CCTV in the News

Cisco releases first Smart Region Report focused on digital opportunities for South East Queensland
Identifies the potential of $10 billion to the region’s economy and more than 30,000 jobs…

Seven ways security can cost your business
Most organisations have a pretty good sense of the potential fallout from security breaches. However,…

nbn satellite launch to revolutionise broadband for regional and remote Australia
The Australian Government has announced the launch date for the first of two new nbn satellites…

Rockwell Collins Delivers First Gen III F-35 Helmet Mounted Display System
Technology is integral to the function of the F-35 Lightning II jet fighter, providing unprecedented…

Zaplox Mobile Key Services integrated with SALTO Hospitality access control solution
Global provider of advanced access control systems integrated to Zaplox’ streamlined cloud-based Mobile Key Services…

Connected insights to drive the world’s first Internet of Things-enhanced event
Canalys has announced that the world’s first Internet of Things-enhanced event will be integrating state-of-the-art IT…

Asterisk appoints Samantha Moody to National Business Development Manager
Asterisk Information Security has announced Samantha Moody has been appointed National Business Development Manager. In…
First international tanker refuels F-35 Lightning II
An Aeronautica Militare (Italian Air Force) KC-767A aerial refueling tanker successfully completed its first U.S.…

The dawn of ransomwear: How ransomware could move to wearable devices
Symantec has released new research that reveals ransomware attackers could also have wearables and other…

Check Point Discovers Massive Vulnerability in Android Devices
Check Point Software Technologies Ltd., has announced that its mobile security research team discovered a…

Department of Homeland Security issues terror alert after three drones are spotted in three days above JFK
Three drones were spotted flying too close to airplanes landing at New York City’s John…

LogRhythm Extends Holistic Threat Analytics Suite with Endpoint Behavioural Anomaly Detection
Provides Visibility Into Endpoints and User Accounts Compromised by Advanced Threat Actors – Enabling Faster…

HP Advances Network Security with Comprehensive Threat Protection System
Actionable threat intelligence, enhanced visibility and analytics help enterprises protect against cyberattacks HP has introduced a…

AUSTRALIAN RESEARCH: Attitudes towards breaches and data theft highlight role of law and penalties
IT security professionals weigh in on ideal punishment for serious data breaches Websense, Inc. a…