SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - Expert commentary

Reactive to proactive - central command centres transform security capabilities for organisations
Reactive to proactive - central command centres transform security capabilities for organisations

Command centres allow physical and IT security to collaborate for greatersituational awareness and responsiveness Conventional command centres focus on video and access control system monitoring. When something happens at a door, the video system reports the event to one monitor in the command centre, while the access control system reports to another monitor. It is up to the operator to imagine the possibilities, draw the right conclusions, decide on a response and, if necess...

SourceSecurity.com’s 10 most click-worthy articles of 2015
SourceSecurity.com’s 10 most click-worthy articles of 2015

Many of the most well-trafficked articles posted at SourceSecurity.com in 2015 were those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 articles we posted in 2015 that generated the most page views. They are listed in order here with the author’s...

Open, software-based security system crucial for dealing with changing security demands
Open, software-based security system crucial for dealing with changing security demands

Many security solutions available today have the problem of being insufficiently open, offering very limited flexibility. Integrating third-party products is practically impossible. Customers therefore very often have to make a long-term bet on just one vendor. Upgrading or expanding security systems is often complex, expensive and time-consuming. But the industry is changing. Initiatives like open standards and cooperation between suppliers are emerging to help companies react faster to changin...

SourceSecurity.com 2015 Review and 2016 Forecast
SourceSecurity.com 2015 Review and 2016 Forecast

2015 has been an eventful year for the physical security industry. As 2016 looms, the pace of industry change shows no sign of decreasing.   Seeking insights into the state of the physical security market at year-end, SourceSecurity.com this month is publishing dozens of 2015 Review and 2016 Forecast articles submitted by manufacturers, integrators and other industry leaders. Taken together, the articles portray a mostly optimistic view of the industry’s present, and an...

Cybersecurity and mobile apps to see greater demand for improved security in 2016
Cybersecurity and mobile apps to see greater demand for improved security in 2016

The global economy presented some challenges to Tyco Security Products in several ways throughout 2015. Anyone in oil and gas or mining experienced an impact resulting from the market dynamics within those verticals. Also, the significant strength of the US dollar versus other currencies is impacting order value for companies with a global footprint. All in all, though, business remains strong and growing.   Measures to strengthen cybersecurity Looking ahead to 2016, cybersec...

2015 sees rise of drone detection systems and the convergence of physical and cyber security
2015 sees rise of drone detection systems and the convergence of physical and cyber security

Physical and cyber security convergence, perimeter intrusion detection systems and fibre optic-based sensors were some of the security trends that picked up pace in 2015 and will continue to grow in the coming year as well. The beginning of 2015 started out slowly as the implementation of security projects by a number of organisations was postponed for various reasons. Mid-year picked up momentum, and the year is ending on a strong note. A significant trend was the gradual progression of conve...

Security industry in 2016 to see higher megapixel cameras, IT security strengthening and adoption of new technologies
Security industry in 2016 to see higher megapixel cameras, IT security strengthening and adoption of new technologies

The year 2015 has been notable in several ways. Industry changes include a rise in Chinese manufacturers in the mid- to low-end market, more mobile devices providing video surveillance, and the rise of omnidirectional and higher-megapixel cameras. Unexpectedly, the industry also saw an increase in popularity of do-it-yourself security systems and the speed with which Chinese companies saturated the marketplace with “good enough” products. Omni-directional cameras Oncam welcomes th...

How security plans with reliable policies and procedures deliver improved operational effectiveness
How security plans with reliable policies and procedures deliver improved operational effectiveness

Automated procedures reduce manual errors & help meet regulatory requirements End user demands are growing exponentially every day. Whether it is managing who has access to buildings or areas and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, the list goes on and on as to what end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective securi...

How Windows 10 enhances ATM security by protecting against cyber attacks
How Windows 10 enhances ATM security by protecting against cyber attacks

Speaking at ATM Security 2015 in London, Pat Telford, principal consultant at Microsoft Canada, summarised the software threats to ATMs and the features to combat them when migrating to Windows 10. ATM security is compromised by physical attacks on the cash, physical attacks on the card, replacement of the ATM computer (black box), and malware attack (where normally a person visits the ATM and adds malware). According to Telford, there are certain immutable laws of ATM Sec...

How to protect the Internet of Things' vulnerabilities from hackers
How to protect the Internet of Things' vulnerabilities from hackers

Hackers probably take more interest in your home computer and information about your identity stored there As the Internet of Things (IoT) grows, so does the hackable universe. Equipment designers need to start thinking about security in the first steps of manufacturing products, and companies and individuals need to start implementing secure coding practices to avoid hacking incidents. Last July, for instance, two security researchers hacked the computer in a Chrysler Jeep a...

IoT intelligent building systems expose security threats and challenges
IoT intelligent building systems expose security threats and challenges

The IoT threat is magnified asuncontrolled devices are introduced into thenetwork through people ‘bringing their owndevices to work’ Intelligent building management, combined with the dramatic increase in IP connected devices brought about by the advent of the Internet of Things (IoT), provides a vast opportunity for large organisations to work smarter, faster and more efficiently than ever before. Intelligent building management systems have the potentia...

How IoT technology might impact visions of a utopian urban future
How IoT technology might impact visions of a utopian urban future

The vision of a utopian urban future restsheavily on the success of Open Dataand a Cloud Computing paradigm Confronting urban challenges using technology requires the private sector to work in tandem with governments to enable "smart cities." In fact, one report predicts the number of safe cities worldwide will quadruple in the next decade. It’s a topic that is increasingly top-of-mind. For example, the Safe Cities Asia 2015 conference in Singapore in May brought to...

Cyber attacks on physical systems call for a blended security approach
Cyber attacks on physical systems call for a blended security approach

Problems caused by physical systems in terms of cyber-attack are quite extensive, damaging systems and assets  Security experts of various disciplines agree that physical systems are increasingly being leveraged in attacks on organisational networks and supply chains. Many manufacturers maintain that security (including that of security systems) is the responsibility of the end user, which would be fine if they were only expected to maintain security and not create th...

Cyber security resilience develops as Internet of Things bolsters connectivity across technologies and devices
Cyber security resilience develops as Internet of Things bolsters connectivity across technologies and devices

Internet of things is worth the resilience trade-offs it demands – effort, thought and inconvenience ‘No society is more than three meals from revolution’ says the old adage. Updating the idea for the Information Age is a revealing, if somewhat worrying, exercise. How resilient are we as a society? Could your company function efficiently after a complete failure in IT? How effective would your employees be if forced to work from home following a collapse in t...

Cyber threat detection and protection takes centre stage at ASIS 2015
Cyber threat detection and protection takes centre stage at ASIS 2015

The potential costs and consequences of hackers getting through firewalls and onto the user’s computer networks can be devastating Theft of NATO data. Leakage of emails. Hackers setting up a live streaming website for over 100 New York City private webcams and even hacking the infrastructure servers of the U.S. government. As news of malicious takeover of private and corporate networks as well as incidents of malicious software programs, referred to as malware, conti...

ASIS International 2015 brings together security services, disruptive technologies and technological innovations
ASIS International 2015 brings together security services, disruptive technologies and technological innovations

The pre-seminar will also offer educational sessions on cutting-edge subjects It is that time of the year again, when security industry stalwarts gather together at ASIS to showcase the latest in physical security systems and other technological innovations. The event will focus on domestic threats as well as intelligence gathering tools to protect organisations against social media threats. The organisers of the ASIS International 61st Annual Seminar and Exhibits — ASI...

ASIS 2015 attracts end users and integrators with spotlight on latest security and surveillance trends
ASIS 2015 attracts end users and integrators with spotlight on latest security and surveillance trends

ASIS is a great opportunity to not only learn about new technologies first hand, but also to benchmark offerings against competitors  Now in its 61st year, the American Society of Industrial Security (ASIS) Seminar & Exhibits is more than an end-user show. Many systems integrators also attend, walk the show and even exhibit to meet with potential customers and perhaps see technology they may need to apply to their clients’ security challenges and issues. This ye...

Improving video surveillance effectiveness with IP and analytics
Improving video surveillance effectiveness with IP and analytics

The key driver to growth in the IP market is the effectiveness and efficiency of the technology Technological advances in video surveillance are allowing end users the flexibility to do more with their systems than previously imagined. 2014 saw several new technological trends that shaped the future of the security market, with 4K and cyber security being the main drivers. The drift continues this year too with end users demanding HD video surveillance and wide-spread...

Bosch Security Systems MD: Video image quality and integration driving security market
Bosch Security Systems MD: Video image quality and integration driving security market

According to Paul Wong, MD, Bosch Security Systems, intelligence and increased image quality are helping to drive the security market Paul Wong, Managing Director of Bosch Security Systems, has an optimistic view of current security trends. According to him, the security market is generally in good shape, with improvements in video image quality and integration driving growth and shaping the market. As global companies are looking to standardise internationally, intelligence,...

Home automation opportunities for security companies with growth of smart home technology
Home automation opportunities for security companies with growth of smart home technology

Many security dealers and installers are expanding their offerings to include home automation equipment The growth of home automation and “smart home” technology has created a unique opportunity for security companies of all kinds. With security systems already in about 20 percent of American homes, many security dealers and installers are expanding their offerings to include home automation equipment. Internet connected devices After all, why just offer monitori...

