Home
About us
Back issues / E-book / PDF
Subscribe
Advertise
Handbooks ▼
Access & Identity Management
CCTV.
Residential Security
Handbooks
▸ Access & Identity Management
▸ CCTV.
▸ Residential Estate Security
Categories
▸ Editor's Choice
▸ Tech Jobs Network
▸ Career opportunities
▸ Advertise for staff
▸ News
▸ Access Control & Identity Management
▸ Asset Management, EAS, RFID
▸ Associations
▸ CCTV, Surveillance & Remote Monitoring
▸ Conferences & Events
▸ Cyber Security
▸ Fire & Safety
▸ Integrated Solutions
▸ IT infrastructure
▸ Perimeter Security, Alarms & Intruder Detection
▸ Products
▸ Security Services & Risk Management
▸ Smart Home Automation
▸ Training & Education
▸ Videos
▸ Security by Industry Sector
▸ Agriculture
▸ Commercial
▸ Education
▸ Entertainment and Hospitality
▸ Financial
▸ Government and Parastatal
▸ Healthcare
▸ Industrial
▸ Logistics
▸ Mining
▸ Residential Estate
▸ Retail
▸ Transport
×
Categories
Editor's Choice
Tech Jobs Network
▸
Career opportunities
▸
Advertise for staff
News
Access Control & Identity Management
Asset Management, EAS, RFID
Associations
CCTV, Surveillance & Remote Monitoring
Conferences & Events
Cyber Security
Fire & Safety
Integrated Solutions
IT infrastructure
Perimeter Security, Alarms & Intruder Detection
Products
Security Services & Risk Management
Smart Home Automation
Training & Education
Videos
Security by Industry Sector ▾
▸
Agriculture
▸
Commercial
▸
Education
▸
Entertainment and Hospitality
▸
Financial
▸
Government and Parastatal
▸
Healthcare
▸
Industrial
▸
Logistics
▸
Mining
▸
Residential Estate
▸
Retail
▸
Transport
PDF
e-Book
SMART Cybersecurity Handbook 2022
Find companies, products and services (HSBD)
Featured articles
Cybersecurity is now a digital transformation imperative
Cyber trends for 2022
Cybersecurity for the board of directors
Getting the basics right
Partnering to make South Africa more cyber secure
Providing real-time visibility
The worst of times
From the Editor's Desk
From the editor's desk: In the cyber trenches
Access Control & Identity Management
Dealing with the new world of cyber risk
How hybrid work is pushing to end passwords
Potting your access control
The PSIA’s Secure Credential Interoperability initiative
CCTV, Surveillance & Remote Monitoring
Premium forensic video analytics
Cyber Security
A back to basics layered approach
A ransomware crisis plan is now a business imperative
Cloud can cut your security risks
Cloud vulnerabilities: what CISOs need to consider
Combating fraud in the digital world with the support of AI
Cybercrime’s evolution and how we can fight back
Cybersecurity as the foundation for smart cities
Edge computing demands a more integrated security response
Enhancing the security of your applications
How to stop security threats early
How to survive the cybercrime pandemic
Humans in crowdsourcing-powered cybersecurity
Managed cybersecurity for every business
Prevention is better than cure
Ransomware doesn’t take holidays
SASE, the key network security component
Saving MSPs’ time and money
Security monitoring of user behaviour
SecurityHQ to enhance crucial security operations in southern Africa
Services to get things done
The challenge of change
The malicious insider: Behind the security front door
Three common schemes of business email compromise
Using CDR to combat emerging threats
Entertainment and Hospitality
How to plan a cybersecurity attack response
Industrial
SA’s industrial challenge
Perimeter Security, Alarms & Intruder Detection
PIDS supports motion detection
Security Services & Risk Management
BT launches new security platform
Training & Education
IT security professionals ‘secure society’
Published by Technews
»
Dataweek Electronics & Communications Technology
»
Electronics Buyers' Guide (EBG)
»
SMART Security Solutions
»
SMART Security Business Directory
»
Motion Control in Southern Africa
»
Motion Control Buyers' Guide (MCBG)
»
South African Instrumentation & Control
»
South African Instrumentation & Control Buyers' Guide (IBG)
©
Technews Publishing (Pty) Ltd.
| All Rights Reserved.