SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Gallagher's UK webinar series boosts security design
Gallagher's UK webinar series boosts security design

Award-winning global security manufacturer, Gallagher Security is proving its commitment to empowering its UK and European Channel Partners with the launch of its new Channel Partner webinar programme.  This latest initiative from Gallagher provides certified Channel Partners and their teams access to a series of Gallagher-led Security Design Training sessions. End-to-end Gallagher solution Gallagher has partnered with CPD UK to launch a webinar program offering a scheduled series of CPD...

Lord Reid joins Sirius Insight for security growth
Lord Reid joins Sirius Insight for security growth

Sirius Insight announces that the Rt Hon Lord Reid of Cardowan has joined the company’s Advisory Board. In this role, Lord Reid will support Sirius Insight as the business seeks opportunities in international markets to deploy its transformative maritime domain awareness technology. Range of security-related portfolios Lord Reid was a Member of Parliament for over twenty years, during which time he served in Government Lord Reid was a Member of Parliament for over twenty years, during...

AI in crime prevention: Insights from Future Crime Summit 2025
AI in crime prevention: Insights from Future Crime Summit 2025

Last week in New Delhi, the Future Crime Summit 2025, India's largest gathering on cyber innovations and synthetic threats, brought together over 1,000 experts, law enforcement officials, and defence pioneers to discuss the growing challenges posed by cybercrime and the latest AI-driven solutions. Key topics included AI-enabled attacks, ransomware, crypto fraud, blockchain vulnerabilities, and the risks of quantum computing. The founder of the Future Crime event, Professor Dr. Triveni Singh, al...

Netwrix enhances cybersecurity with new access control
Netwrix enhances cybersecurity with new access control

Netwrix, a vendor specialising in cybersecurity solutions focused on data and identity threats, released the new component of Netwrix Privilege Secure, which simplifies secure remote access for distributed workforces and third-party vendors. The new add-on reduces the attack surface by eliminating traditional VPN dependencies through granular, identity-based access control. It enables employees to access critical systems securely from any location, grants just-in-time privileges to reduce risks...

AI-powered monitoring with RADCam version 15
AI-powered monitoring with RADCam version 15

Artificial Intelligence Technology Solutions, Inc., along with its subsidiary Robotic Assistance Devices Residential, Inc. (RAD-R), announced that home security will soon take a major leap forward.  RADCam™ Version 15 brings smarter AI-driven monitoring, real-time package protection, and an interactive concierge that makes the home more secure and responsive. Future of proactive security Traditional security cameras simply record events, leaving them to react after the fact. R...

Global encryption & AI compliance forum 2025
Global encryption & AI compliance forum 2025

ACI’s 15th Forum on Global Encryption, AI, Cloud & Cyber Export Controls takes place on March 26–27, 2025, in San Francisco and via livestream. The 2025 program will include an enhanced focus on how to comply with evolving “know your customer” and end-user management rules for cloud and AI! No other event in the U.S. offers two days of content-rich, practical takeaways on these critically important aspects of export compliance. Featured speakers John D. Sonderman...

UK AI Security Institute tackles AI threats
UK AI Security Institute tackles AI threats

The UK’s AI Safety Institute has been recast as the UK AI Security Institute, bolstering protections against AI risks facing national security and crime, and delivering a key pillar of the government’s Plan for Change. The pivot reflects a focus on serious AI risks with security implications, including malicious cyber-attacks, crimes against fraud and the development of weaponry. Assess the risks by frontier AI AI Security Institute will partner with national units, incl...

HackerOne's guide redefines cybersecurity ROI metrics
HackerOne's guide redefines cybersecurity ROI metrics

HackerOne, a pioneer in finding and fixing critical vulnerabilities and AI safety issues, published When ROI Falls Short: A Guide to Measuring Security Investments with Return on Mitigation, a report that revealed security pioneers’ negative perceptions surrounding ROI for the measurement of cybersecurity value. The whitepaper also introduced Return on Mitigation (RoM) — a new metric that helps security pioneers quantify the financial value of protecting their businesses from c...

MOBOTIX Partner Conference 2025: Video tech insights
MOBOTIX Partner Conference 2025: Video tech insights

Under the motto “Navigating Tomorrow”, MOBOTIX partners participated in this year's MOBOTIX Partner Conference in Langmeil, Rhineland-Palatinate. It was an impressive industry meeting at which MOBOTIX partners were able to discuss trends and developments in video technology and get to know the latest MOBOTIX solutions, in some cases even before they were launched on the market. European and international partners The MPC for the Latin American market had already taken place in Ca...

Enhancing hospital security: CSA and AHA partnership
Enhancing hospital security: CSA and AHA partnership

Corporate Security Advisors (CSA), the premiere management consulting firm specialising in corporate security, announced that it has been selected to join the prestigious American Hospital Association (AHA) Preferred Cybersecurity and Risk Provider Program as the first Preferred Physical Security Advisory Services Provider. CSA will play a critical role in helping hospitals and healthcare systems nationwide enhance their physical security strategies to protect patients, staff, and facilities....

Mobile robotics at LogiMAT 2025: AGV and AMR innovations
Mobile robotics at LogiMAT 2025: AGV and AMR innovations

LogiMAT 2025 is hosting a Mobile Robotics User Forum to complement the AGV and AMR solutions on display in Hall 8. Experts from Forum AGV will offer visitors a broad program of information and personal consultation in five categories covering the current trends in how AGV systems and AMRs are deployed. Pre-registration is requested. Mobile robotics is a topic of growing importance for those seeking efficient material flows in intralogistics. But potential users are often daunted by the prospect...

AI & cyber strategy essential for IT growth in 2025
AI & cyber strategy essential for IT growth in 2025

Cyber security and artificial intelligence (AI) are set to fuel a 5 percent rise in IT spending from European businesses during 2025, according to market analysis from Forrester. Total IT spending is projected to reach $4.9 trillion in 2025, Forrester’s Global tech forecast 2024-2029 predicts, with GenAI, cyber security and cloud services to drive growth by 5.6 percent, compared to just 4.6 percent in 2024. Investment on cyber security and AI Analysts from Forrester believe that concent...

Matrix shines at CMDA B2B IT Expo 2025 in Pune
Matrix shines at CMDA B2B IT Expo 2025 in Pune

Matrix reinforced its position as a key player in the IT sector with a strong presence at the CMDA B2B IT Expo 2025, held in Pune. The event, a pivotal platform for IT industry pioneers, showcased cutting-edge innovations, fostering collaboration and growth in the ever-evolving technology landscape. Showcasing IT-centric Innovations At the expo, Matrix exhibited its Enterprise-Grade Security and Telecom Solutions, designed to meet the evolving demands of businesses and government entities. Fr...

Matrix at IBEX 2025: BFSI security solutions
Matrix at IBEX 2025: BFSI security solutions

Matrix, a pioneering OEM in Security and Telecom solutions, is excited to announce its participation in the 12th edition of IBEX India 2025, scheduled for February 13-14 at Jio World Convention Centre, BKC, Mumbai. IBEX INDIA is a premier trade fair and conference connecting the BFSI Tech and Fintech sectors with cutting-edge banking technologies, where Matrix will showcase its advanced security solutions tailored for the banking sector, ensuring robust surveillance and access control for a sec...

Silobreaker partners with Health-ISAC for security boost
Silobreaker partners with Health-ISAC for security boost

Security and threat intelligence technology company, Silobreaker announced its partnership with the Health Information Sharing and Analysis Centre (Health-ISAC) as a Community Services Partner. Health-ISAC is a global non-profit organisation dedicated to improving the security and resilience of the healthcare sector. It connects thousands of health security professionals worldwide to share real-time insights, alerts, and best practices. This enables healthcare organisations to better detect, mi...

Cyber Essentials milestone for Threat Evolution
Cyber Essentials milestone for Threat Evolution

Threat Evolution, an advanced cybersecurity training and consulting platform, has officially achieved Cyber Essentials certification, reinforcing its commitment to helping businesses strengthen their digital security. Part of the Magenta Security Services family of businesses, which is a pioneer in sustainable security solutions, Threat Evolution provides cutting-edge cybersecurity training and consulting services designed to mitigate cyber risks. Common entry point for cyber threats Threat E...

IMCSO's operational technology security standards
IMCSO's operational technology security standards

The International Maritime Cyber Security Organisation (IMCSO), an independent maritime standards organisation, has released its cybersecurity testing methodology for those maritime vessels looking to assess their risk and join the Cyber Risk Registry, a risk register database maintained by the IMCSO. The methodology aims to provide IMCSO-accredited cyber consultants and the senior maritime personnel they will be assessing with standardised testing by outlining test scope and the language...

VSS Tech Talk: Security in food manufacturing
VSS Tech Talk: Security in food manufacturing

Virtual Security Showcase has opened registration for their next VSS Tech Talk: Transforming Security into Safety for Food Processing and Manufacturing, scheduled for February 27th from 2-3 PM EST. Attend this informative online event where a panel of cyber-physical security experts will discuss how to transform leading security technologies into safety solutions to better protect people, property, and products at food processing and manufacturing facilities. Panelists S...

Boost cybersecurity for video systems with Hanwha Vision
Boost cybersecurity for video systems with Hanwha Vision

Video security systems have become a critical asset across industries, with pioneers confident in their systems’ resilience against cyber threats. Research from Hanwha Vision Europe shows that more than nine in 10 security and IT managers in the UK, France, Germany, Spain, and Italy believe their video systems are well-protected.  Security practices Overall, confidence is high across different organisation sizes, countries, and sectors. In Italy, confidence reaches 97%, while Spain...

Explore CX & DX strategies at Jakarta Summit 2025
Explore CX & DX strategies at Jakarta Summit 2025

Indonesia is set to host the most anticipated 10th NXT CX-DX Summit & Awards which will explore the intersection of Customer Experience (CX) and Digital Transformation, bringing together industry pioneers, innovators, and decision-makers to discuss strategies for driving business growth in the digital age. Scheduled on the 11th of February 2025 at JW Marriott in Jakarta, Indonesia the summit will feature insights from global thought pioneers, successful case studies, and practical strategie...

Indonesian cybersecurity market growth 2023-2028
Indonesian cybersecurity market growth 2023-2028

In Indonesia, cybersecurity stands as a critical concern, despite its relative insulation from global advanced persistent threats. Nevertheless, cyber-attacks persist, impacting citizens and government institutions alike. As businesses transition to digital platforms, the increased implementation of transformative technologies introduces a slew of security risks, endangering critical infrastructure and sensitive data. The Indonesia Cybersecurity market is projected to grow from US$ 2.05 billion...

Z-Wave Alliance launches 2024B and membership level
Z-Wave Alliance launches 2024B and membership level

The Z-Wave Alliance, the standards development organisation dedicated to advancing the smart home and Z-Wave® technology, is excited to announce the launch of the 2024B Z-Wave Specification package as well as the introduction of a new Accelerator Membership Level aimed at empowering startups and young companies in the IoT ecosystem. These initiatives demonstrate the Alliance’s ongoing commitment to innovation, collaboration, and ensuring interoperability in the IoT market. Z-Wa...

Nutanix survey reveals GenAI trends & infrastructure needs
Nutanix survey reveals GenAI trends & infrastructure needs

Nutanix, a pioneer in hybrid multi-cloud computing announced the findings of its seventh annual Enterprise Cloud Index (ECI) survey and research report, which measures global enterprise progress with cloud adoption. The report sheds light on Generative Artificial Intelligence (GenAI) adoption, investment priorities, and benefits along with key challenges organisations face to meet the demands of these emerging workloads. GenAI application adoption As GenAI application adoption...

artius.iD expands board with Oracle Vet Keplar
artius.iD expands board with Oracle Vet Keplar

artius.iD, the global pioneer in secure, self-managed, decentralised individual identity solutions, has appointed former Oracle and Google enterprise sales pioneer Jeffrey Keplar to its Board of Strategic Advisors. Jeffrey Keplar Keplar has more than three decades of experience building sales teams and pioneering enterprise tech sales strategies at the world's largest businesses. He held various sales leadership roles at Oracle over nearly 20 years, ultimately serving as Group Vice P...

CAPSLOCK aids nationwide in cyber security training
CAPSLOCK aids nationwide in cyber security training

UK cyber training organisation, CAPSLOCK announces a new partnership with Nationwide to help the UK building society set up a dedicated cyber security training programme to expand its Technology Development Programme. Working closely with Nationwide’s careers team, CAPSLOCK is the first cyber skills training partner tasked with supporting Nationwide with the onboarding, training and role allocation of new joiners into the cyber security function. Cyber-first company culture As a majo...

Team Cymru feeds empower Cyware's cyber fusion solutions
Team Cymru feeds empower Cyware's cyber fusion solutions

Cyware, the provider of threat intelligence management, low-code/no-code security automation, and cyber fusion solutions announced an important collaboration with Team Cymru to pre-configure Team Cymru’s industry-pioneering threat feeds into Cyware’s Threat Intelligence Platform (TIP). This packaged solution delivers real-time visibility into botnets, malware, command and control (C2) infrastructure, and external malicious activity, empowering organisations to detect and respond fas...

Cowbell launches cyber resiliency services for SMEs
Cowbell launches cyber resiliency services for SMEs

Cowbell, a provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses, has launched a new Cowbell Resiliency Services (CRS) unit in response to a rise in the frequency, severity, and diversity of cyber threats as a complement to its existing risk management programme. Cost of data breach Driven by AI advances and an increasingly complex geopolitical landscape, recent reports show the average global cost of a data breach has reached $4.88m, a 10% incr...

Navigate FDI risks at C5's 2025 European Forum
Navigate FDI risks at C5's 2025 European Forum

C5 Group is proud to announce its upcoming event, the 6th European Forum on Global FDI Reviews taking place on June 3 –4, 2025, in Berlin will delve into the critical changes affecting investment professionals working amid evolving foreign direct investment screening regulations, complex and sometimes obstructive merger controls, and complex foreign subsidy limitations.   The most trusted Foreign Direct Investment Review Forum in Europe gathers the foremost FDI practit...

SenseOn's AI reduces cybersecurity response time
SenseOn's AI reduces cybersecurity response time

SenseOn has unveiled the integration of new AI-powered case summaries into its adaptive cybersecurity intelligence platform. This latest AI-native feature is designed to help security teams instantly understand critical threats and accelerate response times by transforming complex security incidents into clear, actionable intelligence.  Case summaries The new capability uses generative AI, which has been trained by and acts as an extension of the organisation’s SOC team, to develop...

TKH Security & Nanodems form strategic partnership
TKH Security & Nanodems form strategic partnership

Nanodems, a pioneer in Physical Security Information Management (PSIM) announced a strategic partnership between TKH Security, a global pioneer in security and parking guidance technologies. TKH Security TKH Security, based in Zoetermeer, the Netherlands, with over 25 years of experience, provides innovative solutions for security, asset & site, and parking guidance management. Operating in over 80 countries with 12 offices worldwide, TKH Security is committed to delivering high-quality,...

View more
  • «
  • 1
  • 2
  • ...
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec