Mar 10, 2017
The complexities and continuous evolvement of IT security threats have made managing them a specialist field. With cloud services, third party applications and mobile devices proliferating the workplace, nobody without the necessary experience, technical skills or...
Mar 9, 2017
The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...
Mar 8, 2017
Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But, while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger...
Mar 7, 2017
Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras and traditional visual cameras for surveillance purposes, writes Laurence Smith, executive at Graphic Image Technologies. Visual cameras use light to...
Feb 24, 2017
Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to infiltrate a network and target specific information are a reality, and are only going to become more pervasive. In today’s world of the...
Feb 23, 2017
The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...