Articles Search Results

412 Articles and 0 related Products found for breach
  • Why mobile credentials will see momentum down the road
    While mobile credentials have gained more attention in the industry, actual adoption hasn't been that great across verticals due to various ...
    Editor / Provider: William Pao, a&s International | Updated: 2019 / 1 / 8
  • What to know about video surveillance under GDPR
    On May 25 the General Data Protection Regulation or GDPR officially took effect, requiring better protection of personal data across the EU ...
    Editor / Provider: William Pao, a&s International | Updated: 2018 / 12 / 27
  • Genetec looks ahead to 2019
    a&s speaks to Daniel Lee, MD for the Asia Pacific region at Genetec, about the company's achievements over the past year as well as security...
    Editor / Provider: the a&s Editorial team | Updated: 2018 / 12 / 26
  • How does the end user see cybersecurity threats?
    With an increasing number of malware attacks, hacking attempts and distributed denial of services among others, end users are forced to rema...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 12 / 4
  • 4 signs your network may not be cybersecure
    Experts in the field often provide standard procedures that could minimize the risk of third-party interference, but the truth remains that ...
    Editor / Provider: Prasanth Aby Thomas, Freelancer | Updated: 2018 / 11 / 27