Articles Search Results

379 Articles and 0 related Products found for breach
  • What to know about video surveillance under GDPR
    On May 25 the General Data Protection Regulation or GDPR officially took effect, requiring better protection of personal data across the EU ...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 27
  • Genetec looks ahead to 2019
    a&s speaks to Daniel Lee, MD for the Asia Pacific region at Genetec, about the company's achievements over the past year as well as security...
    Editor / Provider: the a&s Editorial team | Updated: 2018 / 12 / 26
  • How does the end user see cybersecurity threats?
    With an increasing number of malware attacks, hacking attempts and distributed denial of services among others, end users are forced to rema...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 4
  • 4 signs your network may not be cybersecure
    Experts in the field often provide standard procedures that could minimize the risk of third-party interference, but the truth remains that ...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 11 / 27
  • Is radar a better choice for perimeter protection?
    Due to it's long detection range and ability to operate in bad weather and harsh environments, adding radar to a perimeter security solution...
    Editor / Provider: Eifeh Strom, Freelancer | Updated: 2018 / 11 / 23
  • Seeing beyond the perimeter with radar technology
    Radar and lidar technologies are not only advancing, but also growing in application. While lidar is more known for its use in the advanced ...
    Editor / Provider: Eifeh Strom, Freelancer | Updated: 2018 / 11 / 20