Opinion



By Michelle Arney, Head of Product, Cybera (https://www.cybera.com) Retailers have faced an uphill battle as they have worked to achieve and maintain compliance with the PCI DSS (i.e., Payment Card Industry Data Security Standard) – more commonly referred to as simply, PCI compliance.  PCI compliance applies to any organization that […]

How to Go Beyond Checklist PCI Compliance


Cloud-based applications are becoming commonplace and bring with them a host of benefits for both user and developer.  Cloud applications can be updated, tested, and deployed quickly, providing enterprises with the agility needed to compete in today’s business environment.  Cloud-based applications don’t come without additional risk, however.  For a cloud-based […]

Runtime Encryption – What You Need To Know



Guest Contribution By Secure-IC The Internet of Things offers unprecedented opportunities to customize and even share digital services in everybody’s life. Your private car can be lent or rented through a mobile app, your favorite music/series can be enjoyed on multiple devices whilst fully respecting owners rights. Such fluidity in […]

Internet of Things Offers Unprecedented Opportunities to Customize Digital Services


Guest Contribution By: Apache Security, South Africa There are various sectors and industries which should aim to make surveillance system installation and monitoring a part of their security solutions. Surveillance security, through the use of CCTV equipment, can provide many benefits. So, who should make use of surveillance security? Domestic […]

CCTV Monitoring: Who Should Make Use of Surveillance Security?






By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities



What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?


By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions