SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Bosch announces update for Building Integration System software with BIS 4.3
Bosch announces update for Building Integration System software with BIS 4.3

With BIS 4.3 from Bosch, companies managing distributed systems can now benefit from being able to operate multiple servers Bosch has launched an update of its Building Integration System (BIS) software which enables security managers to manage and configure access control and authorisation across globally distributed sites, from a single server to all local sites. These distributed systems are usually found in large, global enterprises with many different sites spread across...

RSA Conference Abu Dhabi 2016 to host group of diverse cyber security experts and influential speakers
RSA Conference Abu Dhabi 2016 to host group of diverse cyber security experts and influential speakers

Keynote speakers will share crucial insights and in-depth knowledge on a variety of sector critical topics RSA Conference, an information security conference and exposition, has announced that it will host a group of diverse cyber security experts and influential speakers in Abu Dhabi. This year’s keynote speakers will share crucial insights and in-depth knowledge on a variety of sector critical topics including enterprise malware, changing security perspectives, and th...

RSA Conference Innovation Sandbox Contest 2017 accepting submissions
RSA Conference Innovation Sandbox Contest 2017 accepting submissions

The RSA Conference's Innovation Sandbox Contest will kick off on February 13, 2017 RSA Conference 2017, an information security conferences and exposition, announced that the 12th annual Innovation Sandbox Contest is now accepting submissions to name the RSAC Most Innovative Startup 2017. Past winners include successful companies such as Sourcefire, Imperva, Waratek, and most recently Phantom.Innovation and Entrepreneur SeminarsAs a leader in the infos...

RSA Conference 2016 Abu Dhabi announces conference agenda
RSA Conference 2016 Abu Dhabi announces conference agenda

RSA Conference 2016 Abu Dhabi to host information security professionals under the theme of “Connect to Protect” RSA Conference, the world’s leading information security conference and exposition, has announced the agenda for RSA Conference 2016 Abu Dhabi, which includes a broad spectrum of captivating sessions and thought-provoking workshops. The Conference will be held from November 15-16, 2016 at Emirates Palace Hotel, with an impressive line-up of pre-con...

Dot Origin upgrades EdgeConnector access control solution by adding multi-domain scalability
Dot Origin upgrades EdgeConnector access control solution by adding multi-domain scalability

Role-based security models are extended to include physical door access privileges with EdgeConnector EdgeConnector is a converged physical and logical access management solution that adds location-aware access validation to Microsoft Active Directory, delivering compliance and cyber security benefits as well as streamlining physical access control management through an IP network. Data security and identity management Compliance and data security requirements for the restri...

ASUSTOR launches enterprise-class high-capacity AS6212RD rackmount NAS
ASUSTOR launches enterprise-class high-capacity AS6212RD rackmount NAS

The AS6212RD rackmount NAS features 12 disk-bays for a maximum capacity of 120 TB ASUSTOR Inc., an innovator and provider of network storage solutions, has announced the launch of the AS6212RD 12-bay rackmount NAS, the newest addition to their series of Intel Braswell based NAS devices. The AS6212RD is equipped with powerful core specifications that are ready to meet the requirements of demanding enterprise environments while providing excellent performance and smooth multitas...

QNAP introduces TS-x31P NAS series powered by ARM Cortex-A15 dual-core processor for home and small offices
QNAP introduces TS-x31P NAS series powered by ARM Cortex-A15 dual-core processor for home and small offices

The TS-x31P is designed to fulfill user needs to ensure data security and to bring a comprehensive business and multimedia experience QNAP Systems, released the TS-x31P NAS series, including the TS-131P, TS-231P, and TS-431P. Powered by an AnnapurnaLabs, an Amazon company Alpine AL-212 dual-core 1.7GHz processor, this series provides a high-performance and secure private cloud NAS solution tailored for home, SOHO and workgroup users. In addition to basic requirements such as f...

BullGuard’s IoT Scanner reveals hacking threat to connected devices
BullGuard’s IoT Scanner reveals hacking threat to connected devices

BullGuard IoT Scanner is a free tool for scanning a network for vulnerable connected devices The latest data from BullGuard’s IoT Scanner, a free tool that allows consumers to check if their connected devices are secure, suggests the recent DDoS attack could be just the tip of the iceberg. To date over 100,000 unique IPs have been scanned by consumers using IoT Scanner, and though just 4.6 per cent revealed vulnerabilities, it’s the scale of the Internet of Things...

Mirai Botnet update: Dahua role diminished in August attack
Mirai Botnet update: Dahua role diminished in August attack

Dahua reminds customers that it is crucial to select strong passwords and keep firmware updated In August, a Distributed Denial of Service (DDoS) attack occurred due to a massive botnet created by malware named Mirai. This attack was caused by vulnerabilities in a large number of IoT devices, such as security cameras and DVRs using default credentials. Dahua’s products were initially named as the victims of the hacking and the source of these DDOS attacks in reports by r...

IFSEC International announces launch of Borders & Infrastructure show for 2017
IFSEC International announces launch of Borders & Infrastructure show for 2017

Borders & Infrastructure show will take place between 20-22 June, 2017 as part of IFSEC 2017 Speaking on Wednesday night at an event at London’s historic Guildhall, IFSEC brand director Gerry Dunphy outlined the vision for the new ‘show within a show’ which will meet the need for Britain’s—and the World’s—response to the ever-increasing terror and security threat. Borders & Infrastructure, which will take place between 20-22 J...

Greenwave Systems Chief Scientist Jim Hunter speaks about Internet of Things at Broadband World Forum
Greenwave Systems Chief Scientist Jim Hunter speaks about Internet of Things at Broadband World Forum

Jim Hunter conveyed that the real opportunity in the Internet is in connecting it with people Learning from the past, taking security seriously, and protecting the consumer must be at the heart of developing propositions for the Internet of Things (IoT) because it’s all about personal data, advised Greenwave Systems’ Chief Scientist. Speaking at the Broadband World Forum, Jim Hunter told the packed show floor that the real opportunity in the Internet is in connect...

Johnson Controls and Department of Homeland Security sign CRADA on cybersecurity
Johnson Controls and Department of Homeland Security sign CRADA on cybersecurity

The partnership will help secure buildings from cyber threats In an effort to improve cyber-threat information sharing and analysis, Johnson Controls, a global provider in energy efficiency, integrated solutions and building controls, announces a Cooperative Research and Development Agreement (CRADA) with the U.S. Department of Homeland Security (DHS), Office of Cybersecurity and Communications. The agreement will help secure our nation’s critical infrastructure from tho...

Connected Technologies launches new ScanPass® Mobile Credential that prevents hacking
Connected Technologies launches new ScanPass® Mobile Credential that prevents hacking

ScanPass® Mobile Credential is engineered to remove the prevalent issues associated with card-based cyber threats Cyber threats and hacking are consistently in the news, and recent reports have circulated that indicate that some access control readers can be easily compromised. ScanPass Mobile Credential is purpose built to prevent the three primary methods with which card-based access control is circumvented: skimming, eavesdropping, replay attacks and tampering. Skimmi...

Crucial role of physical security suppliers and corporate security departments in handling cyber-crime
Crucial role of physical security suppliers and corporate security departments in handling cyber-crime

45% believed that cyber and physical security were equally important in the companies they were linked to The latest Security Research Initiative Report published highlights the crucial role that physical security suppliers and corporate security departments play in tackling cyber-crime, albeit that this often goes unrecognised.  Physical Security Specialists vs. Cyber Specialists  In a survey of both physical security specialists and cyber specialists (supple...

Security Essen 2016: Strong presence of digital and networked innovations delights visitors
Security Essen 2016: Strong presence of digital and networked innovations delights visitors

One in four visitors placed their orders directly at the fair, a plus of eight percent in comparison with 2014 Security Essen has highlighted its position as the global fair for civil security in an enduring way: Four days long, 1,040 companies from 45 nations redefined the standard for civil security at Messe Essen. They presented to the over 40,000 trade visitors from 119 nations innovative products and services from smart video surveillance via the safeguarding of propertie...

oneM2M significantly expands IoT ecosystem with new global standards
oneM2M significantly expands IoT ecosystem with new global standards

The critical area of security has been addressed throughout the 17 specifications of Release 2 The full potential of the Internet of Things (IoT) advanced significantly as oneM2M, the global standards initiative for Machine-to-Machine (M2M) communications and the IoT, published a new landmark set of specifications, Release 2.Based on contributions from more than 200 member companies, Release 2 builds on oneM2M’s initial set of official specifications, which enable basic...

BeCyberSure appoints Chief PR to consult SME organisations on the threats of proportionate security
BeCyberSure appoints Chief PR to consult SME organisations on the threats of proportionate security

Chief PR represents security-focused organisations & is an event partner of the ISSE conference BeCyberSure announced that it has enlisted the services of Chief PR - a media relations company specialising in physical and information security. Working with BeCyberSure, the consultancy will help protect and educate owners, directors and senior managers including human resource (HR) departments of SME organisations, regarding the importance of risk management and proportionat...

Nedap AEOS security solution wins GIT Award in D Access Control category
Nedap AEOS security solution wins GIT Award in D Access Control category

Dr. Heiko Baumgartner handing the GIT Award to Mr. Sieger Volkers Nedap Security Management has won a GIT Award in the D Access Control category for their high-end AEOS end-to-end security solution. This new end-to-end security solution is the first to offer digital protection for access control by unifying best practices from both IT and physical security.On the 27th of September, Dr. Heiko Baumgartner, Chief Editor of GIT Security, handed out the award to Mr. Sieger Volkers,...

Winners of Security Essen Innovation Award 2016 announced
Winners of Security Essen Innovation Award 2016 announced

Exhibitors at Security Essen have submitted 84 applications in three categories Numerous innovations give their premieres at Security Essen. Traditionally, a lot of new products and services are introduced to the trade public for the first time at the fair. Every two years, Messe Essen distinguishes pioneering innovations in security technology with the Security Essen Innovation Award which is presented in the Technology & Products, Services and Fire Protection categories....

Morse Watchman presents upgraded KeyWatcher Touch key management system at Security Essen 2016
Morse Watchman presents upgraded KeyWatcher Touch key management system at Security Essen 2016

New security features protect the system from cyber breaches via the network Morse Watchmans introduces enhancements to its KeyWatcher Touch that are designed to make the key management system even more flexible and useful in fulfilling the safety and security needs of resorts and casinos. New features being presented at Security Essen 2016 include security and notification upgrades and ease of use improvements, all driven by real-world customer feedback.“Now KeyWatcher...

SmartSec Europe 2016 brings together European utility cyber security experts and implementation leaders
SmartSec Europe 2016 brings together European utility cyber security experts and implementation leaders

SmartSec Europe 2016 will be attended by 120+ cyber security experts and implementation leaders Recent utility research carried out by Phoenix Forums indicates that cyber security is now at the top of European utilities’ organisational priority. With senior management investment and support in place, IT and OT convergence under way, and the threat landscape becoming increasingly unpredictable, utility cyber security teams have both the external motivators and internal su...

ForeScout Technologies appoints James Beer to its Board of Directors
ForeScout Technologies appoints James Beer to its Board of Directors

James Beer currently serves as the Executive VP and Chief Financial Officer of McKesson Corporation ForeScout Technologies, a provider of agentless cyber security, has announced the appointment of James Beer to its Board of Directors, effective immediately. Beer currently serves as the Executive Vice President and Chief Financial Officer of McKesson Corporation, which is ranked fifth on the Fortune 500 and is the largest U.S. healthcare services and in...

SureID introduces high-assurance enterprise identity for commercial and government customers
SureID introduces high-assurance enterprise identity for commercial and government customers

Features include registering, identity proofing, screening, credentialing, authenticating, reporting and notification management SureID has announced the launch of SureID Certified Enterprise, a high-assurance identity that provides configurable identity assurance for organisations of all sizes across government and private enterprise. With the ability to integrate into an organization’s existing systems, SureID offers identity solutions to enhance an organization’...

NDI Annual Conference ‘Growth through Innovation’ to exhibit innovation in defence, space, security and aerospace industries
NDI Annual Conference ‘Growth through Innovation’ to exhibit innovation in defence, space, security and aerospace industries

There will be a series of specialist interactive breakout sessions on dual use technology, the Space Applications Centre and cyber security Companies in the Defence, Security, Space and Aerospace industries will have a unique opportunity to learn how innovation is shaping future customer needs and growth opportunities, from some of the UK’s leading experts in their sectors at an event next month. The NDI Annual Conference ‘Growth through Innovation’ is being...

Allied Market Research expects managed security services market to reach $40.97 billion by 2022
Allied Market Research expects managed security services market to reach $40.97 billion by 2022

IPS/DPS market is expected to exhibit a remarkable growth during the forecast period A new report published by Allied Market Research titled, "Managed Security Services Market - Global Opportunity Analysis and Industry Forecast, 2014 - 2022", states that the global managed security services market is likely to reach revenue of $40.97 billion by 2022, growing at a CAGR of 16.6% from 2016 to 2022. North America is expected be the largest market for managed security services dur...

Allied Market Research predicts situation awareness systems (SAS) market to reach $32.6 billion by 2022
Allied Market Research predicts situation awareness systems (SAS) market to reach $32.6 billion by 2022

By industry vertical, military and defence dominated the situation awareness system market in 2015 A new report published by Allied Market Research titled, "Situation Awareness System (SAS) Market - Global Opportunity Analysis and Industry Forecast, 2015 - 2022", states the situation awareness systems (SAS) market is projected to garner $32.6 billion by 2022, registering a CAGR of 8.2% during the forecast period of 2016 - 2022. North America dominates the global SAS market, ow...

Protection 1 announces “The Power to Do More for You” at ASIS 2016
Protection 1 announces “The Power to Do More for You” at ASIS 2016

The exhibit marks the company’s first appearance with ADT since the announcement of their integration Protection 1, the premier full-service business and home security company in the U.S., announces “The Power to Do More for You” at the ASIS 2016 Conference in Orlando, Florida. The exhibit marks the company’s first appearance with ADT since the announcement of their integration in May 2016. Expanding footprint From September 12-14 at booth #3113, Prot...

LifeSafety Power displays new intelligent power management solutions at ASIS 2016
LifeSafety Power displays new intelligent power management solutions at ASIS 2016

At ASIS 2016, LifeSafety Power will exhibit growing ecosystem of network-based solutions LifeSafety Power, Mundelein, Illinois, a provider of smarter power solutions and patented remote networking capabilities, is already creating a buzz for ASIS 2016, September 12-15 in Orlando, with its intelligent power management solutions. Set to exhibit at booth 3461 during the show, the company’s growing suite of products have effectively forged a new category of remote managed se...

March Networks launches GURU Security Audit Tool to secure video surveillance installations
March Networks launches GURU Security Audit Tool to secure video surveillance installations

The Security Audit tool is the latest complement to March Networks’ existing Security Updates and Advisories program March Networks, a global provider of intelligent IP video solutions, introduces an innovative, new Security Audit tool to help systems integrators evaluate and improve the security of their video installation configurations and provide additional assurance to their customers. Analyses security of configurations The Security Audit capability, now availabl...

Tyco Security Products showcases complete security solution, cyber security programme at ASIS 2016
Tyco Security Products showcases complete security solution, cyber security programme at ASIS 2016

Tyco Security Products offers solutions based on intuitive usability, scalability and sophistication to protect businesses of all sizes Tyco Security Products will highlight its wide range of integrated security management solutions and Cyber Protection programme at ASIS International’s 62nd Annual Seminar and Exhibits, September 12-15, at the Orange County Convention Center in Orlando, in Booth 1801. With its portfolio of solutions designed to meet top federal cyber se...

View more
  • «
  • 1
  • 2
  • ...
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec