Revealed: The IFSEC Global security & fire influencers 2018
After consultation with a panel of highly respected judges, we’re delighted to reveal the IFSEC Global security & fire influencers 2018. The roll call of influencers across the security and fire...
View ArticleThe IFSEC Converged Security Centre: where physical and cyber security people...
Unified Security Ltd is very excited to be working with UBM, Vidsys, Micro Focus and Unisys in the Converged Security Centre at IFSEC this year. But what will you see? Certainly, a lot of converged...
View ArticleWhy cyber security is from Mars and physical security is from Venus
Security convergence is vital to help reduce critical infrastructure vulnerability to attacks, delegates at IFSEC 2018 have been told. Watch IFSEC TV live stream video Jasvir Gill, founder and chief...
View ArticleA passwordless world? How new authentication standards work
Two brand new standards for passwordless authentication called WebAuthn and CTAP have been recently introduced. They seek to streamline and enhance the security of login routine for websites, mobile...
View ArticleExclusive download: The video surveillance report 2018
The video surveillance report 2018 The fourth annual edition of The Video surveillance report sets out, like previous editions, to gauge industry perceptions and experiences of the latest innovations...
View ArticleWATCH: Ex-Homeland Security chief Michael Chertoff on “multiplying” national...
Michael Chertoff, Secretary of Homeland Security under the administration of President George W Bush, discussed national security threats during his keynote at IFSEC 2018. IFSEC TV managed to catch up...
View ArticleHow mesh networks can isolate cyber breaches in smart cities and critical...
The Internet of Things (IoT) promises to revolutionise the way that society works. These vast networks of small, low-powered sensors and controllers are breathing new life into our utilities and cities...
View ArticleUnderstanding RFID skimming: an infographic
If you’re wondering what RFID skimming is and how to prevent it then RFID wallet retailers Bricraft have designed this infographic to outline the problem and suggest some solutions. The Daily Mail...
View ArticleMobile app essentials: How to bolster security on your mobile devices
In the age of smartphones and mobile devices, a lot of personal data, including sensitive information, is being exchanged through mobile apps. According to research, 90% of apps examined demonstrated a...
View ArticleCyber crime could change the face of policing by 2022, says senior officer
The rise in cyber crime could result in a change to the fundamental fabric of the police force as early as 2022, according to a senior officer. Policing may need to consider a re-balancing away from...
View ArticleWhat the NHS could learn from 2017’s WannaCry attack
In May 2017, the UK and the rest of the world witnessed arguably one of the most devastating cyber-attacks ever known to have taken place. WannaCry was estimated to have affected more than 200,000...
View ArticleExclusive download: The smart door locks report 2018
Exclusive download: The smart door locks report 2018 Drivers and barriers to adoption in a market primed for growth This report examines the drivers – like granting remote access to family or Airbnb...
View ArticleThe IFSEC Converged Security Centre: where physical and cyber security people...
Unified Security Ltd is very excited to be working with UBM, Vidsys, Micro Focus and Unisys in the Converged Security Centre at IFSEC this year. But what will you see? Certainly, a lot of converged...
View ArticleUnderstanding the differences between IT security and cybersecurity
Is there a difference between IT security and cybersecurity? Many people assume they are just alternating terms for the having a form of security on electronic devices. Others believe that they cannot...
View ArticleHow penetration testing can instill confidence in remote storage
Cloud computing is everywhere nowadays – and with good reason because it does make it easier for companies to run their operations. It saves money and saves actual floor space and can even reduce the...
View ArticleWATCH: Rugged smartphones from CONKER –“ruggedness doesn’t need to mean a...
In this video Johnny Walker, digital marketing manager at CONKER – which is “on a mission to save business from bad tech” – speaks to IFSEC TV about the company’s rugged smartphones. CONKER was...
View ArticlePanasonic, Paxton and Inner Range among winners of Benchmark Magazine...
Benchmark Magazine has announced the winners of its Innovation Awards 2018. The publication rigorously tests hardware and software under a range of conditions to see how it matches up to the...
View ArticleHow to protect your privacy from Google Voice Search
Google voice search makes finding what you need even easier. Just say “OK Google,” tell your phone or tablet what you want to find, and you’ll get results. Or use the microphone icon in your browser....
View ArticleWATCH: The top 20 influencers in cybersecurity 2018
Find out the top 20 influencers in cybersecurity, part of IFSEC Global’s security & fire influencers 2018, in the video below. First, we invited nominations from the IFSEC Global audience and...
View ArticleHanwha Techwin launches Wisenet X and Wisenet T cameras for extreme environments
Hanwha Techwin has introduced four stainless-steel dome cameras to its Wisenet X camera series and added a 2MP Wisenet TNU-6320 network positioning camera to its WiseNet T range. The Wisenet X series...
View Article