Access Control

  • Are you prepared for managing multiple identities in the cloud? Morey Haber, chief security officer, BeyondTrust, looks at how to stay safe in the cloud. For many Middle Eastern enterprises, the cloud...

  • Jon Hill, Account Executive, Transport & Public Safety at Genetec looks at how we should be taking a proactive approach to safeguarding both cyber and physical security for transport. The transpor...

  • Home Surveillance solution company Ring has announced that their second generation of Indoor Camera will be coming to the UAE. The company have added a wide range of features that will allow the produ...

  • Cybersecurity comes as one interconnected package, stopping breaches, analysing malware and reinforcing servers and workflow along the way. However, physical security stands as a more modular design, ...

  • HID, the world’s leading provider of trusted identity solutions, recently announced it now offers companies the integration of employee badges into digital wallets, allowing for convenient, seam...

  • Carrie Peter, Managing Director, of Impression Signatures, looks at the challenges of scaling up the use of digital signatures and meeting security compliances. One of the key challenges in embracing ...

  • The Kingdom of Saudi Arabia looks toward the Saudi Vision 2030 as a means of weaning away from the Oil Economy that has long since defined the Kingdom, and instead repositioning it as a tourism haven....

  • With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity awareness is critical, says Carey van Vl...

  • When it comes to the future of artificial intelligence and its use in remote solar monitoring, there are three key things you must consider, according to Mr Bulent Boyaci, technical director at ICU So...

  • Forescout, a global leader in cybersecurity, today unveiled Risk and Exposure Management, its cloud-native product designed to collate all data sources associated with an enterprise’s connected assets...