SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

API security tools: 42Crunch surpasses 2M downloads
API security tools: 42Crunch surpasses 2M downloads

42Crunch, the pioneer in DevSecOps for API security, announced that its freely available API security testing tools for developers—integrated directly into popular IDEs including VS Code, JetBrains, and Eclipse—has surpassed the 2 million downloads worldwide. This milestone reflects the accelerating demand from CISOs for enterprises to adopt a proactive approach to API security.    As AI workloads multiply and organisations rely more heavily on automated systems that consu...

SoSafe appoints new CRO & CFO for growth phase
SoSafe appoints new CRO & CFO for growth phase

SoSafe, Europe's pioneer in security awareness training and human risk management, announced the appointment of Daniel Farkas as Chief Revenue Officer (CRO) effective immediately and Peter Grausgruber as Chief Financial Officer (CFO) effective 1 January 2026. The new hires join the executive leadership team as the company enters its next phase of growth and scale.  As CRO, Daniel Farkas will lead all revenue-generating functions, including sales, partnerships, marketing, and customer succe...

Zimperium's findings on Android app security risks
Zimperium's findings on Android app security risks

Zimperium, the global pioneer in mobile security, revealed findings from its zLabs team showing that thousands of popular Android applications — including top travel, airline, and weather apps — are still using an outdated mapping component that could put users and enterprises at risk. The investigation, titled “Follow the Map to Enterprise Risk: What’s Inside Popular Android Apps,” found that a legacy library known as libmapbox-gl.so, once part of Mapbox GL Native...

TMK launches new cyber reinsurance solutions
TMK launches new cyber reinsurance solutions

Tokio Marine Kiln (TMK), a pioneering specialist insurer, announces the appointment of Cesar Silvestre as Head of Cyber Reinsurance Solutions, reporting to Laila Khudairi, Head of Cyber & Enterprise Risk. He takes up his new role with immediate effect and will lead the launch of TMK's new cyber reinsurance solutions offering. Silvestre brings over 12 years of specialised insurance experience to his new role. He joins from Beazley where he served as a Speciality Treaty Underwriter in the pr...

Entrust 2026 Identity Fraud Report: Key insights
Entrust 2026 Identity Fraud Report: Key insights

Entrust, a global pioneer in identity-centric security solutions, released its seventh annual Identity Fraud Report for 2026. The report examines global trends, tactics, and techniques used in identity fraud over the past year, providing actionable insights to help businesses protect their customers and operations. Deepfakes and injection attacks on the rise     New data reveals deepfakes account for one in five biometric fraud attempts, and instances of deepfaked selfies...

JUPITER: Europe's first exascale supercomputer
JUPITER: Europe's first exascale supercomputer

Eviden, the Atos Group product brand pioneering in advanced computing, announces the rankings of its 58 Eviden-built systems in the TOP500 and Green500, official listings of the world’s most powerful and most energy-efficient supercomputers.  Amongst the 58 Eviden-built systems listed in the TOP500, JUPITER, through its Booster partition, remains the 4th most powerful supercomputer in the world and Europe’s 1st, marking a historic milestone as Europe’s first system to off...

DataDome on retail security: Blocking credential stuffing
DataDome on retail security: Blocking credential stuffing

As agentic commerce takes hold, retailers are entering a new phase of automation, where AI agents act on behalf of real users to browse, compare, and buy. But these same capabilities can be weaponised by fraudsters. This Black Friday, the challenge isn’t stopping bots; it’s distinguishing between legitimate agent-driven interactions and malicious automation designed to mimic them. Identity amid rising automation That distinction matters most at the account layer, where retailers m...

Eviden to build Europe's Exascale supercomputer
Eviden to build Europe's Exascale supercomputer

Eviden, the Atos Group product brand pioneering in advanced computing, and AMD announced their selection to build Alice Recoque, a next-generation supercomputer to support the need for scientific computing (HPC) and artificial intelligence (AI), serving as an AI Factory.  Alice Recoque will be France’s first and Europe’s second Exascale supercomputer, a machine to expand Europe’s AI and research capabilities while ensuring energy efficiency and sovereignty. This project,...

FireMon expands Zero Trust for hybrid networks
FireMon expands Zero Trust for hybrid networks

FireMon, the pioneering network security and firewall policy management company, detailed expanded support for Zero Trust microsegmentation across hybrid environments, including a deeper integration with Illumio and continued coverage for VMware NSX and Zscaler. By normalising, analysing, and continuously validating segmentation intent across network, virtual, and host enforcement points, FireMon helps security teams operationalise Zero Trust at enterprise scale. Firewall governance...

Claroty CPS Library: Revolutionising asset visibility
Claroty CPS Library: Revolutionising asset visibility

Claroty, the cyber-physical systems (CPS) protection company, launched The CPS Library across its market-pioneering Claroty xDome and Claroty Continuous Threat Detection (CTD) solutions.  The CPS Library is the industry’s only asset catalogue that reaches new depths of visibility and enables precise and deterministic traceability for vulnerability attribution. To build the AI-powered, first-of-its-kind repository, Claroty partnered with automation vendors and medical device manufact...

Cyber threats skyrocket against UK budget office
Cyber threats skyrocket against UK budget office

Cyber threats against the Office for Budget Responsibility have over doubled in the past 12 months, ahead of Rachel Reeves’ crunch Autumn Budget. On November 26th, Reeves is set to announce a wave of economic policies to fight against the high cost of borrowing in the UK, with hints of income tax and inheritance tax hikes on the horizon.  The Office for Budget Responsibility provides an independent analysis of the UK’s public finances, from which the Chancellor of the Exchequ...

Cybersecurity resilience: Bridging confidence & capability
Cybersecurity resilience: Bridging confidence & capability

Immersive, the pioneer in cyber resilience, is revealing a widening gap between confidence and capability in cybersecurity. Despite record investment, heightened board oversight, and nonstop training, measurable readiness has flatlined. While nearly every organisation believes it can handle a major incident, the data tells a different story. According to Immersive’s analysis, average decision accuracy is just 22%, and the average containment time is 29 hours. Meanwhile, Resilience Scores...

Protei breach: Deep packet inspection systems exposed
Protei breach: Deep packet inspection systems exposed

A Russian telecom company that develops technology to allow phone and internet companies to conduct web surveillance and censorship was hacked, had its website defaced, and had data stolen from its servers, TechCrunch has learned. Founded in Russia, Protei makes telecommunications systems for phone and internet providers across dozens of countries, including Bahrain, Italy, Kazakhstan, Mexico, Pakistan and much of central Africa. The company, now headquartered in Jordan, sells video conferencin...

EclecticIQ expands leadership with new CMO & CRO
EclecticIQ expands leadership with new CMO & CRO

EclecticIQ, a global pioneer in cyber threat intelligence technology, announced the appointment of Andrew Milne as Chief Marketing Officer and Steve Armstrong as Chief Revenue Officer. The leadership expansion comes as EclecticIQ enters its next phase of growth, building the go-to-market capabilities required for further global scale in the rapidly evolving threat intelligence market.  As CMO, Milne will oversee marketing and sales development with three strategic imperatives: establishing...

iDenfy's new AAMVA KYC verification tool
iDenfy's new AAMVA KYC verification tool

iDenfy, a RegTech provider of identity verification and fraud prevention solutions, announced its latest software solution that connects to the American Association of Motor Vehicle Administrators (AAMVA) data source into its Know Your Customer (KYC) verification platform. Combined with other KYC tools, such as an additional licence check option, companies will now have a new workflow option that instantly verifies any U.S. citizen's driver’s licence faster. This will help ensure a higher...

barox expands to North America with networking solutions
barox expands to North America with networking solutions

Expanding their sales operation to cover North America, barox Kommunikation GmbH, the Swiss manufacturer of video security networking L2/L3 switches, media converters, IP extenders, and network management software has appointed Reinhard Florin to the role of Vice President of North America Sales. In this new role, Reinhard will be leading the development and execution of barox’s go-to-market strategy as well as head a team of sales and technical support professionals. Through this appoint...

Mobile threats spike: Zimperium's holiday season report
Mobile threats spike: Zimperium's holiday season report

Zimperium, the global pioneer in mobile security, released new research from its zLabs team revealing a sharp rise in mobile threats tied to the holiday shopping season. The Mobile Shopping Report: From Carts to Credentials highlights how cybercriminals are exploiting the seasonal surge in e-commerce and mobile app activity to target both consumers and enterprises. According to zLabs’ analysis, mishing (mobile phishing) remains the most widespread and effective mobile attack vector. Smis...

DigiCert & Citrix automate SSL/TLS for enterprises
DigiCert & Citrix automate SSL/TLS for enterprises

DigiCert, a global pioneer in intelligent trust, and Citrix, a business unit of Cloud Software Group, Inc., have announced an integration that automates the entire lifecycle of SSL/TLS certificates, from issuance to renewal. This collaboration pairs DigiCert’s capabilities with Citrix NetScaler’s Zero-Touch Certificate Management (ZTCM) and ACME protocol integration, empowering enterprises to maintain continuous security and compliance across hybrid and multi-cloud environments. Th...

Espria's Optimise IT event returns: Join the cybersecurity talk
Espria's Optimise IT event returns: Join the cybersecurity talk

Digital workplace solutions and managed services pioneer Espria returns in December with another Optimise IT exhibition, pioneering the discussion on how IT solutions can best work together to provide the ultimate support for businesses and end-user experience.  Post-COVID, Espria hosted a series of Optimise IT webinar discussions, covering themes such as business peace of mind, business readiness and AI integrations for workplace teams. These discussions have featured key spokespeople fro...

Clue AI tools elevating investigation efficiency
Clue AI tools elevating investigation efficiency

Clue Software, the major provider of investigation and intelligence management software, announced the latest evolution in its AI tool suite.  Built for intelligence and investigation professionals, Clue’s Assisted AI combines compliance, accuracy, and evidential integrity with human-in-the-loop design to enhance - not replace - expert judgment. Building on Clue’s existing AI capabilities, the new tools help teams assess, prioritize, and act with greater confidence and efficien...

Dell PowerProtect cyber resilience solutions
Dell PowerProtect cyber resilience solutions

In the face of escalating cyber threats, building a resilient organisation is no longer just an IT issue—it's a core business strategy. The ability to protect critical data and recover quickly after an attack is what defines success and ensures business continuity. This is particularly important as 79% of organisations are concerned that they will experience a disruptive event in the next twelve months. Dell Technologies is committed to helping users build that resilience. With the PowerP...

Securing data centres with access control
Securing data centres with access control

Genetec Inc. the global pioneer in enterprise physical security software, highlighted the critical need for IT managers to integrate physical security strategies into their overall security frameworks. As cyber and physical threats increasingly converge, the boundaries between digital and physical risk are blurring, making it essential for Middle East businesses to protect not only their data but also the environments where that data resides. With organisations in the region facing increasingl...

Rapid7 Q3 threat report: Ransomware & AI trends
Rapid7 Q3 threat report: Ransomware & AI trends

Rapid7, a pioneer in threat detection and exposure management, has released its Q3 2025 Threat Landscape Report, revealing how threat actors are accelerating the race between vulnerability disclosure and exploitation, consolidating ransomware power structures, and increasingly weaponising artificial intelligence to evade detection.  The report draws from Rapid7’s Intelligence Hub, AttackerKB, incident response, and managed detection and response (MDR) telemetry, offering data-driven...

Cyware launches AI Fabric in quarterback AI solution
Cyware launches AI Fabric in quarterback AI solution

Cyware, the pioneer in AI-powered threat intelligence management, secure threat sharing and collaboration, as well as hyper-orchestration and security automation, announced the launch of a new Cyware Quarterback AI solution delivering an AI Fabric to uniquely address security use cases. Cyware Quarterback AI was initially launched as a Co-pilot chat assistant in March 2024. Since that first release the AI market has evolved significantly and Cyware’s AI strategy and innovation h...

AuditBoard's 2026 internal audit insights
AuditBoard's 2026 internal audit insights

AuditBoard, the pioneering AI-powered global platform for connected risk, announced the findings of its 2026 Focus on the Future report, revealing the internal audit profession is navigating an environment of hyper volatility defined by accelerating, interconnected risks. The survey of 213 global internal audit pioneers shows the profession is being challenged by three converging forces: persistently tight resources, the rise of AI, and a demand for role redefinition. Overcome r...

Critical SAP vulnerability: Code injection threat
Critical SAP vulnerability: Code injection threat

SecurityBridge, creator of the Cybersecurity Command Center for SAP, announced that the SecurityBridge Threat Research Labs uncovered a critical SAP vulnerability rated a 9.9 out of 10 severity, and gave its customers advanced notice on October 30, 2025, to update detection signatures before the vulnerability was publicly disclosed.  In total, the Threat Research Labs uncovered three vulnerabilities that were among the 25 new and updated SAP Security Notes SAP published for its November Pa...

Infinigate appoints Peter Meier as new CFO & COO
Infinigate appoints Peter Meier as new CFO & COO

The Infinigate Group, the pioneering technology platform and trusted advisor in Cybersecurity, Cloud & Network Infrastructure, is appointing Peter Meier as its new Chief Financial Officer (CFO) and Chief Operating Officer (COO). Peter Meier brings long-standing experience as CFO and Management Board member of global technology companies, where he successfully led operational business transformation. Meier's considerable achievements Meier's considerable achievements include his...

Teleport expands EKS support at KubeCon 2025
Teleport expands EKS support at KubeCon 2025

KubeCon + CloudNativeCon in Atlanta, Teleport, the pioneer in Infrastructure Identity, announced expanded support for Amazon Elastic Kubernetes Service (EKS) within its Identity Security product. The new integration provides organisations with unprecedented visibility into Amazon EKS cluster activity, enabling teams to identify shadow access, privilege escalation, and identity-based risks across their managed Kubernetes environments. Teleport’s enhanced EKS support debuts at&nbs...

Railway security: Video surveillance essentials
Railway security: Video surveillance essentials

Those who’ve worked on railway security projects know that procuring a video surveillance system is not just about buying equipment — it’s about ensuring accountability, compliance, and system longevity. Take a common case: cameras installed before monsoon begin failing within months due to ingress and temperature stress. A security lapse follows, and multiple departments are drawn into scrutiny — S&T for specifications, procurement for documentation, and finance for...

Sectra unveils Tiger/E for mobile communication
Sectra unveils Tiger/E for mobile communication

The international cybersecurity and medical imaging IT company Sectra announces the launch of Sectra Tiger/E Managed Service—a sovereign, fully managed collaboration platform designed to meet the evolving needs of authorities, municipalities, essential entities, and corporations.  The new solution enables secure, scalable, and easy-to-use mobile communication for sensitive but unclassified information. It supports calls, video, and chat with strong encryption, provides endpoint secur...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec