Editor's Choice



TAPA SA conference 2017
February 2018, Asset Management, Integrated Solutions, Security Services & Risk Management
TAPA held its South African conference at Emperor’s Palace late last year. Hi-Tech Security Solutions was there to cover the event.

Read more...
Decrypting encryption
February 2018, Technews Publishing, Information Security, Integrated Solutions
Encryption is undoubtedly useful, but has it advanced to the stage where it is also easily usable in business and consumer settings?

Read more...
Tomorrow’s surveillance – today’s reality
February 2018, Technews Publishing, Leaderware, Surveillance, Information Security, News & Events, Integrated Solutions
The Crowne Plaza in Rosebank, Johannesburg, was the setting for the 2017 iLegal conference, a joint venture between Dr Craig Donald and Hi-Tech Security Solutions.

Read more...
Powerful Android surveillance software
February 2018, News & Events
Kaspersky Lab researchers have uncovered an advanced mobile implant, active since 2014 and designed for targeted cyber-surveillance, possibly as an ‘offensive security’ product.

Read more...
Home and neighbourhood security
February 2018, Perimeter Security, Alarms & Intruder Detection, Products & Solutions
The Fynoti home alarm system is a standalone, wireless device that users can place unobtrusively in their homes. It is ideal for a shelf or small table, for example.

Read more...
The Moon at home
February 2018, Integrated Solutions, Infrastructure, Products & Solutions
World’s first all-in-one smart hub with levitation technology camera to enter into production after a successful crowdfunding campaign.

Read more...
Automated forest fire monitoring
February 2018, Surveillance, Fire & Safety, Products & Solutions
Firehawk offers an automated lookout service for forest fires, allowing responders to be on the scene in the shortest time possible.

Read more...
Product-specific training is ­essential
February 2018, Johnson Controls, Education (Industry), Training & Education
Generic training is widely available but of limited value to end-users who need to extract the most value from their security products.

Read more...
Encryption defined
1 February 2018, Information Security
Encryption is one of the tools that is used to protect data, but should form part of a data security strategy which defines various controls to keep data safe.

Read more...
Hacking public Wi-Fi
1 February 2018, Information Security, Infrastructure
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.

Read more...
Smart cities are built on smart thinking
November 2017, Technews Publishing, Integrated Solutions, Infrastructure
The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.

Read more...
Seeing right through you?
November 2017, Johnson Controls, Asset Management, Products & Solutions
Hi-Tech Security Solutions discusses the truth behind X-ray technology and how it can minimise theft and security risks.

Read more...
Protect your personal information
November 2017, News & Events, Security Services & Risk Management
SABRIC encourages consumers to protect their personal information by sharing it very selectively and on a need to know basis only.

Read more...
SOLID webKey is simple security
November 2017, Information Security, News & Events
Ansys débuts its first consumer cybersecurity product with an all-in-one account protection device.

Read more...
Physical and cyber defence centre
November 2017, Information Security, News & Events
XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services.

Read more...
Integrated border management
November 2017, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Government and Parastatal (Industry)
The most important component in the deployment of a physical security solution is the integration of various security systems into one solution.

Read more...
Disaster recovery as a service?
November 2017, Security Services & Risk Management
Johan Scheepers looks at the implications of the emergence as well as the benefits of disaster recovery as a service (DRaaS).

Read more...
Availability in the age of security risk
November 2017, Security Services & Risk Management
Enterprises are spending millions on disaster recovery (DR) and business continuity (BC) strategies but they do not invoke them nearly enough for the investment to be measured.

Read more...
Documentation for fire systems
November 2017, FDIA (Fire Detection Industry Association), Fire & Safety
A fire detection system is not considered complete until there is adequate and necessary documentation about the system.

Read more...
South Africa is a target for cyber attacks
November 2017, Information Security, Security Services & Risk Management
South Africa is currently a magnet for cyberattacks, with hackers set on stealing data.

Read more...



<< First   < Previous   Page 43 of 62   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.