SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

artius.iD & Pod Foods: AI-powered cybersecurity alliance
artius.iD & Pod Foods: AI-powered cybersecurity alliance

artius.iD announces a strategic partnership with Pod Foods Co (Pod), the pioneer in innovative consumer brand distribution, giving it access to the firm's team of world-class AI and cybersecurity specialists alongside its proprietary decentralised digital identification technology. The move is part of Pod's commitment to safeguard sensitive customer information at every stage and strengthen its digital-first infrastructure. The announcement follows a series of major cyberattacks acros...

MetTel's mobile threat defense solution
MetTel's mobile threat defense solution

MetTel, a pioneer in digital transformation and managed mobility solutions, announces a strategic partnership with Check Point Software Technologies to deliver an advanced mobile threat defence solution for enterprise customers. MetTel’s fully managed Mobile Threat Defense solution, powered by Check Point Harmony Mobile, provides comprehensive protection against mobile cyber threats, ensuring secure access to corporate data without compromising user experience or privacy. Mobile security...

Zimperium spotlights GodFather Android banking Trojan
Zimperium spotlights GodFather Android banking Trojan

Zimperium, the world pioneer in mobile security, reveals new zLabs research detailing an advanced evolution of the GodFather Android banking Trojan that weaponises on-device virtualisation to hijack nearly 500 legitimate mobile applications. The technique allows attackers to run the real app inside a malicious sandbox, capture every tap and credential in real time, and bypass traditional overlay-based defenses. GodFather Android banking Trojan The following are some features of the GodFather...

ISO 27001:2024 certified: Bird Home Automation GmbH
ISO 27001:2024 certified: Bird Home Automation GmbH

Bird Home Automation GmbH has successfully been certified by TÜV Saarland according to the internationally recognised DIN EN ISO/IEC 27001:2024 standard. By completing this comprehensive audit, the company demonstrates that it meets the highest standards in information security and has established an effective Information Security Management System (ISMS). ISO/IEC 27001 is the leading global standard for information security management. It sets the framework for identifying, assessing, and...

Commvault expands cloud & AI solutions strategy
Commvault expands cloud & AI solutions strategy

Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced Alan Atkinson has become the company’s first Chief Business Development Officer. In this new role, he will build strategic next-gen technology and security partnerships, drive co-development initiatives, and create new go-to-market opportunities for Commvault and its partners, all within the Business Development organisation led by Chief Trust Officer Danielle Sheer. &n...

Boost security with Invicti's DAST-first platform
Boost security with Invicti's DAST-first platform

Invicti, the pioneer in dynamic application security testing (DAST), announced the launch of its next-gen Application Security Platform featuring AI-powered scanning capabilities, enhanced DAST performance, and full-spectrum visibility into application risk. The platform enables organisations to detect and fix real vulnerabilities faster and with greater accuracy. DAST-first platform “Your applications are dynamic, shouldn’t your AppSec tools be too?” said Neil Roseman, CEO...

CORE architecture by Corero: Resilience in security
CORE architecture by Corero: Resilience in security

Corero, the distributed denial of service ("DDoS") protection specialists, is pleased to announce the first two customer wins adopting CORE (Corero Observability and Resiliency Ecosystem) architecture – Corero’s next-generation platform designed to unify visibility and defensive action across disparate security infrastructure. First announced on 29 October 2024, the CORE platform initial capabilities include Traffic Analysis (“TA”), Zero Trust Access Control (&...

Matrix surveillance: Certified & secure solutions
Matrix surveillance: Certified & secure solutions

In 2017, 123 police CCTV surveillance cameras in Washington, D.C., were hacked and taken offline — right before a high-profile public event. The issue wasn’t the camera. It was a failure of cybersecurity compliance (Source: BBC). Imagine a scenario where a major supplier loses a multi-crore government contract in India because their CCTV cameras lacked a mandatory RDSO certification for use on moving coaches. Why are certifications necessary In both cases, the cameras worked. But...

Hanwha Vision AI camera: Secure, smart solutions
Hanwha Vision AI camera: Secure, smart solutions

Hanwha Vision, the vision solution provider, launches the AI remote-head camera, featuring a single-body design with support for up to four channels, ideal for a multitude of applications and sites. This advanced multi-sensor solution delivers intelligence and comprehensive monitoring in a compact and discreet form. Covert monitoring and collection An intelligent design developed for a range of uses where a discreet presence is needed, or for the monitoring of more confined spaces, for exampl...

Commvault teams with Bytes to enhance cyber resilience
Commvault teams with Bytes to enhance cyber resilience

Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, has announced a strategic partnership with Bytes, a pioneering provider of IT solutions across the UK and Ireland. This partnership will focus on providing the joint customer base with the tools and services needed to advance their cyber resilience in the UKI.  Service-led sales motion Commvault is doubling down on its ambition in the UKI, with the aim of expanding market share The s...

