Articles Search Results

379 Articles and 0 related Products found for breach
  • How to keep video systems from being hacked?
    More and more, video surveillance systems are based on IP whereby video feeds are transmitted over the network. While this has introduced co...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 5 / 31
  • How the healthcare service is getting smarter
    Patients are creating a trove of data that could contribute to their healthcare provider's overall assessment. However, packaging all that d...
    Editor / Provider: John Liu | Updated: 2019 / 5 / 28
  • How to choose the right biometric modality
    Despite its increasing popularity, there is still some confusion among customers on what factors to consider when selecting a biometric acce...
    Editor / Provider: Prasanth Aby Thomas, Consulting Editor | Updated: 2019 / 4 / 23
  • Can phones challenge the resilient plastic card?
    Mobile access control will increasingly keep pace with modern mobile working, says Thomas Schulz, Director Marketing and Communications, Dig...
    Editor / Provider: ASSA ABLOY | Updated: 2019 / 3 / 19
  • Why mobile credentials will see momentum down the road
    While mobile credentials have gained more attention in the industry, actual adoption hasn't been that great across verticals due to various ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 1 / 8