SMART Security Solutions Magazine


Featured articles


Fire safety in mining
Clinton Hodgson, Head of the Industrial Fire & Life Safety Division at FS Systems International, provides SMART Security Solutions with his insights into fire safety risks and solutions as they pertain to the mining industry.

Read more...

Cyberthreats facing SMBs
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...

What are MFA fatigue attacks, and how can they be prevented?
Multifactor authentication is a security measure that requires users to provide a second form of verification before they can log into a corporate network. It has long been considered essential for keeping fraudsters out. However, cybercriminals have been discovering clever ways to bypass it.

Read more...



Cybersecurity and AI
AI & Data Analytics, Information Security

Cybersecurity is one of the primary reasons that detecting the commonalities and threats of what is otherwise completely unknown is possible with tools such as SIEM and endpoint protection platforms.
read more


Powering business resilience and field operations
Infrastructure, Products & Solutions

[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.
read more


Introducing the SecuShot Bullseye Robotic Guard MK2
Secutel Technologies, News & Events, Surveillance

The SecuShot Bullseye Robotic Guard MK2 is a marvel of modern engineering. It integrates CCTV monitoring, remote-controlled PTZ capabilities, and a gas-powered marker into a single, compact unit.
read more


Ransomware impersonates employees and self-spreads
News & Events

Following a recent incident, the Kaspersky Global Emergency Response team is shedding light on an attack where adversaries crafted their own variant of encryption malware equipped with self-propagation capabilities.
read more


Top bets for backup and business continuity
Infrastructure

Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.
read more


Cyber resilience – protect, defend, recover
Infrastructure

The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.
read more


Visualise and mitigate cyber risks
Security Services & Risk Management

SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.
read more


Are we our own worst enemy?
Editor's Choice

Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.
read more


SA's cybersecurity risks to watch
Information Security

The persistent myth is that cybercrime only targets the biggest companies and economies, but cybercriminals are not bound by geography, and rapidly digitising economies lure them in large numbers.
read more


Protecting IP and secret data in the age of AI
Editor's Choice

The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.
read more


Gallagher Security’s Integrate Roadshow
Gallagher, News & Events

Gallagher Security recently teamed up with nine technology partners to showcase the latest integrated security capabilities at the Integrate Roadshow in Durban, bringing together about 60 attendees, including end users, channel partners, consultants, and other industry professionals.
read more


Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management

A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.
read more


Super election year increases risks of political violence
Editor's Choice

Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.
read more


AI-enabled tools reducing time to value and enhancing application security
Editor's Choice

Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.
read more


2024 State of Security Report
Editor's Choice

Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.
read more


How to spot a cyberattack if you are not a security pro
Editor's Choice

Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.
read more


A long career in mining security
Technews Publishing, Editor's Choice, Security Services & Risk Management, Mining (Industry)

Nash Lutchman recently retired from a security and law enforcement career, initially as a police officer, and for the past 16 years as a leader of risk and security operations in the mining industry.
read more


Five efficiency strategies for your security installation business
Securex South Africa , News & Events

A recent conversation with one Securex South Africa 2024 exhibitor, led to the event organisers being able to share some advice on helping security installers make their businesses more efficient.
read more


Cyber insurance a key component in cyber defence strategies
Information Security

[Sponsored] Cyber insurance has become a key part of South African organisations’ risk reduction strategies, driven by the need for additional financial protection and contingency plans in the event of a cyber incident.
read more


5G network slicing
Mining (Industry)

This white paper from IDEMIA discusses network slicing in 5G networks and how this enables private networks to virtualise their network to optimally handle different networking demands, from critical communications to IoT.
read more


Level of RDP abuse unprecedented
Sophos, News & Events

Cybercriminals abused Remote Desktop Protocol (RDP) in 90% of attacks handled by Sophos Incident Response in 2023, Sophos’ newest Active Adversary Report finds. External remote services were the number-one way attackers’ initially breached networks.
read more


Real-time physical threat detection solution
Mining (Industry)

Scylla is an AI-based security solution based on unique, proprietary artificial intelligence and machine learning that helps mines proactively manage security.
read more


Key concepts in lithium-ion batteries
Mining (Industry)

SafeQuip, a distributor of fire-related equipment, sheds light on common terms associated with lithium-ion batteries to ensure safety and prevent unnecessary fire emergencies.
read more


Key and asset management for mining
Traka Africa, Mining (Industry)

Traka specialises in intelligent management solutions for keys and equipment, helping organisations control their important assets, improving productivity and accountability, and reducing risk in critical processes.
read more


Container conversions for access control
BoomGate Systems, Mining (Industry)

The container conversions available from Boomgate Systems offers instant onsite secure access control points for industries and applications such as mines and remote locations where construction projects might be underway.
read more


The future of access control is mobile
HID Global, Mining (Industry)

The growing popularity of trusted ecosystems of cloud-connected access control devices, applications and trusted mobile identities has made mobile access easier to adopt than ever.
read more


Enhancing overall access control
Turnstar Systems, Mining (Industry)

Turnstar’s Titan turnstile offers high security physical access control, which can be integrated with advanced technologies to prevent unauthorised entry to mining facilities.
read more


Sales basics for security installers
News & Events

Being the best security business in South Africa means little if no one uses your services. Your business success is only partly linked to how good you are at security installations.
read more


Eight MP dome for harsh environments
Axis Communications SA, Surveillance, Products & Solutions

Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.
read more


AI-driven identity verification for access control
C3 Shared Services, Editor's Choice

Facial authentication solutions combine advanced AI and 3D sensing technologies with ease of use to create a frictionless, touchless experience. The deployment of this technology in an access control system keeps users and administration moving.
read more


Tips and tools for trade businesses
News & Events, Training & Education

ServCraft brings together trade industry associations and corporations to launch blox, a digital content platform and community impacting lives, businesses and industries across hundreds of thousands of trade business SMEs.
read more


Research labs secured with STid Mobile ID
Access Control & Identity Management

When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.
read more


Cloud-based access for finance
Secutel Technologies, Access Control & Identity Management

Experience a new level of secure access control with NOKEY, tailored for banking environments, ATM cubicles, and safeguarded spaces. The cloud-based system offers effortless administration, control, and access management.
read more


PSiRA Introduces the printing of certificates as an interim measure
PSiRA (Private Security Ind. Regulatory Authority), News & Events, Security Services & Risk Management, Associations

[Sponsored Content] The introduction of digital certificates was welcomed by the security industry; however, it also led to the exploitation of unsuspecting clients by third parties who print certificates at exorbitant fees.
read more


Different fences for different farmers
Gallagher, Perimeter Security, Alarms & Intruder Detection, Agriculture (Industry)

Far beyond the simple delineation of boundaries, fencing serves as a dynamic solution to address various needs, from ensuring the security of farms and protecting livestock to defining property lines and enhancing aesthetic appeal.
read more