Device Authority's KeyScaler 2025: IoT security revolution
Device Authority's KeyScaler 2025: IoT security revolution

Global pioneer in automated IoT security and identity management, Device Authority announces the 2025 release of its award-winning KeyScaler and KeyScaler as a Service (KSaaS) platform, which enables a more streamlined experience to simplify and strengthen the lifecycle of organisations’ unmanaged devices as well as new AI-powered capabilities that underpin the entire platform. Attacks such as the recent Eleven11Bot botnet have again highlighted the potential vulnerabilities surrounding u...

Johnson Controls' Metasys 14.1: Cutting-edge BAS
Johnson Controls' Metasys 14.1: Cutting-edge BAS

An upgrade to the Johnson Controls flagship building automation system (BAS), Metasys 14.1 offers a suite of new and enhanced features that answers the need for more comprehensive energy management. The BAS, which combines HVAC, fire, security and lighting systems into one, seamless platform, allows facility managers, IT teams and decision makers to optimise operations, fortify cybersecurity, advance energy and emissions goals, boost productivity and strategically modernise facilities. Buildin...

Unveiling TLS exploit: Keysight leads security innovation
Unveiling TLS exploit: Keysight leads security innovation

Keysight’s Application and Threat Intelligence (ATI) research team has uncovered a novel Transport Layer Security (TLS) handshake exploit that uses protocol-compliant behaviour to evade traditional network defenses. This newly discovered covert channel allows attackers to manipulate TLS handshake packets by simply rearranging parameter settings, without injecting malicious code, making detection by firewalls and intrusion prevention systems nearly impossible. By leveraging the flexible,...

Euralarm advocates for EU e-commerce compliance
Euralarm advocates for EU e-commerce compliance

The rapid growth of e-commerce has transformed global markets and is creating new opportunities. The downside is that e-commerce also introduces significant challenges in consumer safety, market fairness, and regulatory compliance. The European Commission provides a framework for addressing these challenges through a technical approach that ensures a level playing field for all market operators. These actions are part of the Communication on e-Commerce, ‘A Comprehensive EU Toolbox for Sa...

Semperis unveils critical nOAuth vulnerability research
Semperis unveils critical nOAuth vulnerability research

Semperis, a provider of AI-powered identity security and cyber resilience, released new research into nOAuth known vulnerability in Microsoft’s Entra ID that enables full account takeover in vulnerable SaaS apps with minimal attacker effort, posing a severe risk to enterprises relying on cross-tenant Entra integrations. Eric Woodruff, Semperis’ Chief Identity Architect, presented his findings this week at the Troopers 2025 in Heidelberg, Germany. Semperis’ follow-up research...

QwikPay and iDenfy partnership boosts security
QwikPay and iDenfy partnership boosts security

iDenfy, a global pioneer in identity verification and fraud prevention technologies, announces a new partnership with QwikPay, an innovative Australian fintech startup transforming consumers' and merchants' payment experience. With this collaboration, QwikPay has integrated iDenfy’s identity verification and Anti-Money Laundering (AML) solutions to support secure, real-time user onboarding while maintaining compliance with Australia’s financial regulations. QwikPay operates on the...

Entrust's AI-powered identity verification success
Entrust's AI-powered identity verification success

Entrust, a global pioneer in providing identity-centric security solutions, announces it has received the “Midsize US Investment in the UK” award at the prestigious Transatlantic Growth Awards (TAG) 2025, hosted by BritishAmerican Business (BAB). The award, sponsored by HSBC UK, Delta Air Lines and Virgin Atlantic Airways, recognises Entrust’s strategic acquisition of Onfido, a UK-based identity verification provider, and its significant contribution to the UK economy and cybe...

artius.iD CEO warns banks on biometric data breaches
artius.iD CEO warns banks on biometric data breaches

Michael Marcotte, the founder, chairman, and CEO of enterprise-grade digital authentication firm artius.iD, was warned that a successful biometric data breach at a pioneering bank could put them on the brink of the next global financial crisis.   The intervention follows recent comments by the CEO of HSBC UK, Ian Stuart, who last month told UK policymakers the bank is “being attacked all the time” by online criminals, leading to cybersecurity becoming t...

Alibaba Cloud's AI Guardrails boost security
Alibaba Cloud's AI Guardrails boost security

Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, announced a suite of enhanced AI solutions at its European Summit in Paris, reinforcing its dedication to supporting the region’s businesses growth by capturing the emerging AI opportunities.  The expanded offerings, from AI-optimised tools to intelligent industrial solutions, demonstrate Alibaba Cloud’s long-term commitment to delivering cutting-edge cloud technologies that help European customer...

Ipsotek appoints new COO to lead transformation
Ipsotek appoints new COO to lead transformation

Ipsotek, an Eviden business, and a pioneering provider of AI-powered video analytics, has announced the appointment of Ara Babayan as Chief Operating Officer (COO). Babayan brings over two decades of leadership in enterprise transformation, cybersecurity, and complex programme delivery across the financial services and technology sectors. Digital transformation programmes Babayan has led major initiatives at Deutsche Bank, Barclays, UBS, and Kantar, delivering large-scale digital tr...

Hornetsecurity's AI innovations: Email and Teams protection
Hornetsecurity's AI innovations: Email and Teams protection

Hornetsecurity, a pioneering cybersecurity provider, has launched its AI Cyber Assistant that powers two new tools as part of its new 365 Total Protection Plan 4 solution. The new tools are Email Security Analyst, which will ease the workload on IT security teams by automating the review of end-user reports while upskilling end users; and Teams Protection, which will help protect Microsoft Teams users against malicious messages and emerging impersonation attacks by introducing th...

Samsung Galaxy enhanced security updates overview
Samsung Galaxy enhanced security updates overview

As incidents of phone theft continue to rise around the world, Samsung is calling on Galaxy users to activate the latest anti-theft features now available on their devices. These updates reflect Samsung’s commitment to delivering smarter, stronger protection – helping users safeguard their data and stay in control, even in high-risk situations. Additional theft protection Samsung recently started rolling out One UI 7 with security updates to existing features Samsung recently sta...

Zivver-Kiteworks: Leading secure data exchange
Zivver-Kiteworks: Leading secure data exchange

Zivver, Europe’s major provider of secure communications, best known for its AI-powered email security solutions and headquartered in Amsterdam, announced it has been acquired by Kiteworks. Kiteworks enables organisations worldwide to effectively manage risk in every send, share, receive, and use of private data via its Private Data Network (PDN), which protects over 100 million end-users and 1,500 enterprises globally. Kiteworks accelerated its growth trajectory, including international...

Abacus & Entara unite for global IT & security services
Abacus & Entara unite for global IT & security services

Abacus Group, a pioneering IT Managed Services Provider (“MSP”) and Managed Security Services Provider (“MSSP”) to financial services firms globally, announced it has acquired Entara, a Chicago-based IT MSP and MSSP serving financial services and other highly regulated, high-touch industries. This acquisition enhances Abacus Group's global reach and capabilities across cybersecurity, professional services, and digital infrastructure. Combination of Abacus Group and Enta...

ASSA ABLOY ecoLOGIC earns certified energy savings
ASSA ABLOY ecoLOGIC earns certified energy savings

ASSA ABLOY Entrance Systems announced that its AI-powered solution for automatic sliding doors, ecoLOGIC, has earned the Certified Energy Savings Certification from GreenCircle Certified, LLC—a pioneering independent third-party organisation that verifies environmental claims. “By earning our Certified Energy Savings certification, ASSA ABLOY has demonstrated a measurable reduction in energy consumption, aligning with a higher level of environmental responsibility,” said Sara...

Gallagher Security triumphs with high sec C7000 controller
Gallagher Security triumphs with high sec C7000 controller

Gallagher Security is proud to announce that its recently-released High Security Controller 7000 (High Sec C7000) has received two prestigious accolades: a GOVIES Government Security Award for Access Control-Software/Controllers and a Fortress Cybersecurity Award in the Operational Technology (OT) category.  These awards further affirm the High Sec C7000’s position as a best-in-class access control solution engineered to meet the evolving cybersecurity demands of critical infrastruct...

Atos launches cutting-edge SOC in Qatar
Atos launches cutting-edge SOC in Qatar

Atos, a global pioneer in digital transformation and cybersecurity, unveils its cutting-edge Security Operations Center (SOC) in Qatar, expanding its global network of interconnected SOCs. This state-of-the-art facility marks a strategic expansion of Atos’ global cybersecurity footprint, delivering next-generation, AI-driven security solutions augmented by expert human oversight, empowering organisations to proactively detect, respond to and mitigate evolving cyber threats. Security oper...

VIVOTEK's commitment to happy workplaces in security
VIVOTEK's commitment to happy workplaces in security

VIVOTEK, the global pioneering security solution provider, has been recognised for creating a happy workplace, earning the Excellence Award in the “General Services – Large Enterprise” category of Taiwan’s inaugural Happy Enterprise Evaluation. Headquartered in Taiwan with employees across 29 countries, VIVOTEK draws on a global vision to shape the future of security technology. Offering competitive compensation In addition to offering competitive compensation and annu...

Agentic AI malware defense for mobile security
Agentic AI malware defense for mobile security

Appdome, the pioneer in protecting mobile businesses, announces the availability of new dynamic defense plugins to detect and defend against Agentic AI Malware and unauthorised AI Assistants controlling Android & iOS devices and applications. The new Detect Agentic AI Malware plugins allow mobile brands and enterprises to know when Agentic AI applications interact with their mobile applications and use the data to prevent sensitive data leaks and block unvetted on-device AI Agents from acce...

Trends in PACS design by Mercury Security
Trends in PACS design by Mercury Security

Mercury Security, a pioneer in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. Role in PACS design The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics...

View more
  • «
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec