the Protection of National Infrastructure (CPNI) standards.
read more


Ransomware uses AnyDesk to launch attacks
News

Sophos’ research explains how attackers attempt to bypass security controls by using a combination of Windows Safe Mode and the AnyDesk remote administration tool.
read more


Industrial control systems threat medley
News

According to Kaspersky ICS CERT report, almost one in three industrial computers globally was subject to malicious activity in the first half of 2021.
read more


IP-based emergency solution for stadium
Bosch Building Technologies, Asset Management, EAS, RFID, Integrated Solutions

Bosch provides fully IP-based emergency solution at Wycombe Wanderers’ Adams Park to keep fans safe at English Football League stadium.
read more


Spotting traffic violations
Dahua Technology South Africa, CCTV, Surveillance & Remote Monitoring

Intelligent solutions like the Dahua Traffic Management Solution can help ensure road safety by detecting speeding and running red lights.
read more


Cloud vulnerabilities: what CISOs need to consider
Cyber Security

With the digital transformation and an acceleration of modern technology, there has been a vast increase in security issues that chief information security officers (CISOs) have had to face.
read more


Managed cybersecurity for every business
J2 Software, Cyber Security

J2 is a cybersecurity-focused technology group founded in 2006, serving over 200 customers on three continents.
read more


Another security layer for Constantia and surrounds
Fidelity Services Group , CCTV, Surveillance & Remote Monitoring

Effective security efforts depend on a layered approach. It requires a network of cameras, boots on the ground, support from security stakeholders and the cooperation from ordinary citizens.
read more


New regulation sparks a solution
News

Sparks & Ellis has tailored an elegant solution to meet the criteria of the new Private Security Regulations Act and render security guard uniforms compliant.
read more


New-generation wireless alarm system
Dahua Technology South Africa, Perimeter Security, Alarms & Intruder Detection

Dahua Technology has released a series of wireless alarm products, including alarm hub, PIR detector, door detector, keyfob, repeater, input expander, indoor and outdoor siren and more.
read more


The crucial double check
Security Services & Risk Management

Andrea Babbs, UK general manager, VIPRE SafeSend, emphasises the importance of implementing a crucial double check to improve email security culture.
read more


Turnstar ramps up countermeasures
Turnstar Systems, Editor's Choice, Access Control & Identity Management, News, Products

Turnstar has developed and patented an early warning and deterrent system which will alert security, and anyone nearby, of any attempt to place ramps over the raised spikes.
read more


Fence tampering detection
Regal Distributors SA, Products

Electric fences often span hundreds of metres and these long distances can make it difficult to pick up when an intruder tampers with the fence. The Nemtek Dual Action Tension Sensor Set (DATS2) ensures ...
read more


Security made easy with AI
Hikvision South Africa, CCTV, Surveillance & Remote Monitoring

How can you spend as little time, energy and resources on your security as possible, while still keeping your property and your people safe?
read more


Dynamic Drop Arm Barrier
Turnstar Systems, Access Control & Identity Management

Suited to medium-volume access and medium-level security applications such as office reception areas, health clubs, universities and libraries, the Dynamic Drop Arm Barrier also allows special needs access.
read more


Premium forensic analytics
Milestone Systems, News, CCTV, Surveillance & Remote Monitoring, Government and Parastatal (Industry)

With the introduction of XProtect Rapid REVIEW, powered by BriefCam, Milestone’s customers will be able to accelerate investigations and find what they are looking for with speed and accuracy.
read more


Wireless outdoor motion detector with camera
Elvey Security Technologies , Perimeter Security, Alarms & Intruder Detection

The Ajax MotionCam Outdoor recognises intrusion and confirms it with a series of animated photos, saving users from concerns and security companies from unnecessary patrol dispatches.
read more


Surveillance in distribution centre
Dahua Technology South Africa, CCTV, Surveillance & Remote Monitoring

A large warehouse and distribution centre is benefiting from a 64-camera video surveillance system from Dahua Technology.
read more


Next-generation mobile APN product
Flickswitch, Products

SIMcontrol has launched its fully-managed mobile APN product that connects company data SIM cards via a private and secure network.
read more


Cybersecurity as the foundation
Axis Communications SA, Government and Parastatal (Industry)

It’s time to move to a proactive stance in protecting assets, before cities implement billions of hackable, un-patched and non-upgradable devices to the world’s digital grid.
read more