SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

BeyondTrust wins McAfee Security Innovation Alliance Partner of the Year award at MPOWER Cybersecurity Summit 2018
BeyondTrust wins McAfee Security Innovation Alliance Partner of the Year award at MPOWER Cybersecurity Summit 2018

BeyondTrust, the pioneer in privilege-centric security, announced that the company has been named as McAfee’s Security Innovation Alliance (SIA) Partner of the Year winner. This news comes on the heels of last year’s award as Runner Up for McAfee’s SIA Most Innovative Partner of the Year. The award was announced at the McAfee MPOWER Cybersecurity Summit in Las Vegas on October 16. “We’re honoured to be recognised for our continued work with the Security Innovation...

PerpetuityARC Training's Advanced Investigation Techniques course gets IQ Level 5 accreditation
PerpetuityARC Training's Advanced Investigation Techniques course gets IQ Level 5 accreditation

PerpetuityARC Training, part of Linx International Group, is proud to announce that its Advanced Investigation Techniques course has attained IQ Level 5 accreditation. The five-day classroom course provides security and HR professionals, general managers and people working in compliance and audit roles with the knowledge and skills necessary to conduct effective, legally compliant investigations. Advanced Investigation Techniques is ideal for professionals working in the private sector who have...

Acuity organises Quantitative Risk Assessment for Cybersecurity webinar
Acuity organises Quantitative Risk Assessment for Cybersecurity webinar

As cybersecurity has become a boardroom issue, there is an increasing call for the financial exposure from cyber risk to be measured. This enables financial appraisal of cybersecurity investments and informs decisions on cybersecurity insurance. Applying quantitative techniques to cybersecurity has long been considered a complex, if not impossible task due to the large number of factors to consider each with varying degrees of uncertainty and the lack of relevant, contextual data on cyber breac...

Becrypt launches Paradox Edge to help organisations extend the value of cloud adoption to end user devices
Becrypt launches Paradox Edge to help organisations extend the value of cloud adoption to end user devices

Becrypt, a trusted provider of endpoint cybersecurity software solutions, announced the launch of Paradox Edge, a desktop-as-a-service or secure ‘cloud client’ platform that is optimised for accessing cloud services. Paradox Edge is a managed service that enables organisations to extend the value of cloud adoption across the enterprise by reducing the software complexity associated with end user devices. It represents a highly cost-effective and scalable solution to the challenge of...

ProdataKey releases a whitepaper addressing cybersecurity benefits of cloud access solutions
ProdataKey releases a whitepaper addressing cybersecurity benefits of cloud access solutions

ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has released a whitepaper addressing the cybersecurity benefits of cloud-based access control solutions. The confluence of cyber and physical security is driving dealers and integrators, along with their customers, to question the best ways to address security vulnerabilities in the systems they install. Juniper Research estimates that by 2019, the annual cost of cyber-attacks will cost bus...

Rave Mobile Safety shares findings from survey on Emergency Preparedness and Security Trends in Healthcare
Rave Mobile Safety shares findings from survey on Emergency Preparedness and Security Trends in Healthcare

Rave Mobile Safety (Rave), a trusted partner for safety software protecting millions of individuals, released key findings from its 2018 survey, Emergency Preparedness and Security Trends in Healthcare after polling hundreds of healthcare safety leaders across the United States. The survey results, which will be revealed in a webinar on Thursday, October 25, examined the current and most pressing emergency concerns for hospitals and healthcare facilities. Specific building emergencies, such as...

Cyber Security comes to the fore with the unveiling of C•CURE 9000 web-based access management portal
Cyber Security comes to the fore with the unveiling of C•CURE 9000 web-based access management portal

“With C•CURE 9000 at the heart of so many high security solutions, it is not surprising that end-users want to be kept informed on any emerging cyber threats and how we are dealing with them,” said Gordon Morrison, GB Sales Director for the Tyco access control and video brands. “In this respect the well-established Tyco Cyber Protection Program, which we see as part of our long-term' holistic approach to supplying customers with quality solutions, is helping us maintain a...

Pulse Secure recognised among the top four major NAC leaders by Frost & Sullivan
Pulse Secure recognised among the top four major NAC leaders by Frost & Sullivan

Pulse Secure, the provider of Secure Access solutions, announced that analyst firm Frost & Sullivan recognised Pulse Secure among the top four major NAC leaders in the SMB to Large Enterprise segment by market share and among the top three NAC vendors showing the most significant market share gains. The recent Frost & Sullivan ‘2018 Network Access Control (NAC) Market, Global, Forecast to 2022’ report states that network visibility is critical. Every device on a network is a...

Boon Edam launches new high security connection portal - Circlelock Combi
Boon Edam launches new high security connection portal - Circlelock Combi

The Royal Boon Edam International B.V. (Boon Edam) announced the launch of the Circlelock Combi, a half portal that attaches to an existing door – therefore, transforming the entrance into a high security entrance, which is capable of protecting against both unauthorised entry and piggybacking. Renovation and construction costs can escalate quickly, when locking down a highly sensitive area. Now, users can attach the Circlelock Combi easily and quickly, to either the secure or non-secure...

Security Essen 2018 witnessed 950 exhibitors from 43 countries to showcase innovations to over 36,000 visitors
Security Essen 2018 witnessed 950 exhibitors from 43 countries to showcase innovations to over 36,000 visitors

Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables. The representatives of the companies, associations and institutions were in great demand as discussion partners. There...

Axis Communications becomes full member of the national police crime prevention initiative Secured by Design
Axis Communications becomes full member of the national police crime prevention initiative Secured by Design

Axis Communications, the pioneer in network video technology, has been awarded full membership of SBD, part of the Police Crime Prevention Initiatives’ (PCPI) group of crime prevention organisations, which operate in support of the Police Service throughout the UK. Membership was awarded after 15 of Axis’ network video products were accredited for achieving SBD’s Police Preferred Specification (PPS) standards for security. The PPS accreditations include a variety of devices fr...

Hikvision’s IP camera product series achieves Common Criteria certification
Hikvision’s IP camera product series achieves Common Criteria certification

Hikvision, the worldwide supplier of innovative security products and solutions, announced its IP camera product series, DS-2CD3 and DS-2CD5, have achieved the certificate of Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) with assurance type EAL2 augmented with ALC_FLR.2 (EAL2+). It demonstrates Hikvision’s commitment to global customers on reliability and cybersecurity. As one of the most widely recognised international standards (IS...

LEGIC’s reader IC and mobile services power Farpointe’s Conekt mobile access control solution
LEGIC’s reader IC and mobile services power Farpointe’s Conekt mobile access control solution

By leveraging each other‘s technologies as companies sharing the dormakaba banner, LEGIC and Farpointe Data are at the forefront of the new expanding market for secure mobile credentials. LEGIC‘s 6000 series reader ICs and the mobile service LEGIC Connect are at the heart of Farpointe‘s new, award-winning Conekt mobile smartphone access control solution. Farpointe’s first Conekt products are the K-BLE mobile access credentials and K-SMART3 electronic access readers with...

Hikvision announces IP cameras DS-2CD3 and DS-2CD5 passing Certificate of Common Criteria
Hikvision announces IP cameras DS-2CD3 and DS-2CD5 passing Certificate of Common Criteria

Hikvision, the world’s supplier of innovative security products and solutions, announced its IP camera product series, DS-2CD3 and DS-2CD5, have achieved the Certificate of Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) with assurance type EAL2 augmented with ALC_FLR.2 (EAL2+). It demonstrates Hikvision’s commitment to global customers on reliability and cybersecurity. As one of the most widely recognised international standards...

Hanwha Techwin highlights the importance of SD cards in the video surveillance industry
Hanwha Techwin highlights the importance of SD cards in the video surveillance industry

Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, sings the praises of SD cards and provides some useful guidelines on what to look out for when buying them. He said, “SD cards are small and tucked away, but should never be taken for granted. SD cards can make a significant contribution towards end-users achieving maximum benefit from their video surveillance systems. They come in various formats for users to choose from, although the decision will obviously be affe...

Aqua expands security controls to protect against Zero Day vulnerabilities across cloud-native stack
Aqua expands security controls to protect against Zero Day vulnerabilities across cloud-native stack

Aqua Security, the premier platform provider for securing container-based and cloud-native applications, announced version 3.2 of its cloud-native security platform, featuring deep runtime protection capabilities and extended security and compliance controls across the cloud-native stack. Runtime protection against “Zero Days” Sophisticated attacks often exploit unknown vulnerabilities in the application or operating system, also known as “zero days”, to either escalate...

Aqua Security launches Commercial Kubernetes security solution on Google Cloud Platform (GCP) Marketplace
Aqua Security launches Commercial Kubernetes security solution on Google Cloud Platform (GCP) Marketplace

Aqua Security, global provider for securing container-based and cloud-native applications, announced that it is introducing a commercial Kubernetes application to all users of the Google Cloud Platform Marketplace (GCP Marketplace). The new offering provides customers with Aqua’s enterprise-class container security platform available in hourly per-node consumption pricing, making it much simpler to protect applications quickly with no up-front investment. For the first time ever, commercia...

Johnson & Quin announces successful completion of SOC 2 Type 1 standards data security examination
Johnson & Quin announces successful completion of SOC 2 Type 1 standards data security examination

Johnson & Quin, a nationally-trusted provider of edge direct mail production, integrated marketing solutions, data services and high-speed colour inkjet printing, has successfully completed a rigorous examination of its data security processes and procedures, under the SOC 2 Type 1 standards. The SOC 2 examination was administered by the professional IT assurance and compliance staff, at 360 Advanced, a respected national Qualified Security Assessor, HITRUST CSF Assessor and CPA firm, based...

Arecont Vision Costar announces new product portfolio, business plans, and executive leadership team
Arecont Vision Costar announces new product portfolio, business plans, and executive leadership team

Arecont Vision Costar, the industry provider of IP-based megapixel cameras and video surveillance solutions, announced its key product portfolio, business plans, and executive leadership team following the initial launch of the business in July, 2018. The new company is a business unit of Costar Technologies, Inc. (OTC Markets Group: CTSI), a Coppell, Texas-based corporation that designs, develops, manufactures, and distributes a wide range of proven products for the video surveillance and mach...

Hanwha Techwin with a pan-global presence is still Korean at Heart
Hanwha Techwin with a pan-global presence is still Korean at Heart

Despite having a global presence with regional and local support offices in the Americas, Asia, Middle East and across Europe, Hanwha Techwin is very much defined by its Korean heritage. As a global manufacturer of professional video surveillance solutions whose headquarters are in Korea, Hanwha Techwin is proud of the contribution it is making to its country’s reputation for designing, developing and producing quality, innovative products which make a real difference to people’s liv...

LEGIC Connect offers an end-to-end security management system for mobile applications
LEGIC Connect offers an end-to-end security management system for mobile applications

LEGIC’s trusted service Connect enables everyone to securely use mobile services on smart devices – at the touch of a button. Mobile services like mobile access, sharing economy, cashless payment or identification serve new individual or corporate concepts in daily life. Those concepts address the increasing need for efficiency and individuality as well as customer loyalty – all by integrating users via a simple app download. Security against cybercrime LEGIC Connect is a un...

March Networks to exhibit intelligent video surveillance solutions for retail industry and cannabis operators at GSX 2018
March Networks to exhibit intelligent video surveillance solutions for retail industry and cannabis operators at GSX 2018

March Networks, a global provider of advanced video surveillance and video-based business intelligence solutions, is pleased to announce its complete lineup for Global Security Exchange (GSX) 2018. In addition to the company’s industry-leading solutions for financial, retail and transportation organisations, March Networks will showcase its newly launched Software as a Service (SaaS) offering for quick service restaurant (QSR) and convenience store (c-store) franchisees, as well as its se...

Hikvision releases latest range of intrusion alarm solutions that integrate via iVMS to its entire video portfolio
Hikvision releases latest range of intrusion alarm solutions that integrate via iVMS to its entire video portfolio

Hikvision, global provider of innovative security products and solutions, has introduced a new range of intrusion alarm solutions to the security market. Combining Hikvision’s vision and world-class capabilities with over 30 years of Pyronix’ intrusion expertise, the new range of alarm solutions supplies professional installers with innovative and reliable security systems for every requirement. Hikvision intrusion alarm solutions With sleek, stylish and discreet designs, the exten...

OnSSI provides a hardening guide for network video surveillance to protect enterprises from cybersecurity threats
OnSSI provides a hardening guide for network video surveillance to protect enterprises from cybersecurity threats

OnSSI, a provider of advanced Video Management System (VMS) open platform solutions – is offering a free highly-informative guidebook entitled, ‘Hardening Guide for Networked Video Surveillance Systems,’ to help enterprises protect their systems from potential cybersecurity threats. The free downloadable guide provides specific recommendations on hardening video surveillance systems by applying proven cybersecurity initiatives. “Hardening surveillance systems is a necess...

Intelligent Security Systems unveils SecurOS v.10 intelligent VMS with advanced capabilities at GSX 2018
Intelligent Security Systems unveils SecurOS v.10 intelligent VMS with advanced capabilities at GSX 2018

ISS - Intelligent Security Systems, a global provider of intelligent VMS and analytics, announces the latest release of the company’s renowned SecurOS Video Management System at GSX 2018. The new SecurOS v.10 features an updated, highly intuitive GUI designed to accommodate multiple clients and the ability to easily manage large systems with infinite scalability. Additional enhancements include a new web client for remote access, robust cyber security updates, 64-bit edition for faster thr...

Promise Technology to exhibit storage and security surveillance solutions at Security Essen 2018
Promise Technology to exhibit storage and security surveillance solutions at Security Essen 2018

Promise Technology Inc., global storage solutions provider for security surveillance applications, at Security Essen 2018 will debut the Vess A3120 and Vess A6000 Series appliances, just two of the company’s extensive range of innovative video surveillance storage solutions that attendees can see first-hand. Promise’s cutting-edge solutions enable users to overcome challenges such as managing fast-growing video data stores, performance bottleneck and the complexity of project plannin...

Pulse Secure designated as a Distinguished Vendor in ‘2019 TAG Cyber Security Annual’
Pulse Secure designated as a Distinguished Vendor in ‘2019 TAG Cyber Security Annual’

Pulse Secure, the provider of Secure Access solutions, announced its designation as a Distinguished Vendor in this year’s ‘2019 TAG Cyber Security Annual’. Pulse Secure recently became a member of the world’s leading cybersecurity vendors as selected by Dr. Edward Amoroso, CEO of TAG Cyber, and added to this year’s report. Each year TAG Cyber publishes its three-volume report to the IT community for download at no cost. Volume Two of the report also includes an inf...

Kingston to showcase USB Flash drive solutions, enterprise SSDs and Server Premier memory at GSX 2018
Kingston to showcase USB Flash drive solutions, enterprise SSDs and Server Premier memory at GSX 2018

Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., a global provider of memory products and technology solutions, announced it will showcase an array of products at Global Security Exchange (GSX) (booth 2685 Central Hall), the most established trade event for security professionals. The company will display its full line of industry-leading encrypted USB Flash drive solutions, including the IronKey brand purchased in 2016, as well as upcoming high-density bu...

Brivo announces European expansion plans with new subsidiary, Brivo Systems BV
Brivo announces European expansion plans with new subsidiary, Brivo Systems BV

Brivo, global innovator and designer of cloud-based physical security solutions for commercial buildings, announced its expansion into Europe with the opening of its Amsterdam office and the creation of a new subsidiary, Brivo Systems BV. The move highlights the increasing adoption of cloud-based physical security systems and the company’s growing partner and customer base in Europe. With sales, technical, and logistics operations located in Amsterdam, Brivo will now provide a full range o...

Milestone releases best-in-class Husky X-series NVRs with scalable VMS
Milestone releases best-in-class Husky X-series NVRs with scalable VMS

Milestone Systems, open platform company in networked video management software (VMS), is announcing the Milestone Husky X2 and X8 NVR hardware platform with scalable VMS. These products give the Milestone community the possibility to design small or very large business video solutions using the Milestone Husky X-series NVRs as scalable high-performance building blocks. Milestone Husky X-series NVRs   This keeps the total cost of ownership down as less hardware is need for a given installa...

View more
  • «
  • 1
  • 2
  • ...
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec