classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018

Cyber Security

IoT is convergence in action
March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Integrated Solutions, IT infrastructure

The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.

Stop hacking of access control ­systems
March 2019, This Week's Editor's Pick, Access Control & Identity Management

Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.

Halt, who goes there?
March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick

As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.

New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , This Week's Editor's Pick, News, Conferences & Events, Training & Education

Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...

How to spot if your password was stolen in a security breach
March 2019

This article will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

A logical solution for cyber solutions
March 2019, Suprema, Access Control & Identity Management, Products

BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.

Top five security trends to look out for in 2019
March 2019, Genetec, CCTV, Surveillance & Remote Monitoring

From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.

ESET launches a new blog aimed at insecure Android apps
March 2019

Insecure apps are much harder to identify and protect, while being no less of a threat.

Security and cloud computing
March 2019, Integrated Solutions

Improving security is a strong motivation to accelerate the move from traditional IT architectures to modern, cloud ones.

Security by design
March 2019, Johnson Controls, Integrated Solutions

The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.

Managed IT security solution
March 2019, IT infrastructure, Products

The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.

Securing IoT, step by step
March 2019, IT infrastructure

Kaspersky Lab joins forces with industry leaders to deliver actionable technical guidance for multiple IoT stakeholders.

How quickly could a cyber-attack take down critical infrastructure?
March 2019

With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber-attacks, on operational technology networks.

Cyber Risk 101
March 2019

What every business needs to know about protecting themselves in case of a cyber-attack.

Page 1 of 59 Next > Last >>

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.