3 weeks ago

    Kenyan citizens unable to access ID cards after court ruling

    Kenya has been facing an alleged backlog of ID cards after the Nairobi High Court pulled the breaks on a…
    3 weeks ago

    Exclusive Networks Africa bolsters security portfolio with HCLSoftware agreement

    Johannesburg, 29 January 2024 – Exclusive Networks Africa has secured an agreement with HCLSoftware, the software business division of HCLTech, which will see the global trusted…
    3 weeks ago

    Gallagher Security’s commitment to data protection acknowledged with SOC2 Type 2 recertification

    Global security leader Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the…
    3 weeks ago

    DDoS attacks against Poland skyrocket in wake of new Prime Minister’s election

    Changes in political leadership can cause disruptions in many areas. One notable area is in the cyberspace, where DDoS attacks often spike…
    3 weeks ago

    Veridos provides the latest generation and first ever color picture of ePassport in Latvia

    Veridos, a leading global provider of identity solutions, has delivered state-of-the-art ePassports to Latvia in collaboration with the Portuguese state…
    January 14, 2024

    Adaptive Recognition Attends Intersec 2024 to Support Partner SSK and Showcase Latest Innovations

    Adaptive Recognition is thrilled to announce its participation in Intersec 2024, the leading global event for safety, security, and fire…
    January 14, 2024

    Get the most out of the 2N® Indoor Touch 2.0 indoor station

    Take advantage of the entire display It’s not that it hasn’t been used before – but rather that video calls…
    January 11, 2024

    Camera with Analytics or Fence Sensor: Which is Best for Your Perimeter Security?

    Introduction to Perimeter Security Choosing the right perimeter security technology, be it cameras with analytics or fence sensors, is pivotal…
    December 30, 2023

    What is Perimeter Security?

    Perimeter security or perimeter protection are security solutions that utilize physical and software technology systems to protect from unauthorized access…
    December 30, 2023

    IP vs. analog surveillance systems: Is there a right choice?

    In today’s age of video surveillance, many wonder which type of system is better-suited for their organization — internet protocol…

    Product Spotlight

      IT & Cyber Security

        Featured
        3 weeks ago

        Exclusive Networks Africa bolsters security portfolio with HCLSoftware agreement

        Johannesburg, 29 January 2024 – Exclusive Networks Africa has secured an agreement with HCLSoftware, the software business division of HCLTech, which will see the global trusted…
        Featured
        3 weeks ago

        DDoS attacks against Poland skyrocket in wake of new Prime Minister’s election

        Changes in political leadership can cause disruptions in many areas. One notable area is in the cyberspace, where DDoS attacks often spike…
        Access Control
        3 weeks ago

        Veridos provides the latest generation and first ever color picture of ePassport in Latvia

        Veridos, a leading global provider of identity solutions, has delivered state-of-the-art ePassports to Latvia in collaboration with the Portuguese state…
        Access Control
        January 17, 2024

        Experts discuss security risks of ChatGPT at Intersec 2024

        UAE’s National Strategy for AI 2031 aims at enhancing cybersecurity in AI deployment More than 34 cybersecurity companies are exhibiting…
        Back to top button