Editor's Choice



Business resilience will be key in 2019
February 2019, Security Services & Risk Management
One of the most important trends to emerge in recent years is that it is increasingly difficult to identify individual risks in isolation, says Michael Davies, CEO, ContinuitySA.

Read more...
Secure parking on major routes
February 2019, Asset Management, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Phambili Gama, COO of Zimele Investment Enterprise Company about its Zimele Truck Stops and the security in place to ensure the safety of people and assets on the sites.

Read more...
50% of companies can’t detect IoT breaches
1 February 2019, Information Security, Infrastructure
Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.

Read more...
SA fleet management report
1 February 2019, Asset Management, Security Services & Risk Management
IoT analyst firm, Berg Insight, says the installed base of fleet management systems in South Africa to reach 2,5 million units by 2022.

Read more...
Attack of the thingbots
1 February 2019, Information Security, Integrated Solutions
New F5 Labs research reveals IoT devices are now hackers’ No.1 target as multi-purpose attack thingbots loom large.

Read more...
Trust but continually verify
Access & Identity Management Handbook 2019, Technews Publishing, Access Control & Identity Management, Integrated Solutions, Infrastructure
Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.

Read more...
Managing who, what and why
Access & Identity Management Handbook 2019, Technews Publishing, Information Security
Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.

Read more...
Physical/logical convergence
Access & Identity Management Handbook 2019, Technews Publishing, Information Security, Integrated Solutions, Infrastructure
The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.

Read more...
Physical and logical convergence is a fact
Access & Identity Management Handbook 2019, Integrated Solutions, Infrastructure
Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?

Read more...
The expanding role of IT in access control
Access & Identity Management Handbook 2019, Technews Publishing, Access Control & Identity Management, Infrastructure
What role is IT playing in the world of physical access control and how far will its role expand in future?

Read more...
Taking augmented identity to the world
Access & Identity Management Handbook 2019, Technews Publishing, Access Control & Identity Management, Integrated Solutions
Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.

Read more...
Tracking biometrics into a brave new digital world
Access & Identity Management Handbook 2019, Access Control & Identity Management, Integrated Solutions
The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.

Read more...
A better approach to fingerprint biometrics
Access & Identity Management Handbook 2019, Access Control & Identity Management
Not all optical biometric fingerprint scanners are created equal. The type of sensor used has a powerful impact on speed, accuracy, reliability and portability.

Read more...
The right access decisions
Access & Identity Management Handbook 2019, Technews Publishing, Access Control & Identity Management
Making the right access control decision depends on what you want secured and how secure it should be.

Read more...
Digital channels and the evolution of ID
Access & Identity Management Handbook 2019, Access Control & Identity Management, Infrastructure
While the concept of identity (ID) remains unchanged, the rapid evolution of digital technology has dramatically extended both its application and form factor.

Read more...
Fingerprints protect privacy for AIDS testing
Access & Identity Management Handbook 2019, Access Control & Identity Management
A creative, progressive NGO uses biometric fingerprint scanning to redefine confidentiality and AIDS treatment in South Africa.

Read more...
NEC XON talks Industry 4.0 and disruption
November 2018, Technews Publishing, Information Security, Integrated Solutions, Conferences & Events, Training & Education
NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.

Read more...
Optimal selection of CCTV operators
November 2018, Leaderware, Surveillance, Security Services & Risk Management
Technology is often seen as the primary factor in the success of CCTV surveillance control rooms, yet Dr Craig Donald has seen new control rooms with the most up-to-date technology fail.

Read more...
Our dependence on cyber-connectivity
November 2018, Wolfpack Information Risk, Information Security, Government and Parastatal (Industry)
The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

Read more...
Border security: Technology or barriers?
November 2018, Technews Publishing, Perimeter Security, Alarms & Intruder Detection, Government and Parastatal (Industry)
While it is important to provide a visible as well as a covert patrolling presence on borders as well as points of entry from other countries, this needs to be supplemented with technology.

Read more...



<< First   < Previous   Page 35 of 63   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.