Articles Search Results

379 Articles and 0 related Products found for breach
  • The key to supply chain data security
    Pip Courcoux, Sales and Product Manager - CLIQ Systems at Abloy UK, discusses the current issues around cyber security and explains why orga...
    Editor / Provider: Pip Courcoux, Sales and Product Manager - CLIQ Systems, Abloy UK | Updated: 2017 / 9 / 11
  • IoT security: What vendors, users should do
    Today, IoT security has become a hot topic. While more and more connected devices are online under the IoT framework, bringing automation an...
    Editor / Provider: William Pao, a&s International | Updated: 2017 / 8 / 16
  • Bosch video analytics for security and beyond
    Despite the huge amount of video data collected, statistics show that only 10 percent of data is ever used and most loses its value within s...
    Editor / Provider: Bosch Security Systems | Updated: 2017 / 8 / 7
  • Some best practices for cybersecurity in IoT
    With cybersecurity for networked devices becoming more important than ever, the Online Trust Alliance (OTA) published its latest version of ...
    Editor / Provider: William Pao, a&s International | Updated: 2017 / 7 / 25
  • Meeting the access control challenge in hospitals
    Securing a hospital round the clock is a tough job. But a rapidly maturing technology is perfectly built for the task, according to Thomas S...
    Editor / Provider: ASSA ABLOY | Updated: 2017 / 7 / 25
  • Design guidelines for effective perimeter security
    Alongside the hype in the media about the border wall, this might be a good time for commercial and industrial companies to take a closer lo...
    Editor / Provider: Paul Shkedy, Business Development Security & Communications, W-Industries | Updated: 2017 / 7 / 21