SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - Security beat

Could hackable automobiles result in a large-scale disaster?
Could hackable automobiles result in a large-scale disaster?

Some of the electronic features we all love in our new cars depend on a connection to the Internet. But what are the cybersecurity risks involved in that connection? Could a widespread cyberattack turn our cars into deathtraps and create a traffic catastrophe on the scale of 9/11? That’s the scenario described in a report from the nonprofit group Consumer Watchdog, which warns that a fleet-wide cyberattack at rush hour could result in a 9/11-style catastrophe with approximately 3,000 dea...

GSX 2019 is coming to Chicago: elevating the event experience
GSX 2019 is coming to Chicago: elevating the event experience

Global Security Exchange (GSX) 2019 will blow into the Windy City this fall, combining a tradeshow, a full schedule of professional education sessions, plenty of industry networking opportunities, and an annual reunion of the top professionals from around the world tasked with protecting people, property and assets. GSX – the trade show and industry event 'formerly known as' the ASIS Annual Seminar and Exhibits – will be Sept. 8-12 at Chicago’s McCormick Place. The show promi...

Seeking clarity, the industry speaks up about the NDAA ‘blacklist’ provision
Seeking clarity, the industry speaks up about the NDAA ‘blacklist’ provision

The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a con...

ReconaSense provides adaptive physical security using artificial intelligence
ReconaSense provides adaptive physical security using artificial intelligence

Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management  “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense....

Secure by Default: New standard for surveillance products in the United Kingdom
Secure by Default: New standard for surveillance products in the United Kingdom

Several video manufacturers have participated in the development of a U.K. 'Secure by Default' baseline standard to ensure cybersecurity measures are included in equipment as it leaves the factory. The standard includes ensuring that passwords must be changed from the manufacturer default at start-up, that chosen passwords should be sufficiently complex to provide a degree of assurance, and that controls are placed around how and when remote access should be commissioned. The standard aims to e...

Reflections on a shrinking IFSEC 2019 in London
Reflections on a shrinking IFSEC 2019 in London

Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors...

8 tips for visitors to IFSEC Global
8 tips for visitors to IFSEC Global

IFSEC Global, like any large trade show, can be daunting for attendees. At big shows, there can be hundreds of physical security manufacturers and dealers vying for your attention. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cybersecurity and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. With IFSEC Global approaching next week, we present e...

Learn about AI, convergence and GDPR at IFSEC 2019
Learn about AI, convergence and GDPR at IFSEC 2019

Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger...

Addressing insider threats requires a cyber-physical blended approach
Addressing insider threats requires a cyber-physical blended approach

While most security teams are focused on preventing malicious outsider attacks, recent data suggests that close to 30 percent of confirmed breaches today involve insiders. Today’s increasingly complex networks across physical, information technology (IT) and operational technology (OT) systems make it difficult for security teams to detect and prevent insider threats. This is compounded by the proliferation of data, devices, applications, and users accessing networked resources. Rising i...

IFSEC International 2019: packed with technologies and opportunities to learn
IFSEC International 2019: packed with technologies and opportunities to learn

The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several bi...

The rise of access control in the cloud
The rise of access control in the cloud

Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control  With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annua...

Cloud security: new opportunities available for integrators in the cloud
Cloud security: new opportunities available for integrators in the cloud

Managed services provided through the cloud offer multiple advantages for system integrators. These include: Increased recurring monthly revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. The cloud enables integrators to serve more sites without hiring additional t...

Amid interesting times, Hikvision’s outlook remains upbeat in the USA
Amid interesting times, Hikvision’s outlook remains upbeat in the USA

Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American m...

Cybersecurity: What is its role with video surveillance?
Cybersecurity: What is its role with video surveillance?

Lack of cybersecurity of video systems made headlines in 2016. The Mirai cyberattack that year impacted Internet service on the East Coast of the United States and kept several high-profile websites offline. Cybersecurity attacks later in the day were more global in nature. The cyberattacks were carried out by a botnet, a network of bots, which are software applications (in this case, computer viruses) that communicate with each other and run tasks automatically over the Internet. IP-enabled c...

OSSA creating an app-based platform to disrupt the security industry
OSSA creating an app-based platform to disrupt the security industry

In today’s technology-driven markets, a platform is a business model that connects producers and consumers in an interactive ecosystem. Some examples of platforms are Uber and Airbnb, which have disrupted and transformed traditional markets. Isn’t it time to deploy the platform model in the physical security industry? That’s the goal of the Open Security & Safety Alliance (OSSA), a non-profit organisation. Interactions and exchange The book ‘Platform Revolution&rsqu...

Cybersecurity: beware of these enterprise risks
Cybersecurity: beware of these enterprise risks

Cybersecurity involves a variety of risks and vulnerabilities to the enterprise, from distributed denial of service (DDoS) attacks to phishing to USB drives. Companies may also be at risk from use of interactive kiosks, or even from cyberattacks against traveling executives. Preventing phishing and cyberattacks The 'Management Hack' service is designed for C-level executives, such as CEO, CFO or event CIO Phishing is a fraudulent attempt to gain sensitive information such as user names, passw...

Cybersecurity: when cybersecurity meets physical security
Cybersecurity: when cybersecurity meets physical security

As physical security systems increasingly resemble the architecture of an IT (information technology) network, the cybersecurity risks are increasing. Sometimes hacks in physical security go unrecognised because of poor detection. Here's part two of our Cybersecurity series.  Going forward, the physical security industry should adopt the same principles as the information security market, embracing new elements such as risk assessment and certifications. A change in culture is needed to al...

Cloud security: trends in the cloud for physical security
Cloud security: trends in the cloud for physical security

Cloud platforms and applications are becoming prevalent across security solutions. In the simplest terms, cloud systems store and access data and programs over the Internet instead of using an on-premises computer server. The cloud is a metaphor for the Internet. This technology helps security integrators provide managed services and the advantages of off-site systems and services to customers, which is why cloud computing is often mentioned among the 'megatrends' in the physical security indu...

Cybersecurity: why it matters now and forever
Cybersecurity: why it matters now and forever

Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs t...

ISC West 2019 day two: Explaining the new and the tried-and-true
ISC West 2019 day two: Explaining the new and the tried-and-true

There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill...

ISC West 2019 day one: Evolutionary products the main highlight
ISC West 2019 day one: Evolutionary products the main highlight

Delivering on high expectations, the first day of ISC West 2019 kicked off with a crowded Sands Expo Center and exhibitors putting forward their best new technologies. Developments seemed more evolutionary than revolutionary, but attendees quickly found plenty of interest. Thermal cameras Hanwha Techwin also showed off a new Android camera that can deploy new apps The largest booth at ISC West, Hanwha Techwin, remained crowded throughout the first day as attendees checked out the company&rsqu...

Bosch start-up SAST to exhibit at ISC West 2019 for the first time
Bosch start-up SAST to exhibit at ISC West 2019 for the first time

Safety and Security Things GmbH (SAST) will be both a first-time exhibitor at ISC West and also feature a larger booth – 1,800 square feet. The Bosch startup is looking to make a big splash in its first-time appearance at the largest security trade show in the United States. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Founded in September 2018 and based in Munich, Germany, SAST is building a new Internet of Thi...

ISC West is just the beginning: More exhibitions upcoming in the ISC family
ISC West is just the beginning: More exhibitions upcoming in the ISC family

ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and fac...

High-profile keynoters and new speakers included at ISC West 2019 conference
High-profile keynoters and new speakers included at ISC West 2019 conference

Keynote speakers will kick off ISC West Day 1 and Day 2. Keynote sessions are open to anyone, and ISC West organisers look for speakers with broad-based appeal, either from the government or related to security strategies, standards and measures. Timely and newsworthy topics are included as a means of educating attendees on the best way to protect their own facilities. On the first day of the exhibition, April 10 at 8:30 a.m., the Keynote Speaker will be William Bryan of the Department of Home...

Connected Security Expo at ISC West addresses convergence of physical security & IT
Connected Security Expo at ISC West addresses convergence of physical security & IT

As the Internet of Things (IoT) and other trends drive the convergence of physical and information security, integrators and end users attending ISC West may be struggling to keep pace with new areas of responsibility and expanding roles in the larger security ecosystem. Help is here. The Connected Security Expo, co-locating with ISC West, focuses on building a holistic security strategy for the connected enterprise. Exhibitors will focus on how physical and information security can be used tog...

AI in physical security: applications beyond video surveillance
AI in physical security: applications beyond video surveillance

In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. This is part three of our 'AI in Physical Security' series. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right...

Adapting servers for IP video surveillance systems: choosing the right solution
Adapting servers for IP video surveillance systems: choosing the right solution

Choosing the right server for a video surveillance application comes down to one question: What does the customer expect from the system? Is it a retail location with two cameras that only needs video stored for 24 hours? Does the system need failover protection? What are the ramifications if a system goes down? Does business have to stop? How fast does the customer need to have access to video? Is it a regulated industry where immediate access is a requirement? How mission-critical is the vid...

U.S. partial government shutdown: what's the impact on the physical security industry?
U.S. partial government shutdown: what's the impact on the physical security industry?

Security is arguably at the heart of the United States partial government shutdown: President Trump’s demand for $5.6 billion to start building a wall along the southern border with Mexico is the major bone of contention as gridlock in Washington prevents passage of a spending bill to keep the government in full operation. The partial government shutdown has affected security in other ways, too, and some of the impact could continue long after the impasse is settled. Some 800,000 federal...

Innovation dominates CES 2019 in new security technologies
Innovation dominates CES 2019 in new security technologies

Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality...

Why regional? Inside ADT's mergers and acquisitions of US security integrators
Why regional? Inside ADT's mergers and acquisitions of US security integrators

ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.  Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commerc...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. Security beat
About this page

See an extensive list of insightful blog posts on Cyber security, providing in-depth opinions and analysis on product, technology and industry trends on Cyber security by editor Larry Anderson

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec