Join or Sign in
Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.
To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.com
Member Registration
ADVERTISE
SUBSCRIBE
LOGIN
NEWS
NEWS
a&s exclusive
Industry News
Supplier's News
Smart Building & Home
Industrial IoT
Smart & Safe City
Asia News
Video Library
Report Download
Special Feature
Global Events
Readers’ Choice
VERTICAL SOLUTIONS
Retail / Restaurants
Transportation
Banking / Finance
Oil & Gas/Utility
Police / Military
Education
Office / Corporate
Smart Home
Healthcare
Industrial / Manufacturing
Gaming
Hospitality
Correctional Facilities / Public Services
Stadiums / Event Venues
Buildings
Service Industry
PRODUCTS
PRODUCTS
IP Camera
CCTV
Key Components
Access Control
Intrusion Detection
Intercoms
Transmission
Management Platform
Building Automation
Home Automation
Security Services
Personal Safety
Police Equipment
Fire & Safety
Solution
SUPPLIERS
SECURITY 50
NEW
CALCULATE
INSIGHTS
Search by
Product
Supplier
Article
You are at :
Home
>
Search Results
Articles Search Results
395
Articles and
0
related Products found for
breach
Keeping data physically safe: An interview with Mike Margrain, Technical Director APAC and IMEA, Gallagher Security
In this exclusive interview, Mike Margrain, Technical Director Asia Pacific and India, Middle East and Africa at Gallagher, shares his visio...
Editor / Provider:
Editorial Dept. |
Updated:
2025 / 6 / 16
How AI-powered surveillance is elevating security standards in schools and universities
Security in US educational institutions of all types remains a pressing issue for educators, governors, students and politicians, but AI too...
Editor / Provider:
Avigilon |
Updated:
2025 / 6 / 13
Ransomware through the lens: lessons for systems integrators from an IP camera breach
Every connected security device, including CCTV, is part of the broader IT threat surface....
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 5 / 27
Securing borders in the digital age: a multi-layered approach to perimeter protection
Modern border security strategy can be visualized as a system of concentric defense zones, each layered with specific technologies designed ...
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 5 / 21
Check Point software leverages AI-driven cybersecurity to address threat trends in a hyperconnected world
Check Point Software Technologies yesterday released its 2025 Cyber Security Report, its first-ever AI Security Report and key findings from...
Editor / Provider:
Check Point Software Technologies |
Updated:
2025 / 5 / 14
Adapting your security strategy for IoT-at-scale
Many IoT devices don't play by the same rules as servers and workstations and vulnerabilities cannot be addressed by the same regular firewa...
Editor / Provider:
Asimily |
Updated:
2025 / 5 / 12
Intercede teams up with Microsoft and Yubico to enhance enterprise security with stronger authentication
Intercede, a pioneering digital identity management company, today announced the launch of its latest version of MyID CMS that enables the m...
Editor / Provider:
Intercede |
Updated:
2025 / 5 / 2
In K-12 security, cyber-defense matters, too
This article looks at measures K-12 schools can take to maintain good cybersecurity, based on a report by the Center for Internet Security (...
Editor / Provider:
William Pao |
Updated:
2025 / 4 / 2
Integrating security systems for comprehensive EV charging infrastructure protection
As electric vehicle (EV) adoption accelerates, the security of EV charging infrastructure has become paramount....
Editor / Provider:
Prasanth Aby Thomas, Consultant Editor |
Updated:
2025 / 3 / 6
Check Point experts discuss IoT security threats and ways to prepare for them
Eyal Manor and Oded Vanunu of Check Point speak to asmag.com about how manufacturers and users can implement security principles in their Io...
Editor / Provider:
Israel Gogol |
Updated:
2025 / 2 / 24
《 First
< Prev
2
3
4
5
6
7
8
9
10
11
Next >
Last 》
Supplier Updates
Matrix Comsec Honoured with CII Design Excellence Award 2025 for Deep-Tech Innovation
2025/11/28
https://vedard.com/blog/infrared-and-ultraviolet-flame-detectors-installation/
2025/11/27
New CoaXPress-over-Fiber frame grabber: Coaxlink QSFP28
2025/11/26
U.S. Patent Granted for Distributed Biometric Encryption Technology
2025/11/19