SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Ivanti report: GenAI's impact on cybersecurity
Ivanti report: GenAI's impact on cybersecurity

Ivanti, the tech company that breaks down barriers between IT and security so that Everywhere Work can thrive, released its latest report, Generative AI and Cybersecurity: Risk and Reward, which explores how organisations are navigating the complexities of generative AI (GenAI) in the realm of cybersecurity, highlighting both the opportunities and challenges it presents.   GenAI is a powerful tool that can be used by security teams to protect organisations, however, it can also be use...

NCSC's annual review: Cyber threats intensifying
NCSC's annual review: Cyber threats intensifying

The National Cyber Security Centre (NCSC) new cyber chief, Richard Horne, has issued a stark warning about the growing complexity of “widely underestimated” cyber threats. Speaking at the launch of the NCSC’s eighth annual review, Richard Horne, Cyber Security Chief, commented: “What has struck me more forcefully than anything else since taking the helm at the NCSC is the clearly widening gap between the exposure and threat we face, and the defences that are in place to...

Wipro & Netskope enhance cybersecurity with SASE
Wipro & Netskope enhance cybersecurity with SASE

Wipro Limited, a pioneering technology services and consulting company, announced a partnership with Netskope, a Secure Access Service Edge (SASE) pioneer, to provide global enterprises with an integrated service that optimises and improves cybersecurity outcomes for people, processes, and technology investments. Wipro’s CyberTransformSM Optimisation Service, powered by Netskope, analyses organisations’ current cybersecurity and infrastructure investments, provides consolidation gui...

SecurityBridge partners with Altum for SAP security
SecurityBridge partners with Altum for SAP security

SecurityBridge, the Cybersecurity Command Centre for SAP, announced a strategic partnership with Altum Strategy Group (Altum), a pioneering advisory firm specialising in Responsible Transformation, Intelligence, Data & Technology, Operational Excellence, and Risk Management. This partnership will empower Altum’s small to mid-sized clients with SecurityBridge’s comprehensive SAP-native cybersecurity platform, providing a holistic approach to solving their SAP security challe...

Optalysys and Zama advance FHE for secure computing
Optalysys and Zama advance FHE for secure computing

Optalysys, a company enabling the future of secure computing, has partnered with Zama, the open-source cryptography company building state-of-the-art FHE solutions for blockchain and AI, to advance the development of Fully Homomorphic Encryption (FHE). The partnership will see the integration of Zama’s FHE solution with Optalysys’ hardware acceleration product range, Enable, to expedite FHE adoption for its customers.  Zama’s software solutions Zama’s softwar...

Datamatics achieves Cyber Essentials certification
Datamatics achieves Cyber Essentials certification

Datamatics, a global Digital Technologies, Operations, and Experiences company, has achieved the Cyber Essentials and Cyber Essentials Plus certifications.  Backed by the UK Government's National Cyber Security Centre (NCSC), these certifications validate Datamatics' robust security practices and position the company as a preferred partner for enterprises seeking trusted and secure solutions. Datamatics' proactive approach The process involved a specific evaluation of Datamatics' defence...

Matrix shines at Inno Rail 2024 with RDSO solutions
Matrix shines at Inno Rail 2024 with RDSO solutions

Matrix concluded a remarkable showcase at Inno Rail 2024, held from November 28 to 30 at the RDSO Stadium Ground in Lucknow. At Booth No. 81, Matrix captivated attendees with its trailblazing security and communication solutions, specifically designed for railway and transportation sectors. Meeting stringent cybersecurity standards Visitors experienced Matrix’s RDSO 6.0-compliant network cameras, a first for India, which meet the stringent cybersecurity standards of Indian Railways. Th...

Protect against malware with NordLayer's new feature
Protect against malware with NordLayer's new feature

The most common file formats for hiding malware are .exe and .zip, according to research by NordVPN. These are also the file formats that frequently land on employees' computers and end up posing great security risks to organisations. To address the issue, NordLayer, a provider of flexible cybersecurity tools for businesses, has just launched Download Protection, a robust security feature that automatically scans and instantly removes various types of malware-infected files from user-initiated...

Cohesity boosts data security for Haute-Garonne Council
Cohesity boosts data security for Haute-Garonne Council

Cohesity, a pioneer in AI-powered data security, now supports the Haute-Garonne Departmental Council with Cohesity DataProtect. This allows the organisation to drastically reduce the time and resources needed to manage its backups, both on-premises and in the cloud and significantly accelerate the data recovery processes to enhance its cyber resilience. The Haute-Garonne Departmental Council manages a vast collection of data covering different functions, including building plans, architectural...

Strategic leadership boosts artius.iD growth
Strategic leadership boosts artius.iD growth

artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporatio...

Post-quantum cryptography 2025: DigiCert predictions
Post-quantum cryptography 2025: DigiCert predictions

DigiCert, a pioneering global provider of digital trust, released its annual forecast of cybersecurity predictions for identity, technology, and digital trust expected to shape the landscape in 2025 and beyond. These predictions provide a snapshot of the cybersecurity challenges and opportunities enterprises will encounter in the months ahead. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog. Prediction 1: Post-Quantum Cryptography Takes Off...

AI in video surveillance - Eagle Eye Networks report
AI in video surveillance - Eagle Eye Networks report

Eagle Eye Networks, the global pioneer in cloud video surveillance released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025.  Designed as a resource for business owners and security professionals, the report offers trend analysis, simple explanations of newer technology, and practical advice on implementing video surveillance in new ways.   AI in video surveil...

Modernise access control with Alcatraz AI's Rock solutions
Modernise access control with Alcatraz AI's Rock solutions

Alcatraz AI, a pioneer in access control and AI-powered security solutions, announces the launch of its “Switch to Alcatraz AI” promotion. From November 18, 2024, through February 15, 2025, this initiative offers an exclusive discount for new customers seeking to replace outdated biometric readers with Alcatraz AI’s advanced Rock or Rock X solutions–modern, frictionless facial authentication systems that enhance security without compromising user privacy. Physical and c...

adesso joins CCS Cloud-14 framework for secure IT solutions
adesso joins CCS Cloud-14 framework for secure IT solutions

IT services provider - adesso has been admitted into the Crown Commercial Service (CCS) Cloud-14 framework, supporting the UK’s public sector in its journey toward secure, streamlined, and efficient digital transformation. The Cloud-14 framework facilitates access to IT services for government organisations, empowering them to innovate, strengthen data security, and scale services to meet public needs more effectively. Innovative solutions adesso delivers innovative solutions that enhan...

Innovating security: Cisco at Black Hat MEA 2024
Innovating security: Cisco at Black Hat MEA 2024

Ahead of the Black Hat MEA in Riyadh from 26-28 November 2024, Cisco, the worldwide pioneer in networking and security, released insights into key cybersecurity trends that emerged between July and September 2024. The findings are based on analysis from Cisco Talos, one of the most trusted threat intelligence research teams globally, highlighting a notable increase in identity-based and ransomware attacks.  Identity-based attacks Over the three-month period, there was a noticeable rise...

Beyond Encryption & Mimecast transform email security
Beyond Encryption & Mimecast transform email security

Beyond Encryption, a pioneer in secure digital communications, has announced a powerful new technology partnership with Mimecast, a global heavyweight in cybersecurity. The technology partnership aims to transform how businesses manage security and compliance, combining Beyond Encryption’s cutting-edge expertise in authenticated outbound comms with Mimecast’s proven track record in human risk management and robust email services.  Data protection standards Businesses are now...

ENCS welcomes IPTO as new member for cybersecurity
ENCS welcomes IPTO as new member for cybersecurity

The European Network for Cyber Security (ENCS) announces that IPTO (Independent Power Transmission Operator), Greece's transmission system operator, has officially joined the network as a full member. With this new partnership, IPTO will actively participate in shaping the ENCS's strategy, while benefitting from the extensive cybersecurity knowledge sharing, training, and research available to ENCS members. Reliable transmission of electricity IPTO operates and keeps Greece's high-v...

DMARC Manager by Hornetsecurity: Boost email security
DMARC Manager by Hornetsecurity: Boost email security

Hornetsecurity, a global pioneer in cybersecurity solutions, is excited to announce the launch of its DMARC Manager. The advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and impersonation attacks continue to rise, the need for robust email authentication practices has never been more critical. DMARC Manager is designed to empower administrators...

Cyware names Jawahar Sivasankaran as president
Cyware names Jawahar Sivasankaran as president

Cyware, the pioneering provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, announced the appointment of Jawahar Sivasankaran as President, marking a pivotal step in Cyware’s mission to empower organisations with advanced threat intelligence and security solutions.  Jawahar brings 25+ years of experience fostering security product innovation, growth leadership, and customer success at Cisco, Splunk, and Appgate. Prior roles of Jawahar...

Best enterprise security solutions 2024 reviewed by AV-Comparatives
Best enterprise security solutions 2024 reviewed by AV-Comparatives

AV-Comparatives, a globally recognised independent organisation specialising in cybersecurity testing, is pleased to announce the results of its 2024 Advanced Threat Protection (ATP) Test for enterprise cybersecurity solutions. This comprehensive evaluation provides Chief Information Security Officers (CISOs) with critical insights into the efficacy of leading endpoint protection products against sophisticated, targeted cyber threats. ATP Test The ATP Test rigorously assesses each product's a...

AUCSO European Conference on physical security 2024
AUCSO European Conference on physical security 2024

The Association of University Chief Security Officers (AUCSO), the renowned organisation for security professionals working in Higher and Further Education around the world, is to host its first European Region Winter Conference at Leiden University in the Netherlands.  The Conference, which takes place from Wednesday, 27 November 2024 until Friday, 29 November 2024, is free to all AUCSO members. European Winter Conference Benny Vandenberghe, Chair of the European Region for AUCSO will o...

i-PRO's AI-driven cameras with LPR capabilities
i-PRO's AI-driven cameras with LPR capabilities

i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security and public safety solutions, announced a new line of High Zoom Bullet cameras designed to deliver exceptional long-range coverage with advanced edge AI capabilities. Equipped with powerful zoom and IR LED technologies, the new cameras offer unrivaled precision for long-distance monitoring across various environments, such as highways, parking lots, bridges, ports, and stadiums. The new lineup includes 10x...

Dallmeier's video tech guide for CRITIS security managers
Dallmeier's video tech guide for CRITIS security managers

“CRITIS” security managers worldwide are confronted with a multitude of information, new requirements, and questions, not least against the background of massive geopolitical changes. The new “International CRITIS Practical Guide to Video Technology” from Germany-based manufacturer Dallmeier Electronic is intended to provide support. Compared to the first German edition, this internationally oriented, English-language practical guide has a broader definition of the CRITI...

Oliver Newbury joins Immersive Labs Board
Oliver Newbury joins Immersive Labs Board

Immersive Labs, the pioneer in people-centric cyber resilience, has announced the appointment of Oliver Newbury to its Board of Directors. Newbury brings a wealth of experience and insights as a global cybersecurity executive and advisor for some of the largest multinational enterprises.  Oliver Newbury Oliver Newbury’s guidance will help inform Immersive Labs’ business strategy and innovation. The company, whose mission is to give workforces the human edge over cyber threat...

adCAPTCHA partners with Indie Ridge for bot protection
adCAPTCHA partners with Indie Ridge for bot protection

adCAPTHCA, the specialist security verification platform, has partnered with web development agency Indie Ridge to protect its clients from bot attacks through human verification technology. Indie Ridge delivers technical solutions on behalf of the UK’s leading creative agencies, but the rapid increase of bot traffic on client websites was compromising user experience, distorting analytics, and creating security vulnerabilities, as well as being a potential attack vector into the brand&rs...

Revolutionise security with Elite Remote Guarding
Revolutionise security with Elite Remote Guarding

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the launch of a new educational webinar series. Featuring some of the industry’s foremost subject matter experts and thought pioneers, the sessions are designed to inform security practitioners about the latest developments in security technologies and methodologies, crime and loss prevention, vertical market challenges, law enforcement,...

Immersive Labs launches AI Scenario Generator
Immersive Labs launches AI Scenario Generator

Immersive Labs, the pioneer in people-centric cyber resilience announced the launch of its ground-breaking 'AI Scenario Generator'. This new capability enables organisations to seamlessly generate threat scenarios for crisis simulations to ensure their workforces are ready for the latest threats. ‍AI Scenario Generator By inputting a few short prompts, customers can use the AI Scenario Generator to rapidly generate and launch customised cyber exercises to prove and improve individual and...

Sophos expands cybersecurity growth with Andy Travers
Sophos expands cybersecurity growth with Andy Travers

Sophos, a global pioneer of innovative security solutions for defeating cyberattacks announced the appointment of Andy Travers as regional vice president for EMEA North to further accelerate the growth of Sophos’ portfolio of cybersecurity services and products in the region.  Andy Travers Travers will drive growth by strengthening existing relationships and creating new opportunities with Sophos’ already strong customer base of more than 600,000 organisations worldwide. Trav...

Cybersecurity & compliance: Espria's strategic approach
Cybersecurity & compliance: Espria's strategic approach

Persistent cyber threats, rapidly changing technology, and the growing array of regulations have heightened the need for alignment between cybersecurity and compliance management. In its annual Digital Defence Report, Microsoft has sounded the alarm on the escalating number of cyberattacks with a 2.75-fold increase in ransomware attacks year-on-year and tech scams rising by 400% since 2022. Level of sophistication “In the world of business, you’ll inevitably hear about the many wa...

Spencer Marshall joins Gallagher Security executive team
Spencer Marshall joins Gallagher Security executive team

Global security manufacturer, Gallagher Security is excited to announce the appointment of Spencer Marshall as Executive Vice President - UK and Europe. He will lead the entire Gallagher Security business in these regions, as well as being a member of the global executive team to help develop and drive strategy.  Spencer Marshall Of his appointment, Spencer says he is thrilled to be joining the Gallagher team at such a pivotal time, as it continues to expand its footprint across both the...

View more
  • «
  • 1
  • 2
  • ...
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec