Home
About us
Back issues / E-book / PDF
Subscribe
Advertise
Handbooks ▼
Access & Identity Management
CCTV.
Residential Security
Handbooks
▸ Access & Identity Management
▸ CCTV.
▸ Residential Estate Security
Categories
▸ Editor's Choice
▸ Tech Jobs Network
▸ Career opportunities
▸ Advertise for staff
▸ News & Events
▸ Access Control & Identity Management
▸ AI & Data Analytics
▸ Asset Management
▸ Associations
▸ Conferences & Events
▸ Facilities & Building Management
▸ Fire & Safety
▸ Information Security
▸ Infrastructure
▸ Integrated Solutions
▸ IoT & Automation
▸ Perimeter Security, Alarms & Intruder Detection
▸ Power Management
▸ Products & Solutions
▸ Security Services & Risk Management
▸ Smart Home Automation
▸ Surveillance
▸ Training & Education
▸ Videos
▸ Security by Industry Sector
▸ Agriculture
▸ Commercial
▸ Education
▸ Entertainment and Hospitality
▸ Financial
▸ Government and Parastatal
▸ Healthcare
▸ Industrial
▸ Logistics
▸ Mining
▸ Residential Estate
▸ Retail
▸ Transport
×
Categories
Editor's Choice
Tech Jobs Network
▸
Career opportunities
▸
Advertise for staff
News & Events
Access Control & Identity Management
AI & Data Analytics
Asset Management
Associations
Conferences & Events
Facilities & Building Management
Fire & Safety
Information Security
Infrastructure
Integrated Solutions
IoT & Automation
Perimeter Security, Alarms & Intruder Detection
Power Management
Products & Solutions
Security Services & Risk Management
Smart Home Automation
Surveillance
Training & Education
Videos
Security by Industry Sector ▾
▸
Agriculture
▸
Commercial
▸
Education
▸
Entertainment and Hospitality
▸
Financial
▸
Government and Parastatal
▸
Healthcare
▸
Industrial
▸
Logistics
▸
Mining
▸
Residential Estate
▸
Retail
▸
Transport
Find companies, products and services (SSBD)
AVeS Cyber Security
Tel:
+27 11 475 2407
Email:
info@aves.co.za
www:
www.aves.co.za
more information about AVeS Cyber Security
Securing edge devices and the data they contain
October 2018, Editor's Choice, Information Security, Infrastructure
Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.
Read more...
Cyber-securing physical security
March 2018, Editor's Choice, Information Security
You can’t kick a rock these days without hearing about cybersecurity and the Internet of Things (IoT). At the same time, you should not be talking, reading or hearing about one of these without the other.
Read more...
<< First
< Previous
Page 2 of 2
Published by Technews
»
Dataweek Electronics & Communications Technology
»
Electronics Buyers' Guide (EBG)
»
SMART Security Solutions
»
SMART Security Business Directory
»
Motion Control in Southern Africa
»
Motion Control Buyers' Guide (MCBG)
»
South African Instrumentation & Control
»
South African Instrumentation & Control Buyers' Guide (IBG)
©
Technews Publishing (Pty) Ltd.
| All Rights Reserved.