Data breach readiness June 2016, Information Security This is the first of three articles on data breach readiness: Incident response and reputation protection plans are the key components of data breach management.
Hikvision buys Pyronix June 2016, Hikvision South Africa, Surveillance, News & Events Pyronix, a security manufacturer focusing on intrusion alarm systems, has announced its acquisition by Hikvision.
Golfing for charity June 2016, News & Events The South African Institute of Security (SAIS) held its Annual Charity Golf Day on Friday 6th May 2015 at the impressive and challenging Gary Player designed Blue Valley Golf Club in Midrand.
SAIDSA launches product certification programme June 2016, SAIDSA(SA Intruder Detection Services Association), Perimeter Security, Alarms & Intruder Detection, Associations The South African Intruder Detection Services Association (SAIDSA) has announced the start of a product certification programme with benefits for the industry as a whole, as well as for end users.
Huawei awarded for Kenyan smart city June 2016, News & Events, Government and Parastatal (Industry) With the company’s end-to-end offerings, authorities can access, store, share and analyse public safety data with ease.
Dinner and surveillance June 2016, Axis Communications SA, Surveillance, Products & Solutions Upmarket restaurant and bar group, The Baron, use Axis cameras for a clearer picture.
WQHD resolution DVRs June 2016, GoThermal (TeleEye), Surveillance, Products & Solutions TeleEye has launched the GN Series, a new generation of DVRs with WQHD resolution. WQHD is a video resolution standard equivalent to 2560 x 1440 pixels.
Protecting remote mobile sites June 2016, Surveillance, Access Control & Identity Management, Asset Management, Security Services & Risk Management No incidence of theft and vandalism has occurred at a mobile operator’s remote site after ODET PIDS was installed for a period of one year.
SA needs a dedicated IoT network June 2016, Integrated Solutions, Infrastructure, Security Services & Risk Management IoT is coming. South Africa needs a dedicated network, standards and infrastructure, says Eckart Zollner, head of business development at the Jasco Group.
Caveat emptor (buyer beware) June 2016, Security Services & Risk Management More frequently, ordinary South Africans are losing their money by being misled by rogue individuals or con artists, cyber crooks, fraudulent Ponzi or pyramid schemes and those misrepresenting themselves as financial service providers (FSP) or authorised representatives of an FSP.
Truth or dare? June 2016, Alwinco, Security Services & Risk Management To be able to practice proactive crime prevention, criminals’ opportunities need to be eliminated or at least minimised.
Fire detector types and selection May 2016, FDIA (Fire Detection Industry Association), Fire & Safety, Associations There are various types of detectors available for fire detection system designers and each type is suitable for a particular use. Charles Thiongo from the FDIA elaborates.
Balancing CCTV surveillance and physical security or policing May 2016, Leaderware, Surveillance Managing the relationship between surveillance and security operational forces on the ground is key to an effective and successful security operation.
PSIM market predictions May 2016, Surveillance, Integrated Solutions Keith Bloodworth, CEO of CNL Software, reviews what was happening in the PSIM world in 2015, primarily looking at the security and facilities market and his market predictions for these markets in 2016.
A multi-pronged approach to security May 2016, Security Services & Risk Management, Mining (Industry) More mines are beginning to see security as an investment rather than simply a cost centre.
4K analogue video May 2016, Hikvision South Africa, Surveillance, News & Events Third-generation Turbo HD from Hikvision offers higher video performance, increased compression efficiency, longer transmission distances and Power over Coax technology.
Cyber threats faced by the financial sector May 2016, Information Security MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.
When advertising becomes dangerous May 2016, Information Security “Leveraging an attack through a supplier proves an easier path to success than a direct attack on the intended victim.”