Opinion


Cloud-based applications are becoming commonplace and bring with them a host of benefits for both user and developer.  Cloud applications can be updated, tested, and deployed quickly, providing enterprises with the agility needed to compete in today’s business environment.  Cloud-based applications don’t come without additional risk, however.  For a cloud-based […]

Runtime Encryption – What You Need To Know


Guest Contribution By Secure-IC The Internet of Things offers unprecedented opportunities to customize and even share digital services in everybody’s life. Your private car can be lent or rented through a mobile app, your favorite music/series can be enjoyed on multiple devices whilst fully respecting owners rights. Such fluidity in […]

Internet of Things Offers Unprecedented Opportunities to Customize Digital Services


Guest Contribution By: Apache Security, South Africa There are various sectors and industries which should aim to make surveillance system installation and monitoring a part of their security solutions. Surveillance security, through the use of CCTV equipment, can provide many benefits. So, who should make use of surveillance security? Domestic […]

CCTV Monitoring: Who Should Make Use of Surveillance Security?







By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities


What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?


By Tom Piston, Farpointe Data U.S. Eastern Regional Manager For the past several years, there’s been a focus by integrators and customers to assure that their card-based access control systems are secure. To give businesses an extra incentive to meet their cybersecurity threats, the United States Federal Trade Commission (FTC) […]

Eliminate the Word “Portals” from Mobile Access Control Discussions




By: Darrell Laffoon, CTO of EZShield + IdentityForce Chances are, you or someone you know has been impacted by identity theft and cybercrime — even if they don’t know it yet. The fallout from such a personal intrusion into your most confidential personal information can affect every aspect of your […]

Preventing Cybercrime and Identity Theft in 2019: How to Transform ...


Guest Contributor: Jeremy Moskowitz Last year, Merriam-Webster added the word, “Bitcoin” to its latest version of the authorized Scrabble dictionary game. As the most recognized form of cryptocurrency, bitcoin has become embedded in our vocabulary thanks to the barrage of media stories outlining it ascension to financial investment stardom in […]

Why Bitcoin and Other Cryptocurrencies Spell Trouble for Cybersecurity