SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Arecont Vision collaborates with Paladin Sales Group to promote CCTV surveillance solutions
Arecont Vision collaborates with Paladin Sales Group to promote CCTV surveillance solutions

Arecont Vision, a global provider of IP-based megapixel camera technology, welcomes Paladin Sales Group as members of the company’s Manufacturer’s Representative Partner program. The Paladin Sales Group team will complement the Arecont Vision sales team in the Northeast United States, by supporting end users, systems integrators, and distributors. “Rich Paladino has built an outstanding team who provide expert sales advice, support, and training for their portfolio of advanced...

Senstar introduces Fabien Haubert as Vice President Sales of EMEA Region
Senstar introduces Fabien Haubert as Vice President Sales of EMEA Region

Senstar is pleased to introduce Fabien Haubert as Vice President, Sales – EMEA Region. Mr. Haubert, based in Paris, France, has assumed direct responsibility for Senstar’s European offices in Broadway, UK; Hanau, Germany; and Ravensburg, Germany; as well as for operations in the Middle East. He is tasked with leading Senstar’s strategic growth plan for the EMEA region. “I am extremely excited to join the Senstar team. Senstar’s global track record in perimeter intr...

Pelco showcases advanced video surveillance security solutions at Security & Counter Terror Expo 2018
Pelco showcases advanced video surveillance security solutions at Security & Counter Terror Expo 2018

Pelco by Schneider Electric, a global provider of surveillance and security, will demonstrate how its advanced solutions and services address new threats and challenges facing cities at the Security & Counter Terror Expo (SCTX) in London on 6-7 March in Stand J50. “Today’s complex security challenges require data-driven surveillance that delivers actionable insights to operators and law enforcement, using secure methods and networks,” said Tony Burns, Regional Sales Direct...

Pulse Secure achieves Common Criteria Certification for network access control and VPN solutions
Pulse Secure achieves Common Criteria Certification for network access control and VPN solutions

Pulse Secure, a provider of secure access solutions for people, devices, things and services, has announced a cyber security industry first by achieving Common Criteria certification for both its network access control (NAC) and virtual private network (VPN) solutions under NIAP’s most current collaborative protection profile for network devices. The integrated approach increases cyber security assurance for pre-connect and post-connect endpoint visibility, compliance and threat mitigatio...

AMAG Technology hosts annual Security Engineering Symposium 2018
AMAG Technology hosts annual Security Engineering Symposium 2018

AMAG Technology hosted its annual Security Engineering Symposium in Newport Beach, California, February 23-26, 2018 at the Balboa Bay Resort. Nearly 70 end users, integrators and consultants attended the highly interactive networking event. Threat Analysis AMAG Technology President, Kurt Takahashi and Vice President-Global Sales and Business Development, Jody Ross kicked off the conference with opening remarks and introductions of honored guests and AMAG staff. Chief Operating Officer, Howard...

Hikvision's US Cybersecurity Road Show 2018 shares risk mitigation best practices
Hikvision's US Cybersecurity Road Show 2018 shares risk mitigation best practices

Hikvision USA, a provider of artificial intelligence, machine learning, robotics and other emerging technologies, and manufacturer of video surveillance products and solutions, announced that its US Cybersecurity Road Show will kick off Tuesday, March 27, 2018 in Los Angeles, and travel to select US cities over the next several months. Led by Chuck Davis, Hikvision’s director of cybersecurity for North America, ‘Cybersecurity Myths and Facts: Presented by Hikvision’ road shows...

Synology’s RackStation RS3618xs network attached storage server enhances business data security
Synology’s RackStation RS3618xs network attached storage server enhances business data security

Synology has launched RackStation RS3618xs, a 12-bay rackmount NAS providing excellent performance, effortless capacity scaling and optimised virtualisation solutions for expanding businesses. RS3618xs is a 2U RackStation NAS powered by an Intel Xeon D-1521 quad-core CPU and 8GB DDR4 ECC UDIMM RAM, expandable up to 64GB. The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs through the PCIe 3.0 slot, providing over 3,900 MBps throughput and 143,500...

IFSEC Global confirms stellar judging panel for ‘Top influencers in Security and Fire 2018'
IFSEC Global confirms stellar judging panel for ‘Top influencers in Security and Fire 2018'

IFSEC Global has announced that Microsoft CSO Mike Howard, security consultant Don Randall MBE and Baroness Neville-Jones, chair of the British Joint Intelligence Committee (JIC), star on a 30-strong judging panel for its ‘Top influencers in Security and Fire 2018.’ Lead judge Grant Lecky, co-founder of the Security Partners Forum, drew on his extensive contacts network to appoint a diverse line-up of judges. He said: “Many of these judges were appointed based on strong recomm...

Cyber:Secured Forum 2018 reveales cybersecurity educational summit agenda to focus on integrated systems
Cyber:Secured Forum 2018 reveales cybersecurity educational summit agenda to focus on integrated systems

Registration is open for Cyber:Secured Forum, a cybersecurity educational summit focusing on integrated systems, in Denver, Colorado, on June 4-6, 2018. The event is being produced in partnership by PSA Security Network, the world’s largest systems integrator cooperative, ISC Security Events (Reed Exhibitions, the world’s leading event organiser) and the Security Industry Association (SIA), a trade association for global security solution providers. Key discussion topics In additio...

Transport Security and Safety Expo 2018 to focus on cybsersecurity for critical transportation infrastructure
Transport Security and Safety Expo 2018 to focus on cybsersecurity for critical transportation infrastructure

One of the keys to averting cyber-attacks on critical transportation infrastructure, such as 2016’s ransomware attack on San Francisco’s transit network, lies in industry-wide collaboration, according to security experts working for some of North America’s most well-known transit organisations. Transport Security World canvassed the opinion of executives, all of whom agreed that working together could put the brakes on attacks that can bring transportation to its knees. Among...

NEC conducts cybercrime investigation training at INTERPOL’s Digital Security Challenge
NEC conducts cybercrime investigation training at INTERPOL’s Digital Security Challenge

NEC Corporation announced contributions to INTERPOL’s Digital Security Challenge (DSC) cybercrime investigation event held in Vienna, Austria, from February 19 to 21, 2018. This event was conducted for police of INTERPOL member countries to increase their cybercrime investigation capabilities. This was the third time the event was held, following sessions in Singapore in 2016 and 2017. On this occasion, participants from 27 countries across Europe, Asia, Africa, Middle East and South Ame...

Arecont Vision and Badger Reps collaborate to promote cyber-secure megapixel surveillance cameras
Arecont Vision and Badger Reps collaborate to promote cyber-secure megapixel surveillance cameras

Arecont Vision, an IP-based megapixel camera technology provider, has announced that the Badger Reps firm has joined the company’s Manufacturer’s Representative Partner program. Badger Reps will enhance the Arecont Vision sales team in the US West region in providing expert pre-sales assistance to end users, systems integrators, and distributors. “Cliff Hamilton’s team at Badger Reps are proven advisors to their many customers, providing superior customer service, best-i...

BeyondTrust's 'Privileged Attack Vectors' book shares organisational cybersecurity best practices
BeyondTrust's 'Privileged Attack Vectors' book shares organisational cybersecurity best practices

BeyondTrust, the cyber security company dedicated to preventing privilege misuse and stopping unauthorised access, has announced the availability of a new book, Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations. The book, authored by BeyondTrust’s Chief Technology Officer, Morey Haber, and Chief Operating Officer, Brad Hibbert, and published by Apress, details the risks associated with poor privilege management, the techniques that hackers and...

WinMagic SecureDoc key management service integrates with LogicDS SWIMAGE OS migration solution
WinMagic SecureDoc key management service integrates with LogicDS SWIMAGE OS migration solution

WinMagic, an encryption and intelligent key management security solution provider, and LogicDS, which offers SWIMAGE—the only true, commercial off the shelf end-to-end automated operating system (OS) migration and deployment solution—announce that they are partnering to jointly offer WinMagic’s SecureDoc encryption and key management with the SWIMAGE OS migration and imaging solution. This jointly-deployed solution will significantly reduce the headaches and security concerns o...

Three Counties Defence and Security Expo 2018 to focus on cybersecurity and UAV surveillance
Three Counties Defence and Security Expo 2018 to focus on cybersecurity and UAV surveillance

Following the success of the first Hereford Defence and Security Expo in 2017, Harrison Clark Rickerbys, one of the UK’s Top 100 law firms, is organising a second major defence and security expo, the Three Counties Defence and Security Expo (3CDSE) 2018, which will be held at the Three Counties Showground, Malvern on 31st May 2018. The event, which will be of interest to those involved in private and public safety and security, crime prevention and those serving in the police forces as we...

Axis Communications' survey forsees wide IP video surveillance installations for transport security
Axis Communications' survey forsees wide IP video surveillance installations for transport security

More than 85% of transport networks across Western Europe are planning to install IP cameras in the near future. That’s according to a recent survey commissioned by Axis Communications, the market leader in network video and audio technology, in partnership with the global public transport organisation - The Union Internationale des Transports Publics (UITP). Globally, the transport industry has led the way in using network video for both security and commercial applications. IP video sur...

Bosch and Genetec provide video surveillance data security solutions to fight cybercrime
Bosch and Genetec provide video surveillance data security solutions to fight cybercrime

Cybercrime – one of the world’s biggest crimes goes nearly unnoticed. The Internet of Things makes mobility, businesses and industries more connected, but it also leaves them more vulnerable to cybercrime. Online hacking has become so widespread that, by 2021, it is estimated that the cost of cybercrime damages will be $6 trillion annually. All it takes for a hacker is finding a single weak link, from the outside or more commonly inside, in a surveillance network to gain access to,...

Sir Michael Fallon to host Counter Terror Awards at Security and Counter Terror Expo 2018
Sir Michael Fallon to host Counter Terror Awards at Security and Counter Terror Expo 2018

The organisers of Security and Counter Terror Expo 2018 have announced that Sir Michael Fallon MP, former Secretary of State for Defence and member of the National Security Council, will host the inaugural Counter Terror Awards during the event. The awards ceremony will take place at Olympia, London on 6 March 2018, with an audience of European security leaders, including senior counter terror police officers, and heads of security from both the private and public sectors. The Counter Terror Aw...

ADT Cybersecurity and Arrow Electronics enhance managed detection and response solutions
ADT Cybersecurity and Arrow Electronics enhance managed detection and response solutions

ADT, a provider of monitored security and interactive home and business automation solutions in the United States and Canada, announced it has teamed with Arrow Electronics to further expand its distribution arm for its ADT Cybersecurity solutions. ADT Cybersecurity was formed in November 2017 with the acquisition of DATASHIELD and is focused on delivering managed detection and response (MDR) services to commercial and enterprise businesses nationwide. Arrow Electronics is a global provider of...

Determining who is responsible for securing IoT from cyber threats and attacks
Determining who is responsible for securing IoT from cyber threats and attacks

By now, you've probably heard the conversation about the importance of the Internet of Things (IoT) security over and over again; the increased interconnectivity and communication between devices brings with it a greater risk for cyber threats and attacks. One small leak or breach on a single device can potentially spread across the cloud and create a noteworthy disruption within a company, affecting its assets, employees and customers. Responsibility for IoT security But now that the risk fac...

Eaton and Underwriters Laboratories collaborate to enhance cybersecurity in power management
Eaton and Underwriters Laboratories collaborate to enhance cybersecurity in power management

Power management company Eaton has announced it is collaborating with global safety science organisation UL to advance cybersecurity for power management technologies across industries. The collaboration is helping to establish measurable cybersecurity criteria for network-connected power management products and systems. In addition, Eaton’s cybersecurity research and testing facility in Pittsburgh is the first lab approved to participate in UL’s Data Acceptance Program for cybersecu...

Scram Software launches ScramFS for cloud data security
Scram Software launches ScramFS for cloud data security

Scram Software, an award-winning cyber-security software development company, has announced that ScramFS – an internationally peer-reviewed encryption system for safeguarding cloud data – is now available to UK SMEs, government and not-for-profit organisations, enabling fast and easy encryption of sensitive data to reduce breaches and assist GDPR compliance.  “Unfortunately, the world is experiencing an epidemic of data breaches. As both a business owner and a citizen I b...

World Counter Terror Congress 2018 highlights international security best practices
World Counter Terror Congress 2018 highlights international security best practices

Leading security figures from across the globe, including representatives from the United Nations, Europol, NATO, European Commission and the National Police Chiefs Council, will travel to London this March to discuss counter terrorism strategy, operations and best practice at the annual World Counter Terror Congress. The two-day conference, taking place from 6-7 March at Olympia, London, will see speakers and delegates debate the terror threats facing nations today and discuss future policy fo...

NW Security launches GDPR Readiness tool for testing compliance preparedness
NW Security launches GDPR Readiness tool for testing compliance preparedness

NW Security Group, a provider of IP video solutions and security consultancy, has launched a free General Data Protection Regulation (GDPR) Readiness checklist tool to help businesses quickly and easily determine if they’re adequately preparing for the new legislation. Due to come into effect on 25th May 2018, the EU GDPR aims to ensure the protection of Personally Identifiable Information (PII), however, according to recent figures over 50% of companies across the UK will not be ready fo...

VIVOTEK launches H.265 flagship cameras for cyber security protection and superior night vision
VIVOTEK launches H.265 flagship cameras for cyber security protection and superior night vision

VIVOTEK, the global leading IP surveillance provider, reveals five new flagship H.265/HEVC cameras to add to its H.265 product line. The release includes three 2-megapixel fixed dome cameras, FD9165-HT, FD9365-HTV and FD9365-EHTV and two 2-megapixel bullet cameras, IB9365-EHT and IB9365-HT (all available by the end of March*). The series of cameras are embedded Trend Micro’s anti-intrusion software, empowering them to automatically detect and prevent credential-based attack as well as bloc...

Axis launches device management tool for network protection and cybersecurity control
Axis launches device management tool for network protection and cybersecurity control

Axis Communications has announced the release of AXIS Device Manager, a comprehensive on-premise device management tool that offers an easy, cost-effective and secure way to manage all major installation and operational device management tasks. Moreover, in a world where security threats are becoming more common, AXIS Device Manager facilitates proactive device and network protection. It is suitable for managing up to a couple thousand Axis network cameras, access control and audio devices on on...

Agent Vi honours leading members of partner programme with Annual Channel Partner Awards
Agent Vi honours leading members of partner programme with Annual Channel Partner Awards

For the sixth year running, Agent Video Intelligence (Agent Vi) is honouring leading members of its Channel Partner Programme with Channel Partner Awards, presenting seven partners with special accolades for their exceptional partnership and efforts during 2017 in their respective regions. This year, for the first time, a new category has been added, recognising outstanding partners offering Central Monitoring services. SONDA is to be commended for exceptional professionalism in delivering a la...

Genetec to showcase Security Center and Citigraf with other business analytics solutions at ISC West 2018
Genetec to showcase Security Center and Citigraf with other business analytics solutions at ISC West 2018

Genetec, a technology provider of unified security, public safety, operations, and business intelligence solutions, has announced its plans for ISC West 2018 (booth #26065, Sands Convention Center, Las Vegas, NV). The company will feature the latest version of Security Center, its flagship unified security platform, and demonstrate Citigraf, its new decision support system for comprehensive response coordination. Genetec Citigraf is designed to help reduce response time to crimes and provide in...

Ward Security receives Cyber Essentials Accreditation
Ward Security receives Cyber Essentials Accreditation

Ward Security has achieved Cyber Essentials accreditation following an independent assessment of its IT network and systems. The quality mark which was created by the National Cyber Security Centre is a national government standard that demonstrates the company’s ongoing commitment to cyber security and to maintaining the highest possible standards for its clients. The importance of gaining the accreditation not only demonstrates that Ward Security continues to strive to be the best secur...

Appthority MTP integrates with Google for mobile threat defense solution and managed Google Play
Appthority MTP integrates with Google for mobile threat defense solution and managed Google Play

Appthority, the global provder of enterprise mobile threat protection, announced the product of close collaboration with Google to offer seamless integration of its mobile threat defense solution and managed Google Play. The new integrated solution enables enterprises to use Appthority Mobile Threat Protection (MTP) to easily ensure compliance with security, privacy and regulatory policies for apps deployed through managed Google Play on Android. Enterprises can now set policy and enable Apptho...

View more
  • «
  • 1
  • 2
  • ...
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec