Skip to content Skip to footer
DCR Logo White 2024

Day: January 9, 2020

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

How to design security for biometric threats

How to design security for biometric threats

The FBI launched a Cyber Most Wanted list in 2014, which featured 42 people and groups in 2018, when Park Jin Hyok topped the list. His achievements included hacking into banks, attempting to steal one billion dollars and attacking Sony Pictures Entertainment.

AI and edge computing are making CCTV more effective than ever

Thanks to developments such as artificial intelligence and edge computing, CCTV has become an even more effective tool at keeping both property and people safe. Michael Thorpe, product manager at Stanley Security UK, looks at just how these technologies and more are

Stay In The Know

Get the Data Centre Review Newsletter direct to your inbox.