SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Bugcrowd MSP offering for efficient compliance pentests
Bugcrowd MSP offering for efficient compliance pentests

Bugcrowd, a pioneer in crowdsourced cybersecurity, announced the availability of its new Managed Service Provider (MSP) offering. This service is designed to help MSPs efficiently address the backlog of compliance-related pentests.  By providing a standardised and scalable solution, with streamlined scoping, Bugcrowd's MSP offering empowers small to midsize businesses to meet their compliance requirements without delay. Bugcrowd's mission for MSPs The service leverages the unique and ext...

Synechron introduces CyberAI security solutions
Synechron introduces CyberAI security solutions

Synechron, a pioneering digital transformation consulting firm, announced the launch of Synechron CyberAI accelerators program. This suite of four AI-driven solutions enhances enterprise security, streamlines compliance, and reduces risk exposure through automation and intelligence. Synechron’s 14th accelerator program RiskControl.AI: Automates IT risk management, offering real-time control assessments and compliance insights.  AppSec.AI: Provides a unified view o...

Omny's growth: Kenneth Titlestad leads commercial strategy
Omny's growth: Kenneth Titlestad leads commercial strategy

Omny looks forward to welcoming Kenneth Titlestad as its new Chief Commercial Officer, effective 1 April 2025. Transitioning from his role at Sopra Steria, where he was instrumental in building the company’s Operational Technology (OT) cybersecurity competence, Kenneth will now spearhead Omny’s commercial strategy, reporting to the CEO and part of the Omny management team. Prior roles of Kenneth Kenneth’s career in OT cybersecurity took root in Equinor, where he leveraged h...

ThreatAware boosts cybersecurity with platform update
ThreatAware boosts cybersecurity with platform update

ThreatAware, the pioneering Cyber Asset Attack Surface Management (CAASM) provider, announced the launch of the new version of its cutting-edge platform designed to transform how organisations discover devices and manage their IT assets and security tools. Version 3.0 now enables the remediation of security issues discovered and uncovers previously unknown devices. ThreatAware’s platform ThreatAware’s platform provides a complete view of the IT infrastructure from a single screen...

Cequence achieves AWS security competency status
Cequence achieves AWS security competency status

Cequence Security, a pioneer in API security and bot management, announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Cyber Security category. This designation highlights Cequence's proven ability to meet AWS’s rigorous standards for delivering cutting-edge cybersecurity solutions to AWS customers. The AWS Security Competency directly aligns common customer use cases to AWS Partner capabilities, accelerating positive security outcomes. Cequence AWS S...

ImmuniWeb community edition: Free security tests 2025
ImmuniWeb community edition: Free security tests 2025

ImmuniWeb Community Edition is a set of free online security tests that have performed over 380 million of successful security tests and scans since 2019. Publicly accessible data from the Community Edition is also utilised in the upcoming 2025 Data Breach Investigations Report by Verizon. In 2025, each day over 100,000 scans are run, testing web, mobile and cloud security, as well as detect phishing campaigns and data leaks on the Dark Web. Cyber threat exposure ImmuniWeb offers a foundation...

Johnson Controls security solutions for healthcare
Johnson Controls security solutions for healthcare

Johnson Controls, the pioneer for smart, healthy and sustainable buildings, is reinforcing its commitment to providing comprehensive life safety solutions across industries by unveiling solutions designed specifically for the non-acute healthcare and correctional facilities industries. The company’s non-acute bundled solution combines advanced security and fire prevention technologies to help modernise healthcare facilities, improve safety and enhance overall patient and staff experience....

HID integration platform: Streamline physical security
HID integration platform: Streamline physical security

HID, pioneer in trusted identity and access management solutions, announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity management. This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators and software vendors to seamlessly and rapidly integrate essential physical security solutions, streamlining processes and enhancing system interoperability. Physical securit...

Enhanced Cyber Risk Insights with Cowbell Connectors
Enhanced Cyber Risk Insights with Cowbell Connectors

Cowbell, a pioneer provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses. It has expanded its Cowbell Connectors to over 30 integrations with top security and cloud service providers.  Stronger security insights Cowbell Connectors enhance cyber risk assessment and underwriting by drawing on inside-out dataWhile many businesses focus solely on outside-in or partial internal data, Cowbell Connectors enhance cyber risk assessment and underwri...

David Charney joins Everon as Video Monitoring VP
David Charney joins Everon as Video Monitoring VP

Everon, a pioneer security integrator and premier provider of commercial security, fire and life safety solutions in the U.S. Announced that David Charney has joined the team as Sr. Vice President, Video Command Center. Expert in security tech With nearly 20 years of industry experience, Charney has established himself as a pioneer of innovation in cutting edge spaces. He has held key executive roles, including President, Chief Operating Officer, and most recently Chief Customer Officer for...

