SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

TIANDY Technologies and SecureNet announce partnership to bolster Middle East operations
TIANDY Technologies and SecureNet announce partnership to bolster Middle East operations

TIANDY Technologies, global supplier of versatile surveillance solutions catering to customers from enterprise to entry level, has announced the execution of a distribution agreement with SecureNet, one of the premier value-added IT Surveillance, cybersecurity and video conferencing distributors (VAD) in the United Arab Emirates. SecureNet will promote TIANDY's complete portfolio of surveillance solutions to its network of channel partners throughout the Middle East region. TIANDY-SecureNet col...

iluminar CEO Eddie Reynolds appointed ambassador for IoT Now Conference to be held on Sep 19, 2018
iluminar CEO Eddie Reynolds appointed ambassador for IoT Now Conference to be held on Sep 19, 2018

iluminar Inc., the specialist manufacturer and supplier of infrared and white light illuminators, is proud to announce that CEO Eddie Reynolds has been selected as an ambassador for the 2018 IoT Now Applications in Connectivity Conference. The seminar will take place Sept. 19, 2018 in the Hyatt Regency Tysons Corner Center, in Tysons, Va. 2108 IoT Now Applications in Connectivity Conference IoT Now will focus on innovations in physical security, cybersecurity, industrial automation, digital tra...

Global Security Exchange 2018 X-Learning Stages to address AI, robotics and wearables
Global Security Exchange 2018 X-Learning Stages to address AI, robotics and wearables

The rapidly evolving security landscape and the technologies poised to disrupt the industry will take centre stage in a reimagined expo hall at Global Security Exchange (GSX), being held Sept 23-27 at the Las Vegas Convention Center. In the first year of its rebrand following a 63-year history as the ASIS International Seminar and Exhibits, GSX is expected to attract more than 20,000 operational and cyber security professionals and 550 exhibitors for the industry’s flagship event. ASIS Int...

Eagle Eye Cloud VMS integrates with Arlo FlexPower Camera System providing wireless surveillance solutions
Eagle Eye Cloud VMS integrates with Arlo FlexPower Camera System providing wireless surveillance solutions

Eagle Eye Networks, the global provider of cloud-based video surveillance solutions, announced a partnership with Arlo Technologies, the pioneer in wire-free surveillance cameras, to combine the Arlo FlexPower Camera System with the Eagle Eye Cloud VMS. This new combined offering provides up to 4 wire-free cameras per Arlo FlexPower Base Station; with as many FlexPower Base Stations as desired connected to Eagle Eye Networks’ commercial grade Bridges or Cloud-Managed Video Recorders (CMVRs...

Fidano announces successful completion of annual SOC 1 Type 2 examination to reaffirm dedication to security compliance
Fidano announces successful completion of annual SOC 1 Type 2 examination to reaffirm dedication to security compliance

Fidano, a software and business solutions provider for the payment processing industry, has successfully completed a rigorous fifth annual examination of its policies and procedures, under the System and Organization Controls (SOC) 1 Type 2 standards, demonstrating its ongoing commitment to data security at all levels of its operations. SOC 1 Type 2 standards examination The demanding third-party examinations that led to the achievement were administered by the professional IT assurance and co...

VIVOTEK to showcase surveillance products and cybersecurity solutions at Security ESSEN 2018
VIVOTEK to showcase surveillance products and cybersecurity solutions at Security ESSEN 2018

VIVOTEK, an IP surveillance provider, announces that it will bring enhanced value to its vertical surveillance solutions at the security fair, Security ESSEN 2018, scheduled to take place September 25 to 28 in Essen, Germany. Located at booth 5F40, VIVOTEK will highlight its latest surveillance products, including deep learning technology, ultra-HD, 180-degree panoramic and 360-degree as well as cybersecurity solutions. VIVOTEK will highlight 4 key developments at Security ESSEN 2018, including...

Cyber Security Conference takes centre stage at Security Essen 2018
Cyber Security Conference takes centre stage at Security Essen 2018

From 25 to 28 September 2018, Security Essen at Messe Essen will be the meeting place for the international security and fire protection industry. According to the current Cyber Security Report of the consulting company Deloitte, 83 percent of the surveyed companies report at least one attack per month on their company. In half of these companies there is even a daily alarm - with a total annual damage sum of around 13 billion euros. That's why Security Essen is setting standards with a targeted...

360 Vision’s Predator Radar camera reaches the final round of Security Essen ‘Security Innovation Awards 2018’
360 Vision’s Predator Radar camera reaches the final round of Security Essen ‘Security Innovation Awards 2018’

360 Vision Technology, the UK’s pioneer CCTV manufacturing company, has announced that it is just one of thirteen worldwide security companies to have reached the final round of this year’s Security Essen ‘Security Innovation Awards 2018.’ Out of a total of 75 entries in the categories of Technology & Products and Cyber Security/Economic Security, the Security Innovation Awards’ jury have selected entries including 360 Vision’s Predator Radar camera to be...

Ping Identity's PingIntelligence provides AI-Driven API security against cyber attacks
Ping Identity's PingIntelligence provides AI-Driven API security against cyber attacks

Ping Identity, the provider of Identity Defined Security, announced the general availability of PingIntelligence for APIs, following its acquisition of Elastic Beam. The AI-powered solution is part of the Ping identity platform and brings an increased level of intelligence into how APIs are accessed and used to protect API infrastructures from cyberattacks, while also delivering deep insight into API activities. “APIs are proliferating throughout all organisations faster than security tea...

Ava Group to showcase fibre optic intrusion detection and biometric and card access control solutions at GSX 2018
Ava Group to showcase fibre optic intrusion detection and biometric and card access control solutions at GSX 2018

Ava Group (AVA), a market pioneer in security risk management technology is pleased to announce it will be exhibiting at GSX, booth 3830. Global Security Exchange (GSX), formerly the Annual Seminar and Exhibits and powered by ASIS claims to be the most comprehensive security event in the world. The event is focused on networking and education with a range of in-show features and a comprehensive conference schedule all taking place at the Las Vegas Convention Center. Ava Group will be presenting...

IPS announces release of REI ANDRE Deluxe Near-Field Detection Receiver
IPS announces release of REI ANDRE Deluxe Near-Field Detection Receiver

International Procurement Services (IPS) announces the release of the Research Electronics International (REI) ANDRE Deluxe Near-Field Detection Receiver which offers higher frequency detection range, ultrasonic detection, new software and a new antenna which extends the frequency detection range to 12 GHz. ANDRE Deluxe Near-Field Detection Receiver The ANDRE detects signal activity and displays a histogram of signal strength over time The ANDRE detects signal activity and displays a histogram...

Promise Technology unveils VTrak D5000 Series Unified Storage System
Promise Technology unveils VTrak D5000 Series Unified Storage System

Global storage solutions provider Promise Technology Inc. has announced the release of VTrak D5000 Series Unified Storage System that delivers uncompromising scalability, flexibility and affordability for the mid-tier IT applications while simultaneously minimising the total cost of ownership. Promise VTrak D5000 The Promise VTrak D5000 features an integrated combination of high-performance hardware, adaptive storage software, flexible protocols and application-dependent front and backend conn...

Dojo by BullGuard and BGN Technologies form strategic alliance to develop advanced IoT security technology
Dojo by BullGuard and BGN Technologies form strategic alliance to develop advanced IoT security technology

Dojo by BullGuard, global supplier of IoT security solutions, and BGN Technologies, the technology transfer company of Ben-Gurion University of the Negev (BGU) has announced a partnership to develop advanced technologies for automated IoT threat detection, utilising artificial intelligence (AI) and highly advanced machine learning algorithms. Researchers from Cyber@BGU, the cyber research lab at BGU, global source for cybersecurity research and development, and Dojo by BullGuard will join forces...

Defendify launches all-in-one web-based cybersecurity platform for small businesses
Defendify launches all-in-one web-based cybersecurity platform for small businesses

Cybersecurity can seem complicated and expensive, especially for Small Businesses. It leaves most owners and managers wondering where they stand against the growing attacks they read about daily and not knowing how they can protect themselves. Defendify changes all that. The new, web-based platform—a SaaS model—is designed and built exclusively for companies with 500 or fewer employees. It’s an all-in-one solution that’s easy to implement and affordable yet comprehensive...

Ping Identity publishes industry trends and findings from CISO Advisory Council meeting
Ping Identity publishes industry trends and findings from CISO Advisory Council meeting

Ping Identity, the pioneer in Identity Defined Security, announced findings from its most recent CISO Advisory Council meeting. The Council is aimed at better understanding the challenges and opportunities impacting the modern CISO. Members have access to strategic guidance and support as they develop and grow their enterprise-wide security initiatives. This includes leveraging valuable insights and best practices related to infosecurity, privacy and compliance. Members of the 2018 council repr...

Seagate Technology’s research data reveals UK SMBs are struggling to manage company data effectively
Seagate Technology’s research data reveals UK SMBs are struggling to manage company data effectively

Seagate Technology plc, a pioneer in data storage solutions, reveals new research into the data habits of the UK’s small and medium-sized businesses (SMBs), suggesting that many British companies are finding it hard to store and manage their company’s data effectively. The research polled a representative sample of 1,006 UK SMB employees, asking them about their employers’ data storage practices, preparedness for GDPR, cybersecurity policies, and how often they delete outdated...

Cyber-physical security event, ISC East collaborate with Infosecurity North America & USE
Cyber-physical security event, ISC East collaborate with Infosecurity North America & USE

ISC East, sponsored by the Security Industry Association (SIA), the Northeast's premier security industry convention for new products, solutions and technologies, announced its co-locating with Infosecurity North America and Unmanned Security Expo (USE). This move provides security professionals with even more opportunities to yield the benefits of robust educational sessions, listen to high-level speakers, explore new products and services, network with fellow security industry members and more...

Lifeboat Distribution announces distribution agreement with Promise Technology
Lifeboat Distribution announces distribution agreement with Promise Technology

Lifeboat Distribution, a subsidiary of Wayside Technology Group, Inc. and international value-added distributor for virtualisation, security, business continuity and emerging technologies, has announced a distribution agreement with Promise Technology. Lifeboat will sell the entire Promise Technology portfolio, which ranges from easy-to-use consumer-based storage devices to battle-tested enterprise class solutions. The Promise Atlas product that will now be distributed exclusively through Lifeb...

Genetec showcases Security Center, Mission Control and Clearance business intelligence solutions at GSX 2018
Genetec showcases Security Center, Mission Control and Clearance business intelligence solutions at GSX 2018

At GSX 2018 on booth # 2951, Genetec Inc. (‘Genetec’), a technology provider of unified security, public safety, operations, and business intelligence solutions, will demonstrate how true unification enables organisations to deploy a single platform that enhances situational awareness, streamlines and simplifies the operator experience, and reduces total cost of ownership. Specifically, Genetec will showcase the latest version of Security Center -- the company’s unified platfo...

BrainChip unveils the Akida Development Environment for Neuromorphic System-on-Chip
BrainChip unveils the Akida Development Environment for Neuromorphic System-on-Chip

BrainChip Holdings Limited, the neuromorphic computing company, has announced the availability of the Akida Development Environment. The Akida Development Environment is a machine learning framework for the creation, training and testing of spiking neural networks (SNNs), supporting the development of systems for edge and enterprise products on the company’s Akida Neuromorphic System-on-Chip (NSoC). Akida is the flagship product in BrainChip’s mission to become the leading neuromorp...

Promise Technology announces release of Atlas S8+ 8-Bay Desktop Storage Unit
Promise Technology announces release of Atlas S8+ 8-Bay Desktop Storage Unit

Global storage solutions provider, Promise Technology Inc. has announced the immediate availability of the new Atlas S8+, an 8-bay desktop appliance that combines enterprise-class features with a simple-to-use interface. The Atlas S8+ is ideal for creative professionals and small groups involved with hi-resolution video editing and production workflows who don’t want to sacrifice performance for affordability. IT managers will appreciate the ease of setup, speed and rich features. Atlas S...

Vanderbilt showcases integrated security solutions at IFSEC London
Vanderbilt showcases integrated security solutions at IFSEC London

The three-day IFSEC International Conference and Expo was a sight to see as more than 27,000 attendees from around the globe descended on London's ExCeL to attend the event. Central to the show was the exhibit hall, where manufacturers across the industry demonstrated the products, services, and solutions designed to keep people safe and add more intelligence to comprehensive security plans. In a time where threats are becoming more diverse and complex, caused in part by rapidly developing tech...

Mircochip first to use Turstonic revolutionary Kinibi-M platform for microcontrollers
Mircochip first to use Turstonic revolutionary Kinibi-M platform for microcontrollers

Analyst forecasts of the number of connected devices deployed over the next decade range into the hundreds of billions. With the vast potential value that IoT brings, also comes a growing concern that those billions of devices and the data they process remain under-protected, posing a serious security threat. Trustonic is pleased to announce that it is enabling the world’s premier microcontroller (MCU) supplier, Microchip Technology Inc., to provide their customers with a secure platform a...

Argentina selects HID Global to deliver new electronic cover for its passport
Argentina selects HID Global to deliver new electronic cover for its passport

HID Global, global provider of trusted identity solutions, has announced that the government of Argentina has selected HID Global to upgrade its ICAO electronic passport to a newer generation that will reduce costs, improve security and enhance the reliability of data reading at border control points. Enhanced data security and vetting   The Argentine government is transitioning its electronic booklet from a printed antenna to a new copper wire antenna, which is more reliable, having a s...

ExtraHop Reveal(x) Summer 2018 update sets the bar for network traffic analytics at the enterprise level
ExtraHop Reveal(x) Summer 2018 update sets the bar for network traffic analytics at the enterprise level

ExtraHop announces Reveal(x) Summer 2018, setting the bar for Network Traffic Analytics at enterprise scale. This release includes capabilities designed to modernise enterprise security operations with critical asset behaviour analysis that instantly surfaces the highest-risk threats, even those hiding within encrypted traffic. With this high-fidelity insight, security operations teams can zero in on critical threat patterns and investigate down to the root cause in seconds, not days. Between 2...

The Chertoff Group appoints Robert Anderson to tackle information and cyber security challenges
The Chertoff Group appoints Robert Anderson to tackle information and cyber security challenges

The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, today announced the appointment of Robert Anderson as a principal in its Strategic Advisory Services practice. As a recognized expert in cybersecurity, incident response, cyber hacking, counterintelligence and economic espionage, Anderson will advise C-suite clients on strategies to help them grow, manage security risks and protect their commercial businesses. &n...

Exploring capabilities of artificial intelligence in security solutions at the East -West International Security Conference
Exploring capabilities of artificial intelligence in security solutions at the East -West International Security Conference

Attending the 37th East -West International Security Conference organised by Capricorn Conferences and Exhibitions on 4th and 5th June 2018 at the Lisbon Marriott Hotel, Portugal, were delegates representing private and public sector organisations from the Russian Federation and Ukraine. Addressing the delegates at the opening ceremony, conference Co-Chairman, Patrick Somerville QPM, welcomed the delegates to the conference for an intensive two days of presentations and discussions on a wide ra...

Layer 8 signs VCW Security as UK distribution partner for cyber security training solutions
Layer 8 signs VCW Security as UK distribution partner for cyber security training solutions

Layer 8, a leading provider of experiential cyber security training solutions, has appointed VCW Security as UK distribution partner. As one of the UK’s leading distributors of IT security solutions and services, this partnership will enable VCW to expand its portfolio of innovative cyber security solutions. This will allow resellers to provide customers with an additional layer of protection against security breaches by employees that are not fully aware of all potential cyber threats. C...

NRF and University of Florida survey states that retail ‘shrink’ decreased to $46.8 billion in 2017
NRF and University of Florida survey states that retail ‘shrink’ decreased to $46.8 billion in 2017

Thefts, fraud and losses from other retail ‘shrink’ decreased to $46.8 billion in 2017 from $48.9 billion the year before as shoplifting and organised retail crime continued to be the leading causes, according to the annual National Retail Security Survey released today by the National Retail Federation and the University of Florida. “Retailers are making progress in combating criminal activity, but there are still many challenges,” NRF Vice President of Loss Prevention...

SIA commends Departments of Commerce and Homeland Security on botnet report
SIA commends Departments of Commerce and Homeland Security on botnet report

On May 30, 2018, the U.S. Departments of Commerce and Homeland Security released an action-oriented report on how the private sector and government can collaborate to mitigate against the threat of botnets and automated distributed attacks. The Security Industry Association (SIA) commends the extensive efforts of these two departments to develop this report, and SIA supports the primary goals described within the report, titled Report to the Present on Enhancing the Resilience of the Internet a...

View more
  • «
  • 1
  • 2
  • ...
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec