This website uses cookies. By continuing to browse this website without changing your web-browser cookie settings, you are agreeing to our use of cookies. Find out more by reading our cookie guideline.

Close X
  • Log in
  • Lost Password
  • Register
Future Lab – ASSA ABLOY – Studying security trends
Future Lab – ASSA ABLOY – Studying security trends
  • Home
  • Latest Articles
  • Categories
    • Access control
    • Biometrics
    • Door control
    • Identity
    • IT & Data security
    • Locking
    • Mobile access
    • Monitoring & Detection
  • Topics
    • Artificial Intelligence
    • Augmented Reality (AR)
    • Big Data
    • Cloud
    • Culture
    • Design
    • Industry & Ecosystems
    • In-home delivery
    • Internet of Things
    • Real-time locating systems (RTLS)
    • Safety
    • Smart homes
    • Sustainability
  • Segments
    • Education
    • Government
    • Healthcare
    • Hospitality
    • Industry & utilities
    • Enterprise
    • Public facilities
    • Residential
    • Retail
    • Transportation
  • Our way of working
  • Podcast
  • Members only
  • About Future Lab
Home > Categories > IT & Data security

IT & Data security

The latest trends in online identity control, encryption and how access control can protect data centers against cyber threats and hackers.

  • 2022
  • 2021
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • All years
  • English
  • German
  • French
  • Swedish
  • All
  • Identity
  • Access control
  • Biometrics
  • Door control
  • Locking
  • Mobile access
  • Monitoring & Detection
  • Other security
The symbiosis of digital and physical security
February 19, 2015 in Smart homes, IT & Data security

Simbiosis de seguridad digital y física

El reto que supone la seguridad hoy en día nos hace pensar en aquel viejo éxito de los Stargazers en 1955 que decía “Close the door – they’re …
Control4, IT security, Hackers, Data Centers
  • 0
  • 0
  • 0
Windows Holographic
February 9, 2015 in Augmented Reality (AR), IT & Data security, Mobile access

Protección de bienes: los datos personales

La adopción por parte de los consumidores de tecnología ponible plantea nuevos conflictos, uno de los cuales concierne a la privacidad. ¿Qué hacer …
Innovation, Tracking, Wearable technology
  • 0
  • 0
  • 0
August 31, 2011 in Government, IT & Data security, Industry & utilities

Aumenta la legislación sobre amenazas informáticas a servicios públicos                                              

Los sistemas operativos que controlan plantas, refinerías de todo tipo y el flujo eléctrico de las redes de suministro energético …
Electricity, IT security
  • 0
  • 0
  • 0
December 16, 2010 in Identity, Education, IT & Data security

El control de la identidad online

A medida que avanzan las tecnologías, se va haciendo cada vez más difícil establecer quién es quién, sobre todo en comunicaciones …
NFC, Identity, IT security, Hackers
  • 0
  • 0
  • 0
March 25, 2010 in IT & Data security

Perfecciona tu contraseña

Con demasiada frecuencia subestimamos el riesgo de utilizar contraseñas sencillas en Internet. Pero en nuestro afán de ahorrarnos la molestia …
IT security, Hackers
  • 0
  • 0
  • 0
March 25, 2010 in IT & Data security

Nociones básicas de encriptamiento

Si trabajas con datos privados de cualquier clase, te puede venir bien familiarizarte con el encriptamiento y los cada vez más numerosos requisitos …
IT security, Hackers
  • 0
  • 0
  • 0
December 15, 2009 in Government, IT & Data security, Enterprise

¿Dónde fueron a parar tus datos?

Un funcionario de un departamento de policía desconecta las cámaras de seguridad del almacén y roba las cintas de seguridad, poniendo …
Hackers, IT security
  • 0
  • 0
  • 0
October 15, 2009 in Government, IT & Data security

Protegiendo la privacidad de los demás

En este mundo “conectado” en el que vivimos, todas nuestras acciones – desde realizar una compra por Internet a escribir en un blog – …
IT security, Hackers
  • 0
  • 0
  • 0
June 15, 2009 in IT & Data security

¡Cuidado con el escalón (digital)!

Tal vez procuras ocultar el PIN de tu tarjeta cada vez que la introduces en un cajero. Tal vez cambias las contraseñas de tu ordenador con cierta …
Identity, Audit trails, IT security
  • 0
  • 0
  • 0
April 16, 2008 in Access control, IT & Data security

Evaluando el riesgo de hacking

Es una historia digna de grandes titulares: Un hacker pone al descubierto un grave fallo del protocolo en el cual se basan muchos de los sistemas de control …
Risk assessment, IT security, Hackers, HID Global, Wiegand
  • 0
  • 0
  • 0
December 11, 2007 in Access control, IT & Data security, Industry & Ecosystems

Alianzas frágiles, pero muy útiles

Hay tres formas de generar crecimiento en una empresa: el crecimiento orgánico, las fusiones y adquisiciones, y las alianzas. Pero cuidado: asociarse …
Securitas AB, IT security, Ecosystems, Interoperability
  • 0
  • 0
  • 0
December 11, 2007 in IT & Data security

Mundos separados en contacto

La combinación de seguridad y conocimientos de IT (Tecnologías de la Información) va a ser una de las claves para las soluciones de seguridad del futuro. …
IT security, Hackers
  • 0
  • 0
  • 0
November 2, 2007 in Access control, IT & Data security

Evitando filtraciones de información

Hubo una época en la que existían la banca de inversión, la banca comercial, los agentes de bolsa y otros proveedores de servicios financieros especializados, …
IT security, Hackers, Financial institutions
  • 0
  • 0
  • 0

Links

  • Future Lab on Twitter
  • ASSA ABLOY Group Website
  • ASSA ABLOY on Facebook
  • ASSA ABLOY on LinkedIn
  • ASSA ABLOY on Flickr
  • HID Global Blog

Get the Future Lab newsletter

Sign up and receive updates from the Future Lab.

Latest tweets

@ 01 Jan

Latest images

Phoniro home care smart lock Joakim Jardenberg Mechanical key management Cliq remote fire department Cliq remote system Matthias Weiß Aperio compability check One credential, many functions ASSA ABLOY product design ASSA ABLOY energy harvesting Abloy PULSE Daniel Skarp

View all images

Tags

Most read articles

  • Week
  • Month
  • All time
Posts not found!
Posts not found!
  • The thoughtful home
    Read 30472 times
  • Digital identities in your everyday life
    Read 27876 times
  • Making Artificial Intelligence real
    Read 26258 times
  • How ASSA ABLOY is bringing value through the IoT
    Read 24786 times
  • Helping emergency services respond quicker
    Read 22901 times

Latest commented articles

  • Thank you.
    Post: Report: Smart-Home Security in 2016
  • Epson printer is the most common printer errors such as epson wf-3640 error code 0x97 used to provide their service to the users. While using the printer you can face, some common problems. There are simple steps that need to follow such as clean your printer's clogged nozzles, reconnect your printer, check that your printer must be connected with your pc.
    Post: Reducing mobile security risks
  • Despite having the bio-metric system attended to by different locksmiths there were issues. I was recommended to try you guys. Your technician Jake did a fine job in evaluating the problem and finding a suitable solution. He was very patient in explaining the technical aspects and showed great expertise. It was a refreshing change from the type of customer service I experienced earlier.
    Post: The locksmith of tomorrow
  • Anthony, I apologize to you for my delay in responding. Please feel free to reach out to me at brian.schwab@s3sdc.com so we can discuss if you are still having issues. Regards, Brian
    Post: Augmented reality in physical security
  • There was an issue with the keyless entry system installed at my office and I called up your company.
    Post: Augmented reality in physical security

Most commented articles

  • Week
  • Month
  • All time
Posts not found!
Posts not found!
  • Bringing new products to life
    Commented 7 times
  • The locksmith of tomorrow
    Commented 3 times
  • Defining Big Data
    Commented 0 times
  • Wearables for security: potential or peril?
    Commented 2 times
  • Physical Security for Today’s Data Centers
    Commented 0 times

Categories

  • Identity
  • Access control
  • Biometrics
  • Door control
  • IT & Data security
  • Locking
  • Mobile access
  • Monitoring & Detection
  • Other security

Topics

  • Augmented Reality (AR)
  • In-home delivery
  • Artificial Intelligence
  • Cloud
  • Real-time locating systems (RTLS)
  • Big Data
  • Culture
  • Design
  • Smart homes
  • Industry & Ecosystems
  • Internet of Things
  • Safety
  • Sustainability

Segments

  • Education
  • Government
  • Healthcare
  • Hospitality
  • Industry & utilities
  • Enterprise
  • Public facilities
  • Residential
  • Retail
  • Transportation

Become a member of ASSA ABLOY Future Lab

About this site

Future Lab is an initiative from ASSA ABLOY aimed at observing and analyzing the trends and the future of the security arena. Sign-up and get access to all content.

Read more

Get in touch

  • Future Lab on Twitter
  • Future Lab on YouTube
  • futurelab@assaabloy.com

An initiative by

Experience a safer and more open world
©ASSA ABLOY 2023
  • Legal
  • Privacy notice
  • Cookies