Boost efficiency with Smart Security collaboration
Boost efficiency with Smart Security collaboration

Effective collaboration between security operators, teams, and other departments is essential for the smooth functioning of any organisation.  However, as organisations grow in complexity, it becomes increasingly challenging for teams to coordinate. Factors such as staffing shortages, high turnover rates, and outdated collaboration tools exacerbate these challenges. Streamlining security operations These solutions enhance communication, boosts productivity, and improves overall operation...

Kollmorgen SFD-M: Absolute multi-turn positioning
Kollmorgen SFD-M: Absolute multi-turn positioning

Kollmorgen servo motors are now available with our fourth-generation SFD-M smart feedback device. Offered at no additional cost over Kollmorgen’s earlier SFD models, this encoder offers four times greater positioning accuracy and uses energy-harvesting technology to track absolute multi-turn positioning even when the system is powered off. Revolutionising motion feedback SFD-M allows machine builders to achieve high-resolution multi-turn feedbackKollmorgen, a global pioneer in motion co...

Cequence unveils PCI DSS 4.0 threat insights
Cequence unveils PCI DSS 4.0 threat insights

Cequence Security, a pioneer in API security and bot management, unveiled new insights from its CQ Prime threat research team that reveal a surge in cyber threats as businesses race to comply with the March 31 PCI DSS 4.0 deadline. The research underscores the escalating risks of API-driven fraud, credential stuffing, and payment system abuse, particularly in retail and financial services. Drawing on billions of real transactions and attack data from Cequence’s Unified API Prote...

AI-native mobile protection with Appdome no-code
AI-native mobile protection with Appdome no-code

Appdome, the pioneer in protecting mobile businesses, revealed it has been recognized as the market pioneer and high performer in four (4) additional categories for Spring 2025 on G2. The world’s largest and most trusted software marketplace. The four new pioneer categories include Bot Detection & Mitigation, No-Code Dev Platforms, Rapid App Development and Best Relationship for RASP. Standard in security Appdome strengthens its position in mobile app defence, building on its recogn...

Pinnacle access control at ISC West 2025
Pinnacle access control at ISC West 2025

Sielox, the established industry pioneer in layered access control and crisis event management solutions, is demonstrating its latest security innovations at ISC West 2025 at stand 11109.  Sielox is showcasing its flagship Pinnacle Access Control Platform that features hundreds of user-selectable filters, enabling security teams to aggregate and manage access data and events with unprecedented insights and visibility. Future of access control Sielox is showcasing its vision Pinnacle's in...

Experience SAFR's Unified Facial Recognition at ISC 2025
Experience SAFR's Unified Facial Recognition at ISC 2025

SAFR from RealNetworks, the world’s foremost AI computer vision platform for access control and security, invites ISC West 2025 attendees to experience its revolutionary suite of AI-powered solutions at booth #25089.  SAFR's facial recognition technology delivers unparalleled certainty through industry-pioneer accuracy, enabling organisations to monitor and analyse visual data at speeds far beyond human capabilities—all while maintaining the highest standards of data privacy an...

Sabio group expands Disrupt CX Programme UK 2025
Sabio group expands Disrupt CX Programme UK 2025

Sabio Group announced the expansion of its acclaimed ‘Disrupt’ programme across Europe for 2025, taking its digital customer experience (CX) transformation event to three major European cities. The expansion of its flagship event comes at a critical time for the CX industry, with artificial intelligence rapidly evolving, cost of living pressures continuing, and volatile energy prices creating significant challenges for contact centres and frontline customer service staff. Expanding...

Hanwha Vision: Boosting cybersecurity in video surveillance
Hanwha Vision: Boosting cybersecurity in video surveillance

Robust cybersecurity is essential for all organisations. Yet there is a significant gap in how prepared security and IT managers believe they are for a cyber-attack, and the steps their organisations are taking to mitigate threats. Research from Hanwha Vision Europe shows that while overall confidence in video surveillance systems’ security is high, many organisations fall short on fundamental cybersecurity measures. List of practical actions and training tips Over 1,150 IT and sec...

Secure Schools launches cyber score tool
Secure Schools launches cyber score tool

Secure Schools has launched cyber score, a groundbreaking, free-to-use tool designed to help schools measure, benchmark, and improve their cybersecurity posture. Cyber score is designed to help schools benchmark, improve, and better protect against common cybersecurity threats by answering simple one-click statements to calculate their cyber score, built around pioneering cybersecurity standards. Cybersecurity challenges in education Cyber score addresses these challenges by offering a s...

iDenfy's security triumph: G2 recognition achieved
iDenfy's security triumph: G2 recognition achieved

iDenfy, a Lithuania-based RegTech solution provider best known for its fraud prevention tools, announced a new milestone established by recognition from G2.  A pioneer B2B review platform, which has named iDenfy as one of the Best Software Products of 2025. This marks iDenfy’s debut on the top 100 list, with the company securing 44th place in the Financial Services Products category and 48th place in the Data Privacy Products section. Trusted security solutions G2’s rankings...

Cyber resilience with NTT DATA and Rubrik
Cyber resilience with NTT DATA and Rubrik

As ransomware attacks continue to impact organisations across all industries, there is a clear need for cyber resilience to ensure critical data and systems are protected and can be recovered quickly, while keeping businesses running. NTT DATA, a digital business and IT services pioneer, and Rubrik, a cybersecurity company, announce a partnership for cyber resilience. Requirements for cyber resilience As part of its expanded global strategic partnership, NTT DATA will offer advisory and consu...

Colt quantum-secured encryption network trial success
Colt quantum-secured encryption network trial success

Colt Technology Services (Colt), the global digital infrastructure company, announced the successful completion of a groundbreaking quantum-secured encryption trial across its optical wave network.  Colt collaborated with a number of technology partners for the trial including Adtran, Ciena, ID Quantique (IDQ), Nokia and Toshiba, with a view to Colt offering a suite of services for global businesses to prepare for a quantum-secured future. Secured encryption solutions Quantum-secured enc...

Holiseum joins Integrity360 for OT & IoT innovation
Holiseum joins Integrity360 for OT & IoT innovation

Continuing its global expansion plan Integrity360 has acquired pioneer cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed.  The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe and significantly provide a new and exciting services practice focused on Operational Technology (“OT”) and Internet of Things (“IoT”) technologies which complement Integrity360&rsquo...

AlgoSec's record growth in cybersecurity industry
AlgoSec's record growth in cybersecurity industry

AlgoSec, a cybersecurity pioneer, announced a double-digit year-on-year annual recurring revenue growth and a gross dollar retention of over 90%. The company has consistently generated positive cash flow and remained debt-free since it was founded in 2004. The company also saw an increase in multiple industry verticals, including Finance, Government, Telecommunications, Healthcare, Retail, Utilities and Transportation. AlgoSec’s strong market position AlgoSec has the highest number of e...

ODVA 30th anniversary: Advancing EtherNet/IP technology
ODVA 30th anniversary: Advancing EtherNet/IP technology

ODVA celebrated its 30th anniversary at its 23rd Annual Meeting of Members in Clearwater, Florida, USA on March 20, 2025. Since ODVA’s founding in 1995, the core Common Industrial Protocol (CIP) technology has evolved significantly and serves as the backbone of the pioneering EtherNet/IP automation network. The Annual Meeting was attended by over 100 industry pioneers from almost 40 companies and included keynotes from Pedro Umbelino, Principal Research Scientist, Bitsight Technologies on...

Motorola Solutions enhances San Luis Police System
Motorola Solutions enhances San Luis Police System

The province of San Luis in Argentina is implementing a Motorola Solutions mission-critical radio communications system for its Provincial Police. The Tetra system will expand coverage and enable new capabilities for first responders to help protect communities across the province. Unified for faster response “This new Tetra system represents a decisive step forward in our commitment to enhancing community safety and security," said Javier Salomón, director of technology and secu...

Delta's cyber-physical integration at NVIDIA GTC 2025
Delta's cyber-physical integration at NVIDIA GTC 2025

Delta, a pioneer in power management and a provider of IoT-based smart green solutions, is ushering a new era of smart manufacturing at NVIDIA GTC 2025 by showcasing its superior cyber-physical integration capabilities and its close collaboration with NVIDIA through an AI-based Smart Manufacturing Demo Line. The demonstration illustrates high-fidelity cyber-physical integration for essential processes in next-generation smart factories. Advanced digital twin technology Andy Liu, Gen...

US lawmakers revisit rural water utilities' cyber security defences
US lawmakers revisit rural water utilities' cyber security defences

U.S. Senator Catherine Cortez Masto (D-Nev.) re-introduced two bipartisan bills to support rural water systems. The Rural Water System Disaster Preparedness and Assistance Act, co-led by Senator Cindy Hyde-Smith (R-Miss.), would help rural water and wastewater utilities prepare and become more resilient in the face of natural disasters and other extreme weather events. The Cybersecurity for Rural Water Systems Act Cybersecurity for Rural Water Systems Act would update technical assistance opp...

Anywhere365 integrates Microsoft Teams Phone Extensibility
Anywhere365 integrates Microsoft Teams Phone Extensibility

Anywhere365, a global provider of cloud-based contact centre and dialogue management solutions, has announced that through its long-term relationship with Microsoft, it will be introducing Microsoft’s latest offering, Teams Phone Extensibility for Dialogue Cloud. Microsoft Teams Phone Extensibility New integration between the two solutions will empower customers with advanced call automation Microsoft Teams Phone Extensibility for Dialogue Cloud enables the Anywhere365 Contact Centre pl...

IST's Keccak-based accelerator boosts cryptographic speed
IST's Keccak-based accelerator boosts cryptographic speed

IDEMIA Secure Transactions (IST) announced an advanced post-quantum accelerator based on Keccak, a core function widely used in new cryptographic algorithms. Post-quantum algorithms are highly demanding on computational resources to ensure robust security.  Securing Against Quantum Threats This approach is essential to ensure secure, seamless and efficient data protection against the rising threatsBy utilising hardware accelerators, intensive tasks can be offloaded from the main processo...

View more
  • «
  • 1
  • 2
  • ...
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec