SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - Expert commentary

HD over Coax provides cost-effective video surveillance upgrade
HD over Coax provides cost-effective video surveillance upgrade

According to IHS Market, it is estimated that there are over 60 million security cameras in the United States, and other reports say these cameras capture more than four billion hours of footage per week. Over the last decade, IP camera technology has dominated the conversation as it has provided users with a broad offering of enhanced image quality and features. With a large percentage of existing security systems relying on analogue, many end users looking for high definition (HD) video qual...

How the convergence of physical security and cybersecurity will benefit businesses
How the convergence of physical security and cybersecurity will benefit businesses

The physical security industry is rapidly changing, ever evolving, and one that is growing faster than most other sectors of the greater global market. The latest research shows that the forecasted growth rates will be a compound average growth rate (CAGR) of 7.2% and a total market revenue opportunity of $41.27B through 2022. These economic indicators make the industry a very attractive investment for entrepreneurs and for investment from large corporations from other industries. At ISC West...

Video surveillance technologies evolve to meet data and cybersecurity challenges
Video surveillance technologies evolve to meet data and cybersecurity challenges

The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make impr...

Artificial intelligence is changing intrusion detection dynamics in the security industry
Artificial intelligence is changing intrusion detection dynamics in the security industry

With the ever-growing availability of video data thanks to the low cost of high-resolution video cameras and storage, artificial intelligence (AI) and deep learning analytics now have become a necessity for the physical security industry, including access control and intrusion detection. Minimising human error and false positives are the key motivations for applying AI technologies in the security industry. What is artificial intelligence? Artificial intelligence is the ability of machines to...

Small business owners reduce losses with smart video surveillance
Small business owners reduce losses with smart video surveillance

Small business owners work hard. They are often the first ones there in the morning and the last to leave at night. Even then, they likely bring their work home with them. During that time, everything they do is aimed at making their business as successful as possible. Because of this, many business owners don’t take vacations, and if they do, they spend a lot of time worrying about their business while they’re away. In both cases, the potential for burnout is tremendously high. Th...

GDPR raises questions about where to draw the line between privacy and security
GDPR raises questions about where to draw the line between privacy and security

While US market is being sensitive about cybersecurity through their popular camera products, European countries and the UK are preparing for the new privacy regulation to apply in two months’ time. But how would these challenges affect the global security market? What are the main problems in it for the manufacturers? What should investors in security industry look at right now? We’ve all recently heard about acquisitions of market-leading companies by technological ‘monsters...

How access controlled revolving doors can protect businesses from crime
How access controlled revolving doors can protect businesses from crime

Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot ge...

How managed detection and response enhances cybersecurity management in organisations
How managed detection and response enhances cybersecurity management in organisations

There was a time when one of our biggest challenges was securing our physical assets, whether that was our people or our property from crime. We researched and deployed the very latest in video solutions, intrusion systems, fire alarms and access control devices, all in an effort to keep the bad guys out and the good guys safe, along with protecting our facilities from break-ins, robberies and countless other crimes. However, times are changing. No longer must we only be concerned about keepin...

Safeguarding enterprises against cybersecurity threats is essential for the future
Safeguarding enterprises against cybersecurity threats is essential for the future

In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organisations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global ente...

Drawbacks of PenTests and ethical hacking for the security industry
Drawbacks of PenTests and ethical hacking for the security industry

PenTesting, also known as “ethical hacking” or “white-hat hacking,” has always been viewed as the “sexy” side of cybersecurity, a task that is far more exciting than monitoring systems for intrusions, shoring up defenses, or performing compliance audits. Numerous security conferences are devoted to the fine art of attempting to hack into systems – with an owner’s full knowledge and permission – and reporting on the results. At an organisat...

How moving to Security as a Service benefits both providers and end users
How moving to Security as a Service benefits both providers and end users

The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products.   With the physical...

The five questions bank security and IT leaders need to answer about cybersecurity
The five questions bank security and IT leaders need to answer about cybersecurity

Organisations across the world face a new risk paradigm: one that encompasses cyber and physical threats. We’ve heard the stories associated with ATM skimming, identity theft, data breaches, scams, and phishing. Large financial services organisations are often the victim of hackers looking to steal corporate information and transactional data or funds, and criminals continue to become more sophisticated in their approach. Growth in cyber-attacks Additionally, cyber-threats have taken a...

How to optimise video surveillance storage and security operations with hyperconvergence
How to optimise video surveillance storage and security operations with hyperconvergence

Over the past year, we’ve heard a lot of big buzzwords in conversations at different conferences, meetings and events. Deep learning, artificial intelligence and cybersecurity are hot topics, and these trends will undoubtedly define the landscape over the coming year. Other issues, mostly IT related, are also making their way into more and more surveillance-focused conversations and to me, none is more complicated — or beneficial — than hyperconvergence.   W...

Why surveillance will reach a wider consumer audience in 2018
Why surveillance will reach a wider consumer audience in 2018

In 2017 we foresaw the emergence of video surveillance as a service. We also predicted an increase in intelligence in cameras, greater adoption of analytics, and more content aggregation. We saw biometrics taking increasing importance as a measure to prevent massive data breaches. We took on more projects that were larger in scope and size. More implementations involved higher-resolution cameras and longer retention times leading to greater adoption of multi-tier storage. Looking ahead to 2018...

Why scalable intelligent communications will be at the forefront in 2018
Why scalable intelligent communications will be at the forefront in 2018

During 2017, we witnessed as the end-user came to realise that an intercom can be a silo if not properly integrated in with access control, video management, and their existing VoIP-based systems as well as designing intelligibility into every device. We believe the next generation of communication in the Age of Voice has accelerated beyond anyone’s expectations, and we will begin to see more and more attention on highly intelligible, interoperable and scalable intelligent communications...

4K analogue cameras are still an ideal solution for video surveillance systems
4K analogue cameras are still an ideal solution for video surveillance systems

One of the toughest business decisions companies need to make is when selecting a new video surveillance system, as it’s a rigorous process to compare camera offerings and technologies, and to evaluate price structures. With its proven performance over the last several years, IP surveillance systems have become the defacto standard for most professionals. Those experts typically cite the numerous benefits that IP cameras offer, including higher image resolution, ease of installation, scal...

How to prevent autonomous vehicles from being used by terrorists
How to prevent autonomous vehicles from being used by terrorists

In recent news, trucks, lorries and vans have been the weapon used in terror attacks around the globe, and other sources suggest that autonomous vehicles, particularly self-driving trucks and lorries, could be a reality sooner than we think. It poses the question: How can we prevent autonomous vehicles from being used as weapons in terror attacks? Accessories for terror attacks We already have ‘self-driving’ technologies in the cars which are on our roads today, from lane-departur...

Why video management software is integral and interwoven into 2018’s security outlook
Why video management software is integral and interwoven into 2018’s security outlook

  The record-breaking attendance at the 2017 industry trade shows was a clear indication of a growing need for and interest in security. While cybersecurity was a main theme, with encryption and automatic-updating technology taking centre stage, customised solutions and visible examples of increased manufacturer’s support were also highlighted. These latter two are interwoven through activities such as manufacturer’s training seminars that highlight the advanced f...

Physical security has to adapt to a new age of internet security in 2018
Physical security has to adapt to a new age of internet security in 2018

The most important trend that developed in 2017 was the increasing focus on cybersecurity. As more and more devices move to the Internet of Things (IoT) model to provide added convenience and intelligence, the ability of hackers to use those devices to infiltrate systems – and the need for oversight to protect organisations – has also increased. Another trend we saw was an increase in the number of compliance and audit requirements related to physical security. An example of this i...

Why the future looks bright in cyberspace for the security industry in 2018
Why the future looks bright in cyberspace for the security industry in 2018

  What a year it’s been! 2017 has been a monumental period of product innovation and growth for Pivot3. The company experienced a more-than-50-percent increase in bookings from Q2 to Q3 this year, including a record number of million-dollar orders. We also saw deals supporting multiple use cases more than double, and experienced continued growth in the video surveillance market, driven by new product enhancements and contracts worth more than $1 million. We have also in...

Why 2018 needs more intelligence and integration to drive the industry
Why 2018 needs more intelligence and integration to drive the industry

  Demand for video surveillance equipment continued to grow rapidly in 2017 with price competition remaining intense. The important trends in 2017 were in three areas: Multi-sensor technology, artificial intelligence/deep learning, and stronger integration with VMS partners. Security professionals are turning to emerging technologies such as multi-sensor panoramic cameras, which can dramatically increase situational awareness, improve operator efficiency, and are more cost-eff...

