Beneath the buzzwords: AI, video analytics, edge computing and more

    This post is written by Albert Unterberger, owner at Unterberger Consult with extensive experience in the security industry. Read more about Albert at the bottom of this page. As the dictionary definition puts it, a buzzword is: “A word or expression from a particular subject area that has become fashionable by being used a lot.” […]

      NIS – do your security systems comply with the latest directive?

      Hands up if you’re aware of the Network and Information (NIS) Directive and what it means for your business. Unsure of the details? You’re not alone. The NIS Directive is the first piece of EU-wide legislation designed to boost the overall level of cybersecurity across member states and was launched just a few weeks before […]

        Joining forces to mitigate smart city cybersecurity threats

        Cities are becoming smarter as we speak. With an ambition to achieve livability, cities deploy new, innovative technologies to enable them to manage their assets and resources more efficiently. But the technology cornerstones of smart cities – connectivity, big data and IoT devices – not only offer possibilities to develop more livable cities, they also […]

          Implementing IoT Technology within a Real-Estate platform model

            The rise of the Internet of Things (IoT) has propelled us into a new information age in which data is now king. Businesses are beginning to collect, store and utilise data generated from smart, network connected devices in increasingly intelligent ways, which has created new opportunities also within the real-estate industry. The most effective […]

            Detailing security provisions within a performance specification

            The demand for connected IoT devices is increasing. Buoyed by the productivity, security and efficiency benefits, firms worldwide have been flocking to install the latest IP technologies on their IT networks. However, this has often been done with little thought to the security ramifications. That is perhaps why new vulnerabilities are being reported all too […]