Assessing cyber security risks and vulnerabilities
Assessing cyber security risks and vulnerabilities

Suffering a breach is probably something that companies won’t admit to unless they must As the world has grown more and more interconnected through the Internet and company networks, cybercrime has grown at an alarming rate. According to the Federal Trade Commission, 783 businesses reported IT breaches in 2014, up 27.5 percent from 2013. “There were probably many more, but most go unreported,” says Kim Phan, of council with the Washington, D.C., law offices o...

Education-centric PSA-TEC 2015 show to focus on integrators and installers
Education-centric PSA-TEC 2015 show to focus on integrators and installers

It’s that time of year: show season! And for systems integrators and security installers, PSA-TEC is one of the quintessential annual conferences, offering hundreds of hours of education and training during the May 4-8 show (exhibits are May 6). Hotel registration at the Westin in Westminster, Colo., is due on or before April 16. PSA Security Network was established in 1974 as the Professional Security Alliance, Inc. dba PSA Security Network and is now the world’s largest electronic...

Convergence of IT networks and physical security
Convergence of IT networks and physical security

Kevin Brownell, principal physical security consultant at PTS Consulting Group, considers convergence of IT networks and physical security. He argues that current best practice shows that they no longer need to be separate disciplines and reassures installers that their diversity has been exaggerated. Brownell describes experiences of working with IT managers who no longer see networked CCTV and access control as ‘black arts’ and are buying into the idea of IP security as an integr...

The Internet of Things presents new cyber-vulnerabilities
The Internet of Things presents new cyber-vulnerabilities

Companies need to increase the knowledge within their business on the range of cyber-vulnerabilities At one time, embedded devices, such as access control components communicating with application software, used proprietary protocols like RS485. Use of proprietary protocols kept these devices safe from attack. However, in this article TDSi Technical Director Mike Sussman explains that the growth of the Internet of Things (IoT) involves a move toward IP-based systems and open s...

Electric grid security: A closer look at CIP-014-1 standard
Electric grid security: A closer look at CIP-014-1 standard

The FERC standard CIP-014-1 became effective, according to the Federal Register, on January 26, 2015 The electric power industry works with several federal agencies, including the Federal Energy Regulatory Commission (FERC), the Department of Homeland Security (DHS), and the Department of Energy (DOE) to improve sector-wide resilience for cyber threats. The industry also collaborates with the National Institute of Standards and Technology (NIST), the North American Electric Re...

Electric grid security: Regulations - A poor substitute
Electric grid security: Regulations - A poor substitute

Compliance with regulatory requirements are not enough to protect the US electric grid  Many companies use compliance and best practices to assist in their fight to protect the U.S. electric grid. They rely primarily on what three groups say – FERC (Federal Energy and Regulatory Committee), CERT (U.S. Computer Emergency Readiness Team) and NERC (North American Electric Reliability Corporation). These groups issue advisories, standards and guidelines for the industr...

Cybersecurity - Hackers target SCADA embedded systems
Cybersecurity - Hackers target SCADA embedded systems

Forty-one percent of cyber incidents involved the energy sector The Bipartisan Policy Center, the Industrial Control Systems Cyber Emergency Response Team, which is part of the U.S. Department of Homeland Security, reports responding to 198 cyber incidents in fiscal year 2012 across all critical infrastructure sectors. Forty-one percent of these incidents involved the energy sector, particularly electricity, according to a February 2014 report. Considering the enormity of the...

Uncertainty and opportunity for integrators within security market
Uncertainty and opportunity for integrators within security market

PSA Security Network is taking steps to help educate security professionals concerning both threats and opportunities related to cybersecurity PSA Security Network 2014/2015 Review & Forecast2014 was a year of great change and advancement in the security industry as a whole. We saw an uptick in DIY security solutions focused on residential and small commercial markets. Perhaps the biggest impact to the security market is that more pieces of security solutions are now cloud...

Key emerging trends in security and access control
Key emerging trends in security and access control

Emerging trends include cyber security, mobile, physical access control and The Internet of Things Viscount 2014/2015 Review and Forecast: At the enterprise level, spending on physical security continues to be a challenge. Companies have to do more with less, become more strategic about security investments, focus on better situational intelligence, predictive analytics, better utilisation of IT resources and infrastructure, and shift from just integration strategies to more...

Growing confidence in security industry as business leaders look to 2015
Growing confidence in security industry as business leaders look to 2015

The SIA Security Market Index rose to 74.6 in November 2014, up from 72.3 in September SIA 2014/2014 Review and Forecast: The Security Industry Association (SIA) has begun to conduct a bimonthly survey of select SIA members to measure confidence in the security industry through the SIA Security Market Index. Using a scale of 1-100, the SIA Security Market Index reflected growing confidence among security industry business leaders throughout 2014 and into 2015. The SIA Securi...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. Expert commentary
About this page

See an extensive list of insightful articles related to Cyber security, highlighting product, technology and industry trends on Cyber security from industry thought leaders and experts.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec