|
The real consequences of a DDoS attack |
|
|
Anti-virus and anti-malware software
: 30 January, 2015 |
Kaspersky Lab explains how a DDoS attack can have serious financial and operational consequences on the target organisation |
|
|
|
|
 |
|
|
Biometric e-border management in the UAE |
|
|
Fingerprint recognition
: 30 January, 2015 |
Multi-biometric border control including e-gates from Morpho will be introduced into five airports across the United Arab Emirates |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Surveillance assists Russian postal efficiency |
|
|
IP and Megapixel cameras
: 29 January, 2015 |
Postal centre handling mail delivered through Moscow airports installs video surveillance equipment from Samsung Techwin to improve safety, security and efficiency of operations |
|
|
|
|
 |
|
|
|
|
|
|
High security locks meet loss prevention standard |
|
|
Locks, shotbolts, solenoids and actuators
: 29 January, 2015 |
Surface mounted multipoint high security locking systems from Pickersgill-Kaye have been awarded with approvals to the LPS 1175 loss prevention standard |
|
|
|
|
 |
|
|
Managed certification for M2M devices |
|
|
Secure Communications
: 29 January, 2015 |
Verizon is entering the Internet-of-Things with its managed certification services for the verification of machine identities |
|
|
|
|
 |
|
|
|
|
IoT risk management guidelines |
|
|
Secure Communications
: 29 January, 2015 |
ISACA issues a set of guidelines on how to manage risk associated with connected devices in the Internet of Things |
|
|
|
|
 |
|
|
|
|
SMS access control system protects US food plant |
|
|
Networked Access Control
: 28 January, 2015 |
A food manufacturing facility in the USA is protecting zone access and achieving food safety regulation compliance with the help of access control technology from Vanderbilt |
|
|
|
|
 |
|
|
DDoS Security as a Service implementation |
|
|
Data Protection
: 28 January, 2015 |
Joe Eskew of NSFOCUS explains the three steps required for implementing DDoS Security as a Service technology for protection against attacks |
|
|
|
|
 |
|
|
|
|
|
|
|
|
|
|
Research into social media use in education |
|
|
Internet Security and Content Filtering
: 28 January, 2015 |
Bloxx study shows high levels of cyber-bullying, inappropriate behaviour and productivity problems associated with the use of social media in educational environments |
|
|
|
|
 |
|
|
|
|
|