Articles by Christopher Camejo
Vulnerability scans rely on mostly automated tools to find potential vulnerabilities at either the network or application level Security vulnerability in any network can be found and exploited by hackers and others in no time. The only questions are when this will happen and how much damage an individual could do once they’ve gained access to the network. Recognising this reality, most organisations test their own networks for security weaknesses, whether to meet compli...
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defence and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing the I...
You may also be interested in
5 ways RFID readers can secure your workplaceDownload
Simplified security for utilities & critical infrastructureDownload
Best practices for migrating to an IP-based access control systemDownload
Webcast: Save time and money with Wireless Access ControlDownload
- How smart technology is simplifying safety and security in retirement villages
- The post-pandemic mandate for entertainment venues: Digitally transform security guards
- Key-centric access management system: providing the highest possible levels of security
- Hybrid working presents remote and physical security challenges