How terror attacks have driven demand for a higher quality of security training in 2018
How terror attacks have driven demand for a higher quality of security training in 2018

The demand for security consultancy services has increased as recent terror events have highlighted the need for effective and proportionate mitigation measures. Security training has seen an increase in demand, especially for technical courses in the areas of access control and CCTV.   Security management training has also risen, except in the oil and gas sector where demand dropped significantly; this is attributed to the suppressed oil price. However, recently there are sig...

Why collaboration in the security industry is needed to increase cybersecurity in 2018
Why collaboration in the security industry is needed to increase cybersecurity in 2018

  2017 demonstrated the need for increased safety, security, and collaboration. We predicted that there would be an increase in the role of cybersecurity in 2017, and without a doubt there was great focus around the need for stronger network security protocols. Growing focus on cybersecurity Cybersecurity continues to be top of mind and organisations demand solutions that are cyber-secure. Manufacturers, integrators, and end-users must actively collaborate to develop policie...

The new alliance of humans and robotics in security solutions in 2018
The new alliance of humans and robotics in security solutions in 2018

  The past year has proved to be a year full of many changes both within our industry and for Robotic Assistance Devices (RAD). While we have experienced increased adoption of artificial intelligence-based solutions, the industry has been challenged with an ever-evolving technology landscape. Protecting enterprise organisations from both cyber and physical security threats will be an ongoing challenge the industry must grapple with. Greater adoption of robotic solutions To...

How the cloud is bringing change into the security market in 2018
How the cloud is bringing change into the security market in 2018

  In January of 2017, ISONAS forecasted that the year would be a transformational year in access control with strong movement to IP access control, and that the adoption of IP access control hardware and software would significantly outpace the growth of the overall industry. In retrospect, our forecasts were on point and accurate. The industry has seen robust growth in the high single digits, while IP access control is seeing growth rates of up to 30-35%. The market drivers...

Advances in cybersecurity, security robotics and video analytics were prominent in 2017
Advances in cybersecurity, security robotics and video analytics were prominent in 2017

The overall economy and climate always has a bearing on growth from a macro standpoint and certainly the security market is impacted as well. US economic growth has been healthy at 3% through the first half of 2017. Combining that with jobs growth and we have a marketplace that is ripe for growth and expansion. Continued focus on cybersecurity One major trend that expanded in 2017 would be the continued focus and concerns on cybersecurity. There is stronger demand from customers and company ex...

Cybersecurity must be a surveillance industry priority for 2018
Cybersecurity must be a surveillance industry priority for 2018

We predicted last year that more vendors would introduce copies of Arecont Vision’s multi-sensor 180-360 degree panoramic and adjustable-view multi-sensor cameras in 2017, which came true. More vendors now offer their own 1st generation copies of the pioneering technology we introduced in 2006. We’ve continued to lead this market, introducing new 5th generation single-sensor and multi-sensor cameras that are used by customers worldwide. The SurroundVideo Omni G3 with Remote Setup c...

SIA predicts top physical security trends for 2018
SIA predicts top physical security trends for 2018

In the wake of Securing New Ground event in New York City in 2016, the Security Industry Association (SIA) published an inaugural “Security Megatrends” report that assessed for major “megatrends” for the security industry in 2017. 10 major megatrends Only days ago, SIA published “Security Megatrends: The 2018 Vision for the Security Industry,” again identifying 10 major megatrends to watch in the year ahead. SIA saw a great deal of activity unfold in 2017, a...

IP convergence and IoT drove security camera market in 2017
IP convergence and IoT drove security camera market in 2017

This year has unfolded generally as predicted. Complete solutions have enabled IP video to further penetrate the small to medium business markets. IP convergence opened up new fast-growing markets for IP intercoms and IP audio systems. The preponderance of IoT devices has driven cybersecurity efforts to new heights. In addition, lower prices, along with the increasing investment needed in R&D to keep pace with rapidly changing technology, have led to market consolidation. IoT creates oppor...

Security system interoperability to become standard in 2018
Security system interoperability to become standard in 2018

At ONVIF, we believe our perspective for 2017 turned out to be reasonably accurate. We did see an increasing interest for interoperability all the way to system-to-system level; not only within the security industry, but also in neighbouring industries where the prospects for IoT have drastically improved. I believe the industry as such has matured in its relation to IoT and today we can imagine how IoT will play a part of smarter and safer system deployments. Increased cybersecurity threat T...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. Expert commentary
About this page

See an extensive list of insightful articles related to Cyber security, highlighting product, technology and industry trends on Cyber security from industry thought leaders and experts.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec