Editor's Choice



Hacking public Wi-Fi
1 February 2018, Information Security, Infrastructure
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.

Read more...
Smart cities are built on smart thinking
November 2017, Technews Publishing, Integrated Solutions, Infrastructure
The smart city concept integrates ICT and various physical devices connected to the network to optimise the efficiency of city operations and services and connect to citizens.

Read more...
Seeing right through you?
November 2017, Johnson Controls, Asset Management, Products & Solutions
Hi-Tech Security Solutions discusses the truth behind X-ray technology and how it can minimise theft and security risks.

Read more...
Protect your personal information
November 2017, News & Events, Security Services & Risk Management
SABRIC encourages consumers to protect their personal information by sharing it very selectively and on a need to know basis only.

Read more...
SOLID webKey is simple security
November 2017, Information Security, News & Events
Ansys débuts its first consumer cybersecurity product with an all-in-one account protection device.

Read more...
Physical and cyber defence centre
November 2017, Information Security, News & Events
XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services.

Read more...
Integrated border management
November 2017, Perimeter Security, Alarms & Intruder Detection, Integrated Solutions, Government and Parastatal (Industry)
The most important component in the deployment of a physical security solution is the integration of various security systems into one solution.

Read more...
Disaster recovery as a service?
November 2017, Security Services & Risk Management
Johan Scheepers looks at the implications of the emergence as well as the benefits of disaster recovery as a service (DRaaS).

Read more...
Availability in the age of security risk
November 2017, Security Services & Risk Management
Enterprises are spending millions on disaster recovery (DR) and business continuity (BC) strategies but they do not invoke them nearly enough for the investment to be measured.

Read more...
Documentation for fire systems
November 2017, FDIA (Fire Detection Industry Association), Fire & Safety
A fire detection system is not considered complete until there is adequate and necessary documentation about the system.

Read more...
South Africa is a target for cyber attacks
November 2017, Information Security, Security Services & Risk Management
South Africa is currently a magnet for cyberattacks, with hackers set on stealing data.

Read more...
Ransomware defined 2017
November 2017, Information Security
Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased, while just two strains of ransomware were responsible for 89.5% of all attacks in 2017.

Read more...
People on the move
Access & Identity Management Handbook 2018, Access Control & Identity Management, Integrated Solutions, Infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.

Read more...
Access and identity: looking ahead
Access & Identity Management Handbook 2018, neaMetrics, ZKTeco, Access Control & Identity Management, Integrated Solutions
Access and identity is more important than ever with more options than ever for companies looking for solutions that go beyond mere entry and exit.

Read more...
Trusting your privilege
Access & Identity Management Handbook 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions
Privileged access management is the starting point for effective enterprise identity and access management, whichever device you're logging in from.

Read more...
The access edge
Access & Identity Management Handbook 2018, Johnson Controls, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management
With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly providing opportunities to both security integrators and building managers.

Read more...
Facing the future
Access & Identity Management Handbook 2018, neaMetrics, Access Control & Identity Management, Infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Access Control & Identity Management, Information Security
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Ding dong, it’s IP
Access & Identity Management Handbook 2018, Elvey Security Technologies , TOA Electronics, Dahua Technology South Africa, Black Point Tech cc t/a BPT, Access Control & Identity Management
IP and open standards have taken the security technology world to a new level where proprietary systems and customer lock-in are no longer the global standard.

Read more...
Access a mobile-first world
Access & Identity Management Handbook 2018, Axis Communications SA, Access Control & Identity Management, Infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.

Read more...



<< First   < Previous   Page 44 of 63   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.