Articles Search Results

403 Articles and 0 related Products found for breach
  • Can phones challenge the resilient plastic card?
    Mobile access control will increasingly keep pace with modern mobile working, says Thomas Schulz, Director Marketing and Communications, Dig...
    Editor / Provider: ASSA ABLOY | Updated: 2019 / 3 / 19
  • Why mobile credentials will see momentum down the road
    While mobile credentials have gained more attention in the industry, actual adoption hasn't been that great across verticals due to various ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 1 / 8
  • What to know about video surveillance under GDPR
    On May 25 the General Data Protection Regulation or GDPR officially took effect, requiring better protection of personal data across the EU ...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 27
  • Genetec looks ahead to 2019
    a&s speaks to Daniel Lee, MD for the Asia Pacific region at Genetec, about the company's achievements over the past year as well as security...
    Editor / Provider: the a&s Editorial team | Updated: 2018 / 12 / 26
  • How does the end user see cybersecurity threats?
    With an increasing number of malware attacks, hacking attempts and distributed denial of services among others, end users are forced to rema...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 4