Information Security



End-to-end security, day after day
CCTV Handbook 2018, Bosch Building Technologies
All it takes for a hacker is finding a single weak link in a surveillance network to gain access to and jeopardise an entire data system.

Read more...
Protecting the nerve centre
CCTV Handbook 2018, Surveillance, Integrated Solutions
A control room is seen as a secure location that is tasked with securing other locations, but it is not unheard of in South Africa that a control room is hijacked. What can be done to secure these locations?

Read more...
Secure communication technology
CCTV Handbook 2018, Editor's Choice, Surveillance
Cyber-attacks on IoT devices are on the rise, with video surveillance systems connected to the Internet also becoming a popular target.

Read more...
Manage your devices centrally
CCTV Handbook 2018, Axis Communications SA, Surveillance, Products & Solutions
Axis launches new software for easy on-site device management and proactive cybersecurity control.

Read more...
Cyber-securing physical security
March 2018, AVeS Cyber Security, Editor's Choice
You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.

Read more...
Secured access control
March 2018, Suprema, Access Control & Identity Management
With the advances over the years in physical security products, these too have become open to cyber threats resulting in monetary and safety risks.

Read more...
Can you secure security?
March 2018, Graphic Image Technologies, Surveillance, Infrastructure
Is it possible to protect physical security systems from cyber intruders? Laurence Smith looks at the task of securing physical security.

Read more...
Cyber risks are business risks
March 2018
It is only when IT security-related risks are considered as business risks that the relevance of addressing them with proactive, strategic and appropriate solutions really becomes apparent.

Read more...
The reality of integrating physical and cyber
March 2018, Editor's Choice, Security Services & Risk Management
Meshing technology with physical security can vastly improve the overall security landscape for any organisation.

Read more...
Everything is connected
March 2018, Security Services & Risk Management
Whether you know it or understand it, everything is connected. John Mc Loughlin looks at cybersecurity in the physical security world.

Read more...
What lies ahead in 2018?
February 2018, Axis Communications SA, Cathexis Technologies, Forbatt SA, Milestone Systems, neaMetrics, Suprema, ZKTeco, G4S Secure Solutions SA, Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions
To find out what the physical security industry is expecting in 2018, Hi-Tech Security Solutions asked a few of the leading players what they expect in 2018 in South and southern Africa.

Read more...
Cybersecurity trends 2018
February 2018, Technews Publishing, Editor's Choice
Cybersecurity will remain a key issue for everyone in every industry this year. Here’s what some experts on the topic have to say.

Read more...
Decrypting encryption
February 2018, Technews Publishing, Editor's Choice, Integrated Solutions
Encryption is undoubtedly useful, but has it advanced to the stage where it is also easily usable in business and consumer settings?

Read more...
Tomorrow’s surveillance – today’s reality
February 2018, Technews Publishing, Leaderware, Editor's Choice, Surveillance, News & Events, Integrated Solutions
The Crowne Plaza in Rosebank, Johannesburg, was the setting for the 2017 iLegal conference, a joint venture between Dr Craig Donald and Hi-Tech Security Solutions.

Read more...
Cyber protection for SMEs
February 2018, News & Events
J2 Software has launched a packed solution aimed at helping SMEs get a handle on cyber threats.

Read more...
Managing money for security
February 2018
The industry at large has tightened its belts this year, and as we head into 2018 if 2017 has taught us anything then it is that we can’t afford to skimp on cybersecurity.

Read more...
A quantum leap
February 2018
What the future holds for business IT in 2018.

Read more...
Cyberattacks will not go away
February 2018, Infrastructure
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?

Read more...
Encryption is like beer goggles
February 2018
Encryption has become key to protecting the privacy of electronic communication, but it’s a bit like beer goggles, it makes everything look a lot rosier than it is.

Read more...
The science of securing cyber skills
1 February 2018, Training & Education
Urgent measures need to be taken to bridge the rapidly increasing cybersecurity skills gap, says Martin Walshaw, senior systems engineer at F5 Networks.

Read more...



<< First   < Previous   Page 43 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.