SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

MOBOTIX receives CNPP certification for its video surveillance cameras
MOBOTIX receives CNPP certification for its video surveillance cameras

MOBOTIX is the first manufacturer in Europe to obtain French 'CNPP certified' product certification for its video surveillance cameras, offering a guarantee of IT and electronic 'resistance' to cyber-attacks. “This recognition is proof of quality, performance, and also of the trust of our customers at a time when digital security is becoming a key issue for all stakeholders,” says Patrice Ferrant, Regional Sales Manager France, MOBOTIX. MOBOTIX announced its intention to focus more...

ASSA ABLOY's CLIQ web manager provides ample of customisation options for its users
ASSA ABLOY's CLIQ web manager provides ample of customisation options for its users

One can customise the way they want to run their own CLIQ® access control installation. The CLIQ® Web Manager makes it easy to program, reprogram or audit every CLIQ® key, cylinder, padlock or updater. And because the interface is accessible from anywhere with a Web connection, via secure login over https:// and multifactor authentication if required, one can manage access whenever and wherever they choose. ASSA ABLOY’s intuitive CLIQ® Web Manager boosts one's efficiency....

Keysight introduces its automotive cybersecurity program to address the concern of cyber-attacks
Keysight introduces its automotive cybersecurity program to address the concern of cyber-attacks

Keysight, the test and measurement vendor introduces its new Automotive Cybersecurity Program that delivers a broad cybersecurity portfolio, including hardware, software and services, to address the growing concern of cyber-attacks on connected vehicles. The cyber world is increasingly impacting the safe operation of automobiles, opening the risks of exposure, including malicious hacker activities. The new reality is that cyber-attacks against automobiles could result in the loss of human life....

Ping Identity unveils private cloud identity solution, PingCloud Private Tenant for the enterprise
Ping Identity unveils private cloud identity solution, PingCloud Private Tenant for the enterprise

Ping Identity, globally renowned provider of identity defined security solutions, has announced the release of PingCloud Private Tenant, a private cloud identity solution for the enterprise. Cloud identity, access management PingCloud Private Tenant provides cloud identity and access management (IAM) by combining highly-configurable capabilities within a dedicated environment. Enterprises can provide authentication for all users with a highly-configurable global authentication authority that...

Digital Defense partners with UTSA to provide students and faculty with Frontline.Cloud platform
Digital Defense partners with UTSA to provide students and faculty with Frontline.Cloud platform

Digital Defense, Inc. and The University of Texas at San Antonio (UTSA) Department of Computer Science jointly announced a partnership that will provide students and faculty with access to an award-winning cloud-based information security platform to further enrich the students’ cybersecurity education. UTSA students and faculty will be able to utilise Digital Defense’s flagship Frontline.Cloud platform to evaluate the security posture of applications, systems and networks in classr...

ThreatQuotient announces partnership with Ectacom, Nihon Cornet and StarLink
ThreatQuotient announces partnership with Ectacom, Nihon Cornet and StarLink

ThreatQuotient™, a security operations platform innovator, announces new partnerships with global distributors Ectacom, Nihon Cornet and StarLink. Following international expansions into Central Europe and Australia in 2018, ThreatQuotient’s latest value added distributor (VAD) agreements leverage an extensive network of channel partners and solution providers to broaden the reach of their security operations platform across the Middle East, Asia-Pacific, Japan and China. Additional...

Johnson Controls announces Tyco cloud to encourage its users to use cloud services
Johnson Controls announces Tyco cloud to encourage its users to use cloud services

Johnson Controls announces Tyco Cloud, a new cloud-based security suite developed to help customers move costly and complex security infrastructure for access control and video surveillance to the cloud. With Tyco Cloud, organisations can reduce costs, improve enterprise security management and scale security operations on demand, providing unlimited possibilities to deliver security services over the internet. Accelerating digital transformation Tyco Cloud empowers this digital transformatio...

42Crunch announces release of API security platform with enhanced tools for developers
42Crunch announces release of API security platform with enhanced tools for developers

42Crunch, creator of the industry’s first API Firewall, has announced the latest release of its API security platform with enhanced tools for developers to easily define security in OpenAPI contracts, enabling an agile DevSecOps experience, and providing full visibility into each individual API’s security landscape. API security API security is complex and becomes a bottleneck when not implemented properly. Adopting a shift-left approach will allow enterprises to ensure security th...

Ajax Systems announces partnership with UK-based security distributor, Oprema
Ajax Systems announces partnership with UK-based security distributor, Oprema

Ajax Systems, globally renowned manufacturer of innovative security solutions, announces a partnership with Oprema, renowned and rapidly growing independent security distributor in the UK. Oprema’s customers now have access to a full range of Ajax wireless products for complete protection of residential and commercial properties from intrusion, fire, and leaks. Remote access management Ajax users can remotely manage their systems, control appliances, and check the CCTV streams via mobil...

Everbridge acquires NC4 to create threat assessment and incident communications and management platform
Everbridge acquires NC4 to create threat assessment and incident communications and management platform

Everbridge, Inc., the global provider of critical event management (CEM) and enterprise safety software applications to help keep people safe and businesses running, announced the acquisition of NC4, a global provider of threat intelligence solutions that empower businesses, government organisations, and communities to assess and disseminate risk data and information to manage and mitigate the impact of critical events. The combination of NC4’s real-time threat intelligence and analyst te...

ETSI report highlights IoT devices and technologies for emergency communications
ETSI report highlights IoT devices and technologies for emergency communications

Since the Internet has matured, society has become more interconnected, as have the devices used to enhance everyday lives. This has led to the emergence of the so-called "Internet of Things" (IoT), in which autonomous devices as well as people are now interconnected in and across private, public, and industrial spaces. IoT technologies IoT technologies are invading all application domains including services relevant to emergency situations IoT technologies are invading all application domain...

ExtraHop issues security advisory for third-party vendors ‘phoning home’ proprietary data of their customers
ExtraHop issues security advisory for third-party vendors ‘phoning home’ proprietary data of their customers

ExtraHop, globally renowned cloud-first detection and response solutions provider for hybrid enterprises, has issued a security advisory exposing several cases of third-party vendors ‘phoning home’ proprietary data without the knowledge of or authorisation from their customers. The advisory serves as a warning to all enterprises to hold their vendors more accountable for how they use customer data. Phoning home proprietary data The newly-issued advisory defines phoning home as a ho...

Imperva integrates its API Security with Red Hat 3scale API Management
Imperva integrates its API Security with Red Hat 3scale API Management

Most enterprises today deploy a multitude of touchpoints where consumers can interact and access the information they require. For many organisations, APIs (Application Programming Interfaces) are the bread-and-butter for enabling inter-enterprise process automation, IoT devices and mobile applications. Even though they are working behind the scenes, APIs are ubiquitous. They help to deliver sports updates, post online messages, order food – enabling everything online. To stay competitive...

Zero trust access security provider, Pulse Secure has now become a member of MSPAlliance
Zero trust access security provider, Pulse Secure has now become a member of MSPAlliance

Pulse Secure, global provider of software-defined Secure Access solutions to both enterprises and service providers, has announced that it has become a member of the MSPAlliance, the oldest managed services group and the only accrediting and standards based body created specifically for the managed services provider industry. Secure Access services Recognising the push towards utility computing and an expectation for workforce mobility, multi-cloud performance and Zero Trust defenses, organisa...

DDoS attack bandwidths double in Europe in Q2 2019 compared to a year ago; Link11 report
DDoS attack bandwidths double in Europe in Q2 2019 compared to a year ago; Link11 report

DDoS attacks are easily capable of overloading many companies’ broadband connections. There are several DDoS-for-hire services offering attacks between 10 and 100 Gbps for a modest fee. Currently, one DDoS provider is offering free DDoS attacks of up to 200 Mbps bandwidth for a duration of five minutes. The maximum attack volumes seen by Link11 between April and June 2019 also increased by 25% year-on-year, to 195Gbps from 156Gbps in Q2 2018. In addition, 19 more high-volume attacks with...

Carbon Black releases white paper proposing updated cybersecurity kill chain model to aid defenders avert evolving cyberattacks
Carbon Black releases white paper proposing updated cybersecurity kill chain model to aid defenders avert evolving cyberattacks

Carbon Black, globally renowned cloud-native endpoint protection solutions provider, has released a white paper that proposes an updated cybersecurity kill chain model to help defenders stay ahead of evolving cyberattacks. Cybersecurity kill chain model The paper titled, ‘Cognitions of a Cybercriminal: Introducing the Cognitive Attack Loop and the 3 Phases of Cybercriminal Behaviour’, delves into the various ways cybercriminals have evolved in recent years and offers specific guide...

Cloud-based network detection and response firm, ExtraHop hires Bill Ruckelshaus as its new Chief Financial Officer (CFO)
Cloud-based network detection and response firm, ExtraHop hires Bill Ruckelshaus as its new Chief Financial Officer (CFO)

ExtraHop, global provider of cloud-first network detection and response solutions, has announced the appointment of experienced technology and software industry veteran Bill Ruckelshaus as its Chief Financial Officer (CFO). Ruckelshaus joins the company as it accelerates with more than 10x growth in cybersecurity and rapid expansion of its cloud product portfolio. He will hold a position on the ExtraHop executive leadership team, reporting to ExtraHop CEO Arif Kareem. Cybersecurity expert Ruc...

Aqua Security announces public release of runtime protection for Pivotal Cloud Foundry (PCF)
Aqua Security announces public release of runtime protection for Pivotal Cloud Foundry (PCF)

Expansion of the Aqua-Pivotal collaboration delivers comprehensive security for application development and production environments on PCF. Aqua Security, global platform provider for securing container-based and cloud native applications, has announced the public release of Aqua Security’s runtime protection for Pivotal Cloud Foundry (PCF). Users of Pivotal’s platform can download and install the Aqua Security for PCF service from Pivotal Services Marketplace, and deploy an end-to-...

Eaton adds 4G capabilities to its SecureConnect system for better connectivity over mobile networks
Eaton adds 4G capabilities to its SecureConnect system for better connectivity over mobile networks

Eaton’s SecureConnect™, a smart security management system for residential and commercial buildings, now has 4G capabilities. This secure plug-on module is a cloud communicator which enables a control unit to connect to the cloud using both 4G and 2G technology over mobile networks. Configuring the 4G cloud communicator as a back up to the panels Ethernet connection allows for dual path communications, ensuring that there is no loss of connection through power cuts or poor internet...

International Society of Automation unveils first founding members of Global Cybersecurity Alliance
International Society of Automation unveils first founding members of Global Cybersecurity Alliance

The International Society of Automation (ISA) has announced the first founding members of its new Global Cybersecurity Alliance (GCA) - Schneider Electric, Rockwell Automation, Honeywell, Johnson Controls, Claroty, and Nozomi Networks. Global Cybersecurity Alliance ISA created the Global Cybersecurity Alliance to advance cybersecurity readiness and awareness in manufacturing and critical infrastructure facilities and processes. The Alliance brings end-user companies, automation and control sys...

Pivot3 announces release of Virtual Security Operations Center (Virtual SOC) for real-time secure access and control for mission-critical video surveillance
Pivot3 announces release of Virtual Security Operations Center (Virtual SOC) for real-time secure access and control for mission-critical video surveillance

Pivot3, global provider of intelligent infrastructure solutions, has announced the Virtual Security Operations Center (Virtual SOC), designed to address the need for security teams to access client workstations running video surveillance and other related systems in multiple locations without using expensive, dedicated client workstation hardware. Virtual Security Operations Center With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities With...

Check Point announces three new security gateway appliances with up to 64 networking interfaces
Check Point announces three new security gateway appliances with up to 64 networking interfaces

Check Point announces three new security gateway appliance models: 16000 Base, 16000 Plus and the record breaking 26000 Turbo are extensions of Check Point’s new 16000 and 26000 gateway range which were introduced in June, presenting a complete line of high-end appliances with up to 64 networking interfaces, 16x 100 GbE (Gigabit Ethernet) or 40 GbE. Powered by the Check Point Infinity architecture, the 16000 and 26000 Security Gateways incorporate Check Point’s ThreatCloud and award...

Skybox Security report states cloud container vulnerabilities have soared in recent times
Skybox Security report states cloud container vulnerabilities have soared in recent times

Skybox Security releases mid-year update to its 2019 Vulnerability and Threat Trends Report, analysing what’s shaping the threat landscape so far this year. Report Highlights from 2019 H1 Vulnerabilities in cloud containers have increased by 46 percent compared to the same period in 2018 and by 240 percent compared to 2017 Less than one percent of newly published vulnerabilities were exploited in the wild, with nine percent having any functioning exploit developed at all 2019 has add...

DHS Acting Secretary Kevin McAleenan signs agreements with ISA’s Nadav Argaman to address key issues
DHS Acting Secretary Kevin McAleenan signs agreements with ISA’s Nadav Argaman to address key issues

On Monday, July 22, Acting Secretary of Homeland Security Kevin K. McAleenan hosted the Director of the Israeli Security Agency (ISA), Nadav Argaman, for a bilateral engagement to discuss the threats that the U.S. and Israel both face and the shared mission of their respective departments. Addressing key priorities for agencies During their meetings, Acting Secretary McAleenan and ISA Director Argaman signed cooperation agreements spanning across a multitude of fronts that will address key pri...

Johnson Controls enriches mission-critical functionality with v5.4 of victor VMS and VideoEdge NVRs
Johnson Controls enriches mission-critical functionality with v5.4 of victor VMS and VideoEdge NVRs

Johnson Controls announces the release of the newest version of Tyco victor video management and VideoEdge NVR systems designed to provide users with mission-critical, enterprise-level solutions, while also furthering the solution’s cyber position and evolving the unification between victor/VideoEdge and Tyco Software House C•CURE 9000 security and event management platform. The release of version 5.4 offers dynamic features to flexibly support hundreds of cameras, empower facial bio...

Radware’s DefenseSSL system features behavioural-based algorithms to prevent HTTPS flood attacks
Radware’s DefenseSSL system features behavioural-based algorithms to prevent HTTPS flood attacks

Radware® a provider of cyber security and application delivery solutions, announces that its SSL DDoS attack protection, DefenseSSL®, now features behavioural-based algorithms for keyless protection against HTTPS flood attacks. For the first time, organisations have the scale needed to effectively mitigate HTTPS floods. According to Google, the majority of internet traffic is now encrypted and accounts for more than 70% of internet pages. While SSL/TLS encryption is critical for many as...

Niagara Networks and L7 Defense partners to bring Zero Trust security to API communication
Niagara Networks and L7 Defense partners to bring Zero Trust security to API communication

Niagara Networks, the Open Visibility Platform pioneer, and L7 Defense, a cutting-edge cyber security vendor, announces that they have formed a partnership to bring Zero Trust security to API communication running across an organisation’s network. The L7 Defense application runs directly on Niagara Networks Open Visibility Platform which provides it full access to network traffic. The Open Visibility Platform offers enterprises, for the first time, on-demand deep cyber defense into their...

Milestone’s XProtect Corporate 2019 R2 VMS obtains GDPR-ready certification from EuroPriSe
Milestone’s XProtect Corporate 2019 R2 VMS obtains GDPR-ready certification from EuroPriSe

Milestone XProtect Corporate 2019 R2 is the first major video management software product to obtain a complete GDPR-ready certification from EuroPriSe. XProtect Corporate 2019 R2 is the first major video management software product to obtain the highly sought-after EuroPriSe (European Privacy Seal) GDPR-ready certification. With the GDPR-ready certification from the independent and recognised institute EuroPriSe, end-users can be confident that they have the right foundation to build a GDPR com...

Ontic Technologies offer proactive protection that leverages deep analytics and intelligence to secure enterprises
Ontic Technologies offer proactive protection that leverages deep analytics and intelligence to secure enterprises

Ontic Technologies, the globally renowned provider of protective intelligence security software, delivers technology to empower security teams, in order to protect assets, employees and customers. In the modern world, organisations and their employees, clients, customers, and their physical assets may come under some kind of threat or attack, at any time. Protection that leverages deep analytics Investments in physical and other security systems have already been made, to protect these critica...

National Security Inspectorate (NSI) announces securing accreditation by the United Kingdom Accreditation Service for BS EN ISO 45001:2018
National Security Inspectorate (NSI) announces securing accreditation by the United Kingdom Accreditation Service for BS EN ISO 45001:2018

The National Security Inspectorate (NSI), the UK’s global independent certification body specialising in the security and fire safety sector, is delighted to announce it has been granted accreditation by the United Kingdom Accreditation Service (UKAS) for BS EN ISO 45001:2018 - the world’s first International Standard for occupational health and safety (OH&S), replacing the British Standard OHSAS 18001. Workplace health and safety Health and safety in the workplace are of param...

View more
  • «
  • 1
  • 2
  • ...
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec