SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Clumio Backtrack for DynamoDB: Instant data recovery
Clumio Backtrack for DynamoDB: Instant data recovery

Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced the general availability of Clumio Backtrack for Amazon DynamoDB, an advanced offering that transforms how organisations recover data from one of the most widely used cloud-native NoSQL databases in the world.  Amazon DynamoDB has become a foundational technology for cloud-first development teams, especially those building high-scale, latency-sensitive applications such as rea...

Zimperium unveils SarangTrap malware threat
Zimperium unveils SarangTrap malware threat

Zimperium, the world pioneer in mobile security, announced that its zLabs threat research team has uncovered a highly coordinated and emotionally manipulative malware campaign that is targeting mobile users through fake dating and social networking apps. The campaign, identified as SarangTrap, has already leveraged over 250 malicious Android apps and more than 80 phishing domains, all designed to steal sensitive data while masquerading as trusted platforms. Legitimate dating services These a...

CyberSafe acquired by SecurityBridge for SAP security
CyberSafe acquired by SecurityBridge for SAP security

SecurityBridge, the creator of the Cybersecurity Command Centre for SAP, announced the acquisition of CyberSafe, a UK-based pioneer in multi-factor authentication (MFA) and single sign-on (SSO) solutions for SAP users. The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication...

Phishing attacks surge: Protect UK businesses now
Phishing attacks surge: Protect UK businesses now

A 2022 report from the Office for National Statistics, the most comprehensive on phishing to date, has revealed that half of all adults residing in the UK have reported receiving a phishing message. In the last year, 85% of UK businesses and 86% of charities faced at least one phishing attack, with 32% of phishing emails being AI-generated, leveraging scraped social media or dark web data and real-time language tweaking. Advance fee fraud The average loss for businesses from phishing attacks...

iDenfy's KYC & AML boost Okazio's crypto safety
iDenfy's KYC & AML boost Okazio's crypto safety

iDenfy, an identity verification and fraud prevention service provider, partnered with Okazio, a digital wealth management platform specialising in secure cryptocurrency investment opportunities. This partnership showcases iDenfy’s Know Your Customer (KYC) and Anti-Money Laundering (AML) services that will now be used to onboard Okazio’s users and support the latest compliance requirements with the EU’s new Crypto-Assets (MiCA) regulations while helping reduce fraud risks in t...

Cequence AI Gateway: Transforming enterprise security
Cequence AI Gateway: Transforming enterprise security

Cequence Security, a pioneer in application security, unveiled the Cequence AI Gateway, a powerful new solution enabling enterprises to take full advantage of the productivity gains promised by agentic AI. Bridging the gap between AI agents and enterprise applications, the AI Gateway enables instant connectivity with the guardrails enterprises need to stay in control.         Power of artificial intelligence Enterprises, eager to embrace the power of a...

Eviden advances AI & NLP in defence with AtLaS project
Eviden advances AI & NLP in defence with AtLaS project

Eviden, the Atos Group product brand pioneering in advanced computing, cybersecurity products, mission-critical systems and vision AI, announces that it has been selected by the European Commission to provide the technical platform to host and integrate the applications developed by the nine selected organisations constituting the AtLaS consortium for the HLTP Challenge. This project, one of the four selected projects, is launched and financed by the European Defence Fund. Eviden will also...

Kaseya VSA 10: AI-driven workflows enhance security
Kaseya VSA 10: AI-driven workflows enhance security

Kaseya, the globally renowned provider of AI-powered IT management and cybersecurity software, launched an innovative AI-workflow generator within its VSA 10 platform. Using generative AI, technicians can describe a desired outcome in simple language, and Cooper Copilot builds the entire automation workflow, with no specialised product knowledge or previous scripting experience required. AI-powered workflows “Creating workflows with AI isn’t just easier — it’s signific...

Tony Ball appointed new Chief Executive Officer (CEO) of Entrust Inc.
Tony Ball appointed new Chief Executive Officer (CEO) of Entrust Inc.

Entrust, a pioneer in providing identity-centric security solutions, announced the appointment of Tony Ball as its incoming Chief Executive Officer. Ball will replace Todd Wilkinson, who plans to retire on March 31, 2026, after 17 years leading the company. “I’m honoured to work with pioneers like Todd, Tony, and the entire senior leadership team,” said Bobby Mehta, Chair of the Entrust Board of Directors, adding “I’m pleased to see Tony step in to lead the or...

Appdome launches IDAnchor for mobile security
Appdome launches IDAnchor for mobile security

Appdome, the pioneer in protecting mobile businesses, announced IDAnchor™, the industry’s first Customer Identity Protection (CIP) solution for the mobile economy. IDAnchor fingerprints each release, installation, and device used to access, log in, and generate transactions in a mobile app. It combines this immutable chain of trust with real-time threat signals to bring sign-in alerts and unrecognised device notifications to every mobile app in the world and create a perimeter defen...

