Editor's Choice



SA needs a dedicated IoT network
June 2016, Integrated Solutions, Infrastructure, Security Services & Risk Management
IoT is coming. South Africa needs a dedicated network, standards and infrastructure, says Eckart Zollner, head of business development at the Jasco Group.

Read more...
Caveat emptor (buyer beware)
June 2016, Security Services & Risk Management
More frequently, ordinary South Africans are losing their money by being misled by rogue individuals or con artists, cyber crooks, fraudulent Ponzi or pyramid schemes and those misrepresenting themselves as financial service providers (FSP) or authorised representatives of an FSP.

Read more...
Truth or dare?
June 2016, Alwinco, Security Services & Risk Management
To be able to practice proactive crime prevention, criminals’ opportunities need to be eliminated or at least minimised.

Read more...
Fire detector types and selection
May 2016, FDIA (Fire Detection Industry Association), Fire & Safety, Associations
There are various types of detectors available for fire detection system designers and each type is suitable for a particular use. Charles Thiongo from the FDIA elaborates.

Read more...
Balancing CCTV surveillance and physical security or policing
May 2016, Leaderware, Surveillance
Managing the relationship between surveillance and security operational forces on the ground is key to an effective and successful security operation.

Read more...
PSIM market predictions
May 2016, Surveillance, Integrated Solutions
Keith Bloodworth, CEO of CNL Software, reviews what was happening in the PSIM world in 2015, primarily looking at the security and facilities market and his market predictions for these markets in 2016.

Read more...
A multi-pronged approach to security
May 2016, Security Services & Risk Management, Mining (Industry)
More mines are beginning to see security as an investment rather than simply a cost centre.

Read more...
Reducing perimeter false alarms
May 2016, Perimeter Security, Alarms & Intruder Detection
Reducing false alarms in perimeter intrusion detection systems (PIDS).

Read more...
4K analogue video
May 2016, Hikvision South Africa, Surveillance, News & Events
Third-generation Turbo HD from Hikvision offers higher video performance, increased compression efficiency, longer transmission distances and Power over Coax technology.

Read more...
Cyber threats faced by the financial sector
May 2016, Information Security
MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.

Read more...
Hook, line and sinker
May 2016, Information Security
If whaling is the new phishing, here’s how to protect your organisation’s big phish.

Read more...
When advertising becomes dangerous
May 2016, Information Security
“Leveraging an attack through a supplier proves an easier path to success than a direct attack on the intended victim.”

Read more...
Taking on illegal mining
May 2016, Surveillance, Mining (Industry)
In their battle against artisanal miners illegally entering their properties and compromising site safety, mines have been unsuccessfully looking out for security solutions that are both reliable and affordable.

Read more...
New multimillion rand port security system for SA
May 2016, Surveillance, Integrated Solutions
Transnet National Ports Authority has introduced a state-of-the-art port security system valued at R843 million.

Read more...
Surveillance storage is booming
May 2016, Surveillance
566 petabytes was the amount of data produced in just one day by all the new video surveillance cameras installed worldwide in 2015.

Read more...
Black box incident management
May 2016, Surveillance
Today’s incident management solutions should capture all incident data to provide organisations visibility into how incidents have unfolded.

Read more...
What keeps security and ­surveillance leaders up at night?
CCTV Handbook 2016, Technews Publishing, Surveillance
What is really happening out in the world when it comes to surveillance installations and operations? Hi-Tech Security Solutions asked a few people involved in ­surveillance security for their opinions.

Read more...
Effective operators mean effective intelligence
CCTV Handbook 2016, Surveillance, Integrated Solutions, Conferences & Events
The full potential of surveillance is realised when it incorporates the ability to gather intelligence from footage for proactive prevention of crimes, or at least to mitigation of the damage.

Read more...
Megapixels in focus
CCTV Handbook 2016, Justicia Investigations, Surveillance, Conferences & Events
Leo Nardi joined the presenters at iLegal 2016 to review his experiences at Toyota as the company engaged in a long-term project to upgrade its camera installation to megapixel IP systems.

Read more...
Securing your security infrastructure
CCTV Handbook 2016, Leaderware, Surveillance, News & Events
Dr Craig Donald examines the pros and cons of on-site versus off-site surveillance.

Read more...



<< First   < Previous   Page 57 of 63   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.