Security
Sfera Labs strato pi CM brings automation to Masunt’s compartment key safe
Germany-based Masunt has deployed Sfera Labs technology to automate the hand-over of keys in its latest family of robust and secure compartment safes.
Access to maintenance keys can now be granted with a phone-controlled Bluetooth key deposit
With the new ABLOY Key Deposit for Keyless Access organisations can now grant users access to properties and critical infrastructure via their mobile phones, conveniently, without key logistics. The lock is the latest addition to the keyless ABLOY BEAT and ABLOY CUMULUS portfolios.
Threat intelligence market is estimated growth of 16.9% CAGR
The threat intelligence market is predicted to grow at a CAGR of 16.9% over the forecast period, according to FMI's analysis.
SailPoint acquires SecZetta for identity security for non-employee identities
SailPoint, a specialist in enterprise identity security, has announced it has acquired SecZetta, a provider of third-party identity risk solutions.
Intelligent traffic filtering in data centre networks
ipoque, a Rohde & Schwarz company, and APCON, US-based provider of network visibility and security services for data centres, announced their new partnership.
Three things to remember when building a data centre
The COVID pandemic has made a drastic impact on society, not only on our health but if we look at the industrial aspects, it has pushed the ‘digital’ revolution forward, from how we have business meetings to the way we learn to operate factories.
Isorg’s optical fingerprint sensor obtains FBI certification
Isorg, a pioneer in Organic PhotoDetectors (OPDs) and large area image sensors, has announces the FBI certification of Bio1Print30, a large-area optical fingerprint sensor for applications where enhanced mobile security and nomad ID authentication are key.
The need for OT-centric cyber security strategies
Cyber security is consistently hailed as a top global concern for governments, individuals, and businesses alike. However, most rhetoric on the subject focuses on securing information technology (IT), rather than operational technology (OT). In this article Reinhard Mayr, Head of information security and research operations at COPA-DATA, examines the need for a different approach.
Application security assessment: five key steps
With each year, the use of mobile applications is becoming more and more popular among users. Ensuring that sensitive data is stored securely is a top priority for any company. New vulnerabilities emerge every day, which is why it is so essential to conduct application security assessments on an ongoing basis. Conrad Sturdy, Writer, further explores.
Infineon at CES 2023: smart home, electromobility and IoT security
Infineon Technologies has announced that it will highlight the company’s contributions to mitigate climate change and enable digital transformation at CES 2023.