Privacy concerns in AI security: Insights from Absolute
Privacy concerns in AI security: Insights from Absolute

Cybersecurity teams are taking a cautious approach to artificial intelligence (AI), despite industry hype and pressure from business pioneers to accelerate adoption, according to a new survey from ISC2. While AI is widely promoted as a game-changer for security operations, only a small proportion of practitioners have integrated these tools into their daily workflows, with many remaining hesitant due to concerns over privacy, oversight, and unintended risks. Advanced in industrial se...

Zero Networks hires VP for EMEA & LATAM expansion
Zero Networks hires VP for EMEA & LATAM expansion

Zero Networks, a pioneer in zero trust security solutions, announced the appointment of Tony Hadzima as Vice President of Sales for EMEA and LATAM. This strategic hire supports the company’s global expansion goals and rising demand for its innovative microsegmentation and zero-trust offerings. Prior roles of Hadzima Hadzima brings nearly 30 years of international sales and business leadership experience Hadzima brings nearly 30 years of international sales and business leadership...

Enterprise security test 2025 by AV-Comparatives
Enterprise security test 2025 by AV-Comparatives

AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its Enterprise Security Test 2025 (March to June). This is the most extensive public evaluation to date of enterprise endpoint protection platforms (EPP), endpoint detection and response (EDR), and extended detection and response (XDR) solutions. Seventeen high-performing enterprise-grade cybersecurity products were rigorously evaluated using real-world attack simulations and scientifically so...

JFrog launches secure MCP server for AI integration
JFrog launches secure MCP server for AI integration

JFrog Ltd, the Liquid Software company and creators of the award-winning JFrog Software Supply Chain Platform, today unveiled a new Model Context Protocol (MCP) Server. This architecture enables Large Language Models (LLMs) and AI agents to securely interact with tools and data sources within the JFrog Platform directly from MCP clients, including popular agentic coding development environments and IDEs, boosting developer productivity and streamlining workflows. MCP-enabled AI tools and codi...

Zimperium sounds alarm on mobile cyber threats
Zimperium sounds alarm on mobile cyber threats

As travel surges this summer, Zimperium, the pioneer in mobile security, is sounding the alarm on escalating mobile cyber threats targeting employees on the move. According to new threat intelligence from Zimperium, over 5 million unsecured public Wi-Fi networks have been detected globally since the beginning of 2025—with a staggering 33% of users still connecting to these open networks, putting enterprise data at immediate risk. Ideal attack surface for cybercriminals “Mobile dev...

Knightscope joins Palantir for FedRAMP and ATO acceleration
Knightscope joins Palantir for FedRAMP and ATO acceleration

Knightscope, Inc., a pioneer in developing autonomous security robots and artificial intelligence technologies, announced it has signed a two-year agreement with Palantir Technologies Inc., joining Palantir’s FedStart program to accelerate the Company’s entry into the U.S. federal marketplace.  The collaboration provides Knightscope with an accelerated pathway to FedRAMP High and DoD Impact Level 5-accredited environment, comprehensive onboarding services, and direct Authority...

Cyware & Carahsoft partner on SLTT cybersecurity solutions
Cyware & Carahsoft partner on SLTT cybersecurity solutions

Cyware, the industry pioneer in threat intelligence operationalisation, collaboration, and orchestrated response, and Carahsoft Technology Corp., the Trusted Government IT Solutions Provider, announced a strategic partnership. Under the agreement, Carahsoft will serve as Cyware’s Public Sector distributor, making Cyware’s solutions available to State, Local, Tribal, and Territorial (SLTT) agencies through Carahsoft’s reseller partners and National Association of State Procurem...

Immersive One AI-powered Lab Builder launched
Immersive One AI-powered Lab Builder launched

Immersive, the pioneer in people-centric cybersecurity, announces its Immersive One AI-powered Lab Builder feature to give customers and partners powerful new ways to rapidly improve cyber skills across teams through customised labs and learning experiences. With this new tool supporting Immersive’s Prove, Improve, Benchmark, and Report (PIBR) approach, cyber pioneers will be able to easily create hands-on exercises and simulations for their technical workforce, including offensive, defen...

Innovative network solutions by AMG Systems UK
Innovative network solutions by AMG Systems UK

AMG Systems of the United Kingdom and the USA introduces the AMG Secure-Net SFP carrier, an SFP-based IP-level device that offers 128-bit encryption for traffic over any IP network. This device operates as an SFP carrier and can host most standard MSA-compliant 100Mb or 1Gb SFP modules. The Secure-Net SFP carrier transparently envelopes a wide variety of SFPs, enabling full reuse of existing equipment and easy deployment across various infrastructure types, including both fibre and copper...

Semperis unveils critical design flaw in Windows 2025
Semperis unveils critical design flaw in Windows 2025

Semperis, a provider of AI-powered identity security and cyber resilience, released new research detailing Golden dMSA, a critical design flaw active in delegated Managed Service Accounts (dMSA) in Windows Server 2025. The flaw can result in high-impact attacks, enabling cross-domain lateral movement and persistent access to all managed service accounts and their resources across Active Directory indefinitely. Attack technique To help further understanding of how this attack technique works i...

Vehere NDR v1.8.1: New UI boosts cyber defence
Vehere NDR v1.8.1: New UI boosts cyber defence

Vehere, a pioneering provider of AI-powered Cyber Network Intelligence, has officially rolled out its latest NDR firmware v1.8.1 that introduces a modern, intuitive user interface, delivering greater operational efficiency for security teams. Designed for mission-critical environments, it reflects Vehere's core philosophy: empower defenders with tools that reduce complexity and accelerate detection and response. What's new and why it matters Clean, modern UI: Simplifies workflows and c...

HackerOne's Hai debuts on AWS Marketplace for AI security
HackerOne's Hai debuts on AWS Marketplace for AI security

HackerOne, a pioneering provider of offensive security solutions, announces the availability of its security agent Hai in the new AI Agents and Tools category of AWS Marketplace. Customers can now use AWS Marketplace to easily discover, buy, and deploy AI agent solutions, including HackerOne’s AI security agent Hai, using their AWS accounts, accelerating AI agent and agentic workflow development. Resolution across SDLC Hai helps security teams reduce validation time by up to 75%, improv...

Exein's digital immune system secures smart devices
Exein's digital immune system secures smart devices

Exein, the embedded IoT cybersecurity company at the forefront of defending Europe’s critical infrastructure, has raised €70m in a Series C round. The round was led by Balderton and joined by Supernova and Lakestar, with 33N, United Ventures and Partech following on from the previous round. The fresh capital will drive Exein’s ambitious global expansion plans across the US, Japan, Taiwan, and South Korea, as well as to strengthen its establish...

Zimperium's concerning Android Konfety malware update
Zimperium's concerning Android Konfety malware update

Zimperium, the global pioneer in mobile security, announces the discovery of a new, highly evasive variant of the Konfety malware targetting Android devices. Identified by Zimperium’s zLabs team, this latest version leverages advanced obfuscation and ZIP-level evasion techniques, making it significantly more difficult to detect and analyse than previous iterations. Konfety malware campaign The Konfety malware campaign uses a deceptive dual-app strategy—leveraging the same pac...

VIPRE's advanced email threat protection
VIPRE's advanced email threat protection

VIPRE Security Group, a pioneer and award-winning cybersecurity, privacy, and data protection company, announced the launch of its new VIPRE Integrated Email Security (IES) Solution. This Integrated Cloud Email Security (ICES) application is a cloud-based email security solution that supplements the native security of cloud email providers (such as Microsoft 365) using advanced detection techniques to identify malicious emails and suspicious activity. Comprehensive security solutions ICE...

GSX 2025: Explore security leadership & AI insights
GSX 2025: Explore security leadership & AI insights

Encompassing 200+ sessions tackling vital issues in the security profession, the recently announced GSX session lineup includes in-depth looks at timely issues within the following themes: Crime, Digital Transformation, Information Security, Law and Ethics, Managing Organisations, National Security, Physical and Operational Security, Professional Development, and Risk Management. GSX will also feature three unique keynote speakers. Read on for a closer look at these dynamic keynotes a...

NVIDIA enhances AI cybersecurity with Intigriti
NVIDIA enhances AI cybersecurity with Intigriti

With an expanding threat landscape, a surge in AI-driven products, and a commitment to innovation, NVIDIA is enhancing cybersecurity with a proactive approach by tapping into the global security researcher community. The Intigriti community includes over 125,000 ethical hackers, equipped to test mission-critical AI infrastructure at scale and speed in real-time. The new programme includes a web portal that Intigriti members use as an interface to take part in finding and reporting potential cy...

DigiCert's World Quantum Readiness Day 2025
DigiCert's World Quantum Readiness Day 2025

DigiCert, a global provider of digital trust, announced open registration for its annual World Quantum Readiness Day virtual event, which takes place on Wednesday, September 10, 2025. The company is also accepting submissions for its Quantum Readiness Awards. Both initiatives spotlight the critical need for current security infrastructures to adapt to the imminent reality of quantum computing.  Adopt PQC standards World Quantum Readiness Day is a catalyst for action, urging enterprises a...

Signicat acquires Inverid: Boosting NFC verification
Signicat acquires Inverid: Boosting NFC verification

Signicat, the pioneering pan-European digital identity platform, has announced its acquisition of Inverid, the pioneering Dutch provider of NFC-based digital identity verification solutions, for an undisclosed sum from majority shareholder Main Capital and the founders. Existing shareholders will reinvest a substantial part of the consideration in Signicat, underlying their strong support of the combination.  Inverid’s flagship solution The acquisition strengthens Si...

Semperis' Purple Knight highlights AD security gaps
Semperis' Purple Knight highlights AD security gaps

Semperis, a provider of AI-powered identity security and cyber resilience, published results from the 2025 Purple Knight Report indicating that organisations continue to struggle to identify and address security vulnerabilities in hybrid identity systems such as Active Directory, Entra ID, and Okta. Notably, the average score of 61 out of 100 is 11 points lower than the average score of 72 in the 2023 report. But users reported an average improvement of 21 points - and as high as 61 points...

View more
  • «
  • 1
  • 2
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec