SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

S-RM joins Distology to boost cyber incident response
S-RM joins Distology to boost cyber incident response

Global cyber security and corporate intelligence consultancy S-RM has announced a new channel distribution partnership with cyber security solutions provider and distributor, Distology. Distology represents best-in-class cyber security vendors and supports an extensive network of resellers across the EMEA region. This partnership will enable Distology’s network to access S-RM’s global, award-winning, cyber incident response services.   Incident response team S-RM has the...

ISC West 2025: Premier security innovation event
ISC West 2025: Premier security innovation event

ISC West 2025 opens registration with its premier sponsor, the Security Industry Association (SIA). Taking place March 31–April 4 (SIA Education@ISC: March 31–April 3|Exhibit Hall: April 2-4) at The Venetian Expo in Las Vegas, ISC West will feature an additional day of education for the first time in the event’s history. Now spanning four days, SIA Education@ISC returns bigger and more impactful than ever. The expanded program features over 110 sessions led by 220 industry exp...

Matrix at Intersec Dubai 2025: Discover innovative security
Matrix at Intersec Dubai 2025: Discover innovative security

Matrix is thrilled to announce its participation in Intersec Dubai 2025, the premier global exhibition for security, emergency response, and safety. From January 14th to 16th, 2025, at Booth CA-29, Saeed Hall 1, Matrix will showcase its comprehensive portfolio of cutting-edge, NDAA-compliant security solutions designed to meet the diverse needs of modern enterprises. End-to-end cyber-secure solutions  VMS has gained cybersecurity certification and aligns with the OWASP Top 10 Desktop Ri...

Abnormal Security in Gartner Email Magic Quadrant
Abnormal Security in Gartner Email Magic Quadrant

Abnormal Security, the pioneer in AI-native human behaviour security, announced it has been recognised as a pioneer in the first-ever Gartner® Magic Quadrant™ for Email Security Platforms. A complimentary version of the full report can be found. Gartner evaluated 14 vendors across the email security market and placed Abnormal in the Leaders Quadrant. They feel this placement recognises Abnormal for excelling in both Completeness of Vision by addressing current and future email threats...

OPSWAT acquires Fend for advanced data diode security
OPSWAT acquires Fend for advanced data diode security

OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...

Performanta's Torvald Johnson named Microsoft MVP
Performanta's Torvald Johnson named Microsoft MVP

Global cybersecurity firm Performanta celebrates the recognition of its Head of Security Automation, Torvald Johnson, as one of Microsoft’s first Security Copilot Most Valuable Professionals (MVPs). The first of only 10 Security Copilot MVPs worldwide, Johnson has been recognised for his practical expertise, leadership and guidance across the cybersecurity sector and wider industries, and commitment to pursuing a future of cyber safety. Performanta’s cyber innovation “It is...

Gallagher Security, a landmark year of innovation 2024
Gallagher Security, a landmark year of innovation 2024

Gallagher Security is celebrating a landmark year distinguished by the growth and innovation of its industry-pioneering solutions. As 2024 approaches, the global executive team reflects on the milestones that defined the year and offers a glimpse into the bold plans for 2025.  Award-winning excellence  Gallagher’s dedication to innovation and quality was recognised across the globe in 2024. Controller 7000 The cyber-forward Controller 7000 (C7000) earned top honours in New Z...

Discover innovation at ISC West 2025 Expo
Discover innovation at ISC West 2025 Expo

ISC West 2025 opens registration with its premier sponsor the Security Industry Association (SIA). Taking place March 31 – April 4 (SIA Education@ISC: March 31 – April 3 | Exhibit Hall: April 2-4) at The Venetian Expo in Las Vegas, ISC West will feature an additional day of education for the first time in the event’s history. SIA Education@ISC Spanning four days, SIA Education@ISC returns bigger and more impactful than ever. The expanded programme features over 110 sess...

Genetec security SaaS integration with Bosch cameras
Genetec security SaaS integration with Bosch cameras

The collaboration of Bosch and Genetec™ is bringing even greater benefits to customers with direct-to-cloud integration of Bosch cameras with Genetec Security Centre SaaS, as well as new intelligent detection and enhanced search capabilities available through Genetec Cloudlink™ cloud-managed appliance connections. Available with camera firmware release 9.40, customers choosing Genetec Security Centre SaaS gain support for Bosch application-specific artificial int...

Rubrik Turbo Threat Hunting in cybersecurity
Rubrik Turbo Threat Hunting in cybersecurity

As organisations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, cybersecurity company Rubrik, Inc. announces Rubrik Turbo Threat Hunting. This unprecedented new feature is designed to dramatically accelerate cyber recovery and enables organisations to locate clean recovery points across their entire data estate in seconds.  Turbo Threat Hunting aims to allow customers to immediately identify clean recovery points and swiftly recover from c...

Colt and Cisco's 800G route: Future of networking
Colt and Cisco's 800G route: Future of networking

Colt Technology Services, the digital infrastructure company, announced that it is first to successfully trial Cisco’s 800G ZR+ coherent pluggable optics in its production network using the Cisco 8000 series routers, powered by Cisco Silicon One. The Routed Optical Networking testing– carried out across the 667 km between Frankfurt and Munich, Germany– is the latest in a series of Colt trials with high-profile global partners designed to rethink technology’s previous lim...

Cequence API security defends retail in holiday season
Cequence API security defends retail in holiday season

Cequence, a pioneer in API security and bot management, unveiled new insights from its CQ Prime threat research team that underscore the growing cyber threats targeting the global retail sector during the holiday season. The research reveals that businesses could face average potential losses of £2.02 million ($2.58 million) per hour throughout December due to malicious bot traffic and fraud attempts. Cequence’s UAP platform Drawing on billions of real transactions and attack data...

HackerOne boosts security with Hai updates
HackerOne boosts security with Hai updates

HackerOne, the cybersecurity company dedicated to eliminating vulnerabilities through continuous testing, announced updates to its intelligent copilot Hai. Hai’s new program insights synthesise data across a customer’s programs, giving them instant understanding and actionable summaries of performance, results, and trends. Now more seamlessly integrated into workflows, Hai continues to help customers save time by making it easy to understand comprehensive program data, imp...

Bridewell wins Thriving Together Award at Heathrow Summit
Bridewell wins Thriving Together Award at Heathrow Summit

Bridewell, the trusted cyber security partner for organisations operating within Critical National Infrastructure (CNI), is proud to announce that it has been awarded the prestigious ‘Thriving Together’ award at the Heathrow Business Summit. The award recognises Bridewell’s integral role in supporting Heathrow Airport’s sustainable growth and operations. Heathrow Business Summit The Heathrow Business Summit brought together strategic suppliers, senior representatives,...

Endpoint security insights from AV-Comparatives' EPR test
Endpoint security insights from AV-Comparatives' EPR test

AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its 2024 Endpoint Prevention and Response (EPR) Comparative Report, showcasing the exceptional performance of pioneering cybersecurity solutions. The report evaluates the ability of these products to detect, prevent, and respond to advanced threats in real-world scenarios. MITRE ATT&CK® framework AV-Comparatives' rigorous assessment covered products from Bitdefender, Check P...

AI trends in Genetec's physical security sector 2025
AI trends in Genetec's physical security sector 2025

Genetec Inc., the global pioneer in enterprise physical security software, shared the results of its 2025 State of the Physical Security Report. Based on insights from more than 600 physical security pioneers, including end users, channel partners, systems integrators, and consultants based in the Middle East, Turkey, and Africa (MEA) markets, the report offers a comprehensive analysis of evolving trends in physical security operations. Hybrid cloud adoption According to the report, 48%...

Arctic Wolf joins Immersive Labs Cyber Million program
Arctic Wolf joins Immersive Labs Cyber Million program

Arctic Wolf, a pioneering provider of security operations, and Immersive Labs, the pioneer in people-centric cyber resilience, announced that Arctic Wolf has joined the Immersive Labs Cyber Million program, which aims to solve the cybersecurity talent deficit by increasing access to one million entry-level cybersecurity operations jobs over the next decade. As a new partner, Arctic Wolf has made entry-level cyber jobs available on the platform.  Cyber Million program Launched by Imme...

Auguria enhances platform with key security integrations
Auguria enhances platform with key security integrations

Auguria, Inc., a pioneer in AI-powered security operations solutions announced the latest version of its Security Knowledge Layer™ Platform. The newly enhanced platform can integrate with some of today's biggest data sources, including SentinelOne, CrowdStrike, Palo Alto Networks, and Microsoft Windows Event Logs. Auguria also unveiled its Explainability Graph Feature, a trailblazing tool that provides visual, context-rich threat data for security teams. Expanded integrations Secur...

Kong Inc. on API security and AI developments
Kong Inc. on API security and AI developments

Kong Inc., a pioneering developer of cloud API technologies, recently released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report, which highlights the API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern about AI-enhanced attacks in the future. And while 85% say they’re conf...

iDenfy expands in US with SOC II certification
iDenfy expands in US with SOC II certification

iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office  This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...

Rubrik DSPM boosts Gen AI data protection
Rubrik DSPM boosts Gen AI data protection

Sensitive data exposure is a top concern given the volume and types of data consumed by generative AI (Gen AI). Inadequate sensitive data controls and resulting data leakage can halt the use of innovative AI tools. DSPM helps accelerate AI adoption by quickly and easily identifying data risks, which is why Rubrik, Inc. is announcing Rubrik DSPM in RSC. Available in early 2025, organisations can rapidly enable DSPM for increased data visibility and sensitive data control across cloud, SaaS, and...

Hornetsecurity protects OneNote with new backup features
Hornetsecurity protects OneNote with new backup features

Global cybersecurity pioneer, Hornetsecurity, has unveiled an upgraded version of its 365 Total Backup solution, introducing self-service recovery for end users while also offering full backup and recovery support for Microsoft OneNote. This new functionality is also available with 365 Total Protection Plans 3 and 4. Enabling end users to recover data Hornetsecurity has added a new self-service functionality to its backup solution. This allows end users to independently recover their mailbox,...

S-RM's cyber security steps for DORA compliance
S-RM's cyber security steps for DORA compliance

Pioneering global cyber security and investigations consultancy S-RM has identified five critical steps for financial institutions and their ICT providers to achieve compliance with the Digital Operational Resilience Act (DORA), which will enter force from 17 January 2025. DORA establishes an EU-wide oversight framework designed to ensure the financial sector can withstand severe operational disruptions. Covering over 20,000 entities, including financial institutions, crypto-asset service...

Colt Technology's 2025 enterprise tech outlook
Colt Technology's 2025 enterprise tech outlook

Colt Technology Services, the digital infrastructure company released key enterprise technology forecasts and market trends for 2025. Based on its proprietary research among over 1000 global CIOs, and gathered from market intelligence sources, Colt anticipates sustainability-driven innovation, AI regulation, and a ‘coming of age’ for Network as a Service (NaaS) to dominate the enterprise tech pioneer’s agenda over the next 12 months.  Need for AI frameworks Mirko Voltol...

Audra Security: Next-gen protection for small business
Audra Security: Next-gen protection for small business

Dotlines UK has announced the upcoming launch of Audra Security, a new suite of hardware and software security products that promise to level up how homes and small businesses in the UK manage their security and internet usage.  Audra is designed to make internet security more accessible to a wider audience, by making it simpler, more affordable and user-friendly, while also championing planet-friendly initiatives. Key features of Audra Security  The announcement...

Arctic Wolf 2025 report: Cybersecurity trends ahead
Arctic Wolf 2025 report: Cybersecurity trends ahead

Arctic Wolf® Labs, a global pioneer in security operations, has published the findings of its 2025 predictions report revealing the cybersecurity trends set to dominate the threat landscape over the next year. The report predicts social engineering and ransomware attacks to be some of the most common attack types in 2025, allowing threat actors to effectively bypass defences and gain entry to victim organisations. Weaknesses in identity and access management (IAM) systems, alongside a conti...

Elite Interactive Solutions operators execute a voice-down and alerts police as an emergency medical response’
Elite Interactive Solutions operators execute a voice-down and alerts police as an emergency medical response’

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company has produced a new series of educational videos. Consisting of five segments ranging from just over four minutes to a little more than seven, the series is designed to provide a synopsis of remote guarding along with more detail on some of the key aspects in a straightforward and easily digestible way. Panel of subject matter exp...

Cysurance & Check Point: Cybersecurity insurability program
Cysurance & Check Point: Cybersecurity insurability program

In a vidcast interview for journalists, industry pioneers Kirsten Bay, CEO of Cysurance, and Enterprise Security Architect Randle Henry from Check Point, shed light on the emerging role of insurability assessments in bridging the gap between cybersecurity and insurance. The conversation put into context the Cysurance Insurability Assessment Program, Powered by Check Point – a joint initiative that is bending the risk curve in favour of businesses by assessing and managing their cybe...

Integrity360 expands with Adsigo acquisition in DACH
Integrity360 expands with Adsigo acquisition in DACH

As part of its Pan-European expansion plan, Integrity360 has acquired pioneering European PCI QSA (Payment Card Industry Qualified Security Assessor) and cyber security services company Adsigo. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to expand further into continental Europe and provides additional skilled resources to its existing substantial PCI and cyber security compliance teams. QSA organisation by Visa Adsigo has a pioneering position in...

Roc Technologies launches UK Security Operations Centre (SOC)
Roc Technologies launches UK Security Operations Centre (SOC)

IT services and solutions provider, Roc Technologies, has announced the launch of its Security Operations Centre (SOC), advancing its mission to provide accessible cyber security solutions to businesses and public sector organisations of all sizes across the UK. The SOC offers 24/7/365 monitoring and tailored security services that enhance resilience against the growing landscape of increasingly sophisticated cyber threats. A modular and scalable approach enables small and mid-sized organisatio...

View more
  • «
  • 1
  • 2
  • ...
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec