SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Netwrix expands MSP reach via Pax8 listing
Netwrix expands MSP reach via Pax8 listing

Netwrix, a cybersecurity provider focused on data and identity threats, has made its DSPM solution, Netwrix 1Secure DSPM for MSPs, available on the biggest marketplace for MSPs in the world, the Pax8 Marketplace. The solution is delivered through Netwrix 1Secure, its easy-to-use and fast-to-deploy SaaS security platform. Netwrix’s inclusion in the Pax8 Marketplace enables MSPs to grow their businesses by providing instant access to Netwrix's portfolio of data and identity security produc...

VIPRE expands with Cryoserver & Solar Archive purchase
VIPRE expands with Cryoserver & Solar Archive purchase

VIPRE Security Group (VIPRE), a major global provider of cybersecurity solutions and a Ziff Davis company, today announces the strategic acquisition of Forensic and Compliance Systems (FCS), including its established Cryoserver and Solar Archive brands. This acquisition significantly enhances VIPRE’s email security portfolio, reinforcing its commitment to delivering comprehensive data protection and compliance solutions for businesses and Managed Service Providers (MSPs) globally. FCS Br...

Infosecurity Europe 2025: AI focus and new theatres
Infosecurity Europe 2025: AI focus and new theatres

Infosecurity Europe, the most influential information security event, running from the 3-5 June 2025 at ExCeL has announced the introduction of new theatres as AI will be a key theme of the event, not only as a threat but also as a powerful catalyst for industry change. As artificial intelligence continues to transform both the attack landscape and internal security strategies, Infosecurity Europe 2025 will respond with a sharp focus on realigning priorities across the cybersecur...

The Hacking Games & Immersive: Cyber talent revolution
The Hacking Games & Immersive: Cyber talent revolution

The Hacking Games announces its new partnership with Immersive, the pioneer in people-centric cyber resilience. This collaboration marks a significant step forward in The Hacking Games’ mission to bridge the global cybersecurity labor deficit, currently estimated at over 4.8 million unfilled roles worldwide, to create a generation of ethical hackers to make the world safer. Generation of ethical hackers Immersive joins the Virtu-os community of founding partners, which includes some of...

Ensign's Aletheia wins top cybersecurity award
Ensign's Aletheia wins top cybersecurity award

Ensign InfoSecurity, one of Asia’s largest cybersecurity service providers, has won the “Product Excellence - Cybersecurity Product of the Year” award at the Tech Fest Hong Kong Awards 2025 for its proprietary solution, Aletheia, an AI-powered real-time deepfake detection tool that enhances digital trust and protects organisations against multimedia-based deception.  Developed by Ensign Labs, Aletheia uses multi-modal artificial intelligence to identify manipulated video...

Calero Appoints Eric Martorano CRO & President
Calero Appoints Eric Martorano CRO & President

Calero, the provider of Technology Business Management solutions, announces the appointment of Eric Martorano as Chief Revenue Officer (CRO) and President. In this role, Martorano will lead the company’s global go-to-market strategy and revenue growth operations, supporting Calero’s continued expansion to meet rising demand for its solutions. Eric's leadership qualities  "Eric‘s leadership and proven ability to execute have guided multiple companies to and through perio...

BlueVoyant MDR featured in Forrester Europe report
BlueVoyant MDR featured in Forrester Europe report

BlueVoyant, the pioneer in integrated cyber security, has been recognised among notable providers of Managed Detection and Response (MDR) services in Forrester's latest report, The Managed Detection And Response Services In Europe Landscape, Q2 2025. The report is designed to help security and risk professionals understand the value they can expect from MDR providers in Europe, learn how providers differ, and investigate options based on organisational size and market focus. BlueVoyant grew EM...

NordPass study reveals weak passwords in hospitality
NordPass study reveals weak passwords in hospitality

If checking into a hotel or dining out, people might assume their personal data is safe. But a new study by NordPass, in collaboration with NordStellar, reveals that many hospitality businesses are guarding their digital systems with shockingly weak passwords. From hotel reservation platforms to restaurant point-of-sale systems, the research exposes an industry-wide habit of reusing predictable, outdated, or brand-specific passwords. Entries like “Reservations2022,” “Comf...

MOBOTIX ONE earns SySS certification for cybersecurity
MOBOTIX ONE earns SySS certification for cybersecurity

MOBOTIX receives three new SySS certifications for the MOBOTIX ONE and MOBOTIX 7 platform, and MOBOTIX c71 NurseAssist – powered by Kepler Vision Technologies. This is the first SySS certification for the new MOBOTIX ONE platform and the MOBOTIX c71 NurseAssist, which specialises in the healthcare market. All tests were carried out by the renowned SySS GmbH, a pioneer provider of penetration tests in Germany. MOBOTIX cyber security “For MOBOTIX, cyber security is an integral...

Enhance cyber resilience with Commvault & Red Hat
Enhance cyber resilience with Commvault & Red Hat

Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today announced it is extending its Kubernetes protection to support virtual machines (VMs) running on Red Hat OpenShift Virtualisation. This new capability enhances cyber resilience for organisations moving to modern application environments. Containerised workload adoption Containerised workload adoption is rapidly growing: Gartner predicts 90% of G2000 companies will use container manageme...

Mimer trust: Secure data management for OEMs
Mimer trust: Secure data management for OEMs

Pioneering cybersecurity business, Trustonic, and Pioneering Swedish database company, Mimer, have announced the commercial release of ‘Mimer Trust’. Based on the collaboration initially established in 2022, the Mimer Trust product successfully combines the strengths of Mimer’s Mimer SQL database with Trustonic’s secure platform, Kinibi, to deliver trusted data management for OEMs. Development of Mimer Trust 2.0 Trustonic and Mimer have now officially released Mimer Tr...

Dell's disaggregated data centres: A modern approach
Dell's disaggregated data centres: A modern approach

Dell Technologies helps customers design modern disaggregated data centres with storage, cyber resilience, software and integrated solution innovations. Why it matters Organisations face increasing demands to efficiently manage and secure both modern and traditional workloads across on-premises data centres, cloud and edge environments. IT and business needs keep changing, so the modern data centre must be ready for anything. Dell’s approach to disaggregated infrastructure combines mana...

SoSafe report: Rising cybercrime trends in 2025
SoSafe report: Rising cybercrime trends in 2025

Cybercriminals are increasingly targeting vulnerabilities outside traditional corporate networks, focusing on third-party vendors and employees' personal devices to bypass organisational defences, according to SoSafe's 2025 Cybercrime Trends Report. The comprehensive survey of 500 security professionals across nine countries reveals trends in how attackers are expanding their focus beyond direct corporate targets. Internal network security "Organisations can no longer rely solely on inte...

Google Cloud expands RPP to 30+ EMEA markets
Google Cloud expands RPP to 30+ EMEA markets

Google Cloud has announced an expansion of its Risk Protection Program (RPP) to over 30 EMEA markets - including the UK - and is welcoming new cyber insurance partners - Beazley and Chubb. This update comes at a critical moment for sectors like retail, where the string of recent ransomware attacks could potentially drive a surge in cyber insurance premiums. After a period of falling prices, brokers are now warning of double-digit rate hikes and tougher underwriting across industries - from...

Device Authority automates security with Copilot AI
Device Authority automates security with Copilot AI

Device Authority has introduced a new integration between KeyScaler AI and Microsoft Copilot to help organisations respond faster to threats and reduce the manual workload on stretched security teams. This new capability is designed for users of Microsoft’s productivity suite to accelerate decision-making and improve visibility across large, complex fleets of connected devices, where delays or errors can carry significant operational risk and cost. Advantage of AI-powered insights...

barox's new 10Gb managed PoE switch: KN-LGIPR38-28AD
barox's new 10Gb managed PoE switch: KN-LGIPR38-28AD

barox Kommunikation AG, the manufacturer of professional switches, media converters and IP extenders specifically designed for video applications, has released the new ultra-dynamic KN-LGIPR38-28AD, 24-port, 10Gb Managed Industrial Ethernet PoE+ switch. In addition to employing the usual extensive barox cybersecurity features, the new KN-LGIPR38-28AD includes 90~264VAC and 57VDC power inputs, enabling up to 720W PoE capability, and power redundancy with either two DC, or one DC and one AC power...

CompTIA's new SecOT+ certification for OT security
CompTIA's new SecOT+ certification for OT security

CompTIA, the pioneering provider of vendor-neutral information technology (IT) training and certification products, announced it will begin development of a new certification focused on critical cybersecurity skills in operational technology (OT). CompTIA’s proposed SecOT+ certification will bridge critical knowledge and skill gaps between OT and IT. Security risks in manufacturing The certification will equip OT positions such as floor technicians and industrial engineers The certific...

ImmuniWeb TPRM: Revolutionising third-party risk management
ImmuniWeb TPRM: Revolutionising third-party risk management

According to the 2025 Data Breach Investigations Report (DBIR) by Verizon, the number of data breaches linked to third parties doubled in a single year, attaining a stunning 30% share of all data breaches that occurred last year. Modern-day cybercriminals are militarily rational and pragmatic. They continually probe the defense perimeter of their victims to spot the weakest link – including victim’s suppliers, IT vendors, various consultants, law firms and accountants &nda...

Commvault & Deloitte advance cyber resilience solutions
Commvault & Deloitte advance cyber resilience solutions

Commvault, a pioneer provider of cyber resilience and data protection solutions for the hybrid cloud, announces a strategic alliance with Deloitte. Together, Commvault and Deloitte aim to help organisations stay ahead of evolving threats by becoming more resilient, enabling the enterprise of the future.     In today's digital landscape, there is an urgent need for incident response and comprehensive cyber resilience strategies Increasing danger of cyber threats 43% of US respondents cited ke...

Nexer appoints Head of AI to boost data solutions
Nexer appoints Head of AI to boost data solutions

Digital transformation specialist, Nexer Enterprise Applications, has appointed senior data professional, Gareth Mitchell-Jones, as its head of data & AI for the UK, who will lead the firm’s expanding data practice. Mitchell-Jones will help customers realise greater tangible value from their Microsoft Dynamics 365, Power Platform, and Copilot investments while accelerating the adoption of modern data platforms and generative AI in a fast-evolving business world. Bringing in vast expe...

Ensign InfoSecurity joins MITRE CTID for cybersecurity
Ensign InfoSecurity joins MITRE CTID for cybersecurity

Ensign InfoSecurity, one of Asia’s largest comprehensive cybersecurity services providers, is proud to be featured as a Research Sponsor in the 2024 MITRE Centre for Threat-Informed Defence (CTID) Impact Report, commemorating the centre’s fifth anniversary. The report, available at the website, highlights the collective contributions of organisations worldwide that have supported MITRE CTID’s mission to advance open, threat-informed defence against sophisticated cyber thr...

Trustonic joins RISC-V for hardware security solutions
Trustonic joins RISC-V for hardware security solutions

Pioneering cybersecurity business, Trustonic, has announced its new membership of RISC-V International to provide increased access to hardware-backed security. Established in 2010, RISC-V International is the non-profit home of the open standard RISC-V Instruction Set Architecture (ISA), related specifications, and stakeholder community.  Advanced technology systems RISC-V enables its growing community to develop custom processors for a variety of applications Now boasting more than 4,5...

Reversec: New UK Cyber Security Council member
Reversec: New UK Cyber Security Council member

Reversec, a new name in cybersecurity consulting, has joined the UK Cyber Security Council as its latest Spotlight Member. This prestigious membership underscores Reversec's commitment to advancing cybersecurity standards and fostering a collaborative environment within the cyber community. Reversec will work alongside the Council and its other members to develop and promote nationally recognised standards for cyber security, supporting the NCSC’s strategy to make the UK the safest p...

AITX achieves SOC 2 Type 2 compliance with RAD
AITX achieves SOC 2 Type 2 compliance with RAD

Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, announced that it has successfully completed its SOC 2 Type 2 audit, demonstrating the Company’s continued adherence to high standards of data security, availability, and confidentiality. This achievement confirms the effectiveness of AITX’s internal controls and security protocols across its subsidiaries, further strengthening the Company’s position as a t...

EclecticIQ & TeamT5 combat APAC cyber threats
EclecticIQ & TeamT5 combat APAC cyber threats

Cyber threats are a major concern for all industries, with increased sophistication, and ransomware attacks reaching their highest levels in four years, according to the World Economic Forum's (WEF) Global Cybersecurity Outlook 2025 report. To address this growing problem, EclecticIQ, the pioneering provider of threat intelligence solutions, has announced a strategic partnership with TeamT5, the premier threat intelligence company specialising in advanced persistent threat (APT) research in the...

Immersive AppSec range: Revolutionise cybersecurity training
Immersive AppSec range: Revolutionise cybersecurity training

Immersive, the pioneer in people-centric cybersecurity, announced the launch of AppSec Range Exercises, expanding its AppSec solution beyond hands-on labs to help cyber pioneers and practitioners prove and improve their capabilities as part of a holistic cyber readiness program. The new product offers range exercises for Engineering, AppSec and DevSecOps teams to embed security into workflows, reduce friction, and ignite secure development practices at scale. Modern software development...

ThingsRecon's new supply chain product launch
ThingsRecon's new supply chain product launch

ThingsRecon, an expert in Digital Asset Discovery and Supply Chain Attack Surface Management (EASM), announced the launch of its new supply chain product and a significantly expanded strategic partnership programme. This initiative is designed to empower Managed Security Service Providers (MSSPs), Application Cybersecurity Partners, and cybersecurity consultancies to deliver comprehensive, next-generation security solutions to global enterprise organisations and governments.  Intelligence...

Kaseya Connect 2025: Revolutionising IT security & management
Kaseya Connect 2025: Revolutionising IT security & management

Kaseya, the pioneering provider of AI-powered cybersecurity and IT management software, began its Kaseya Connect 2025 conference in Las Vegas by celebrating its global customer community and unveiling a new set of technology and commercial innovations. Thousands of attendees are connecting and sharing best practices to grow faster, improve service quality, and operate more efficiently – all powered by the company’s flagship AI-powered platform, Kaseya 365. Latest Kaseya 3...

Richter partners with Red Helix for cyber security
Richter partners with Red Helix for cyber security

Richter, a consulting firm specialising in civil, structural and geotechnical engineering, has selected Red Helix, a market pioneer in cyber security and network performance, to strengthen its cyber security. The collaboration has empowered Richter to better manage IT risks, streamline compliance processes and successfully secure major infrastructure projects, including work on the UK’s high-speed rail project, HS2. Cybersecurity and risk management Operating within a globally interconn...

HID Integration Service boosts security efficiency
HID Integration Service boosts security efficiency

HID, pioneer in trusted identity and access management solutions, announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity management. This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators and software vendors to seamlessly and rapidly integrate essential physical security solutions, streamlining processes and enhancing system interoperability. Integration...

View more
  • «
  • 1
  • 2
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec