SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Rapid7's Vector Command enhances IT security posture
Rapid7's Vector Command enhances IT security posture

Rapid7, Inc., a pioneer in extended risk and threat detection, announced the availability of Vector Command, a fully-managed offensive security service. Vector Command combines the external attack surface assessment capabilities of Rapid7’s recently launched Command Platform with continuous Red Teaming services by its internal experts to help customers identify and validate IT security posture weaknesses from an attacker’s perspective. Security risks Vector Command delivers a...

Comcast smart access control solutions from Brivo
Comcast smart access control solutions from Brivo

Comcast Smart Solutions, a division of Comcast Cable that specialises in smart technologies for businesses and communities, expanded its offerings to include smart access control. Comcast Smart Solutions is now offering cutting-edge smart access management solutions to its customers from Brivo, a global pioneer in cloud-based access control and physical security technologies. Advanced control panels Comcast Smart Solutions clients have access to a broader suite of keys that help provide secur...

Immersive Labs launches human connection cyber community
Immersive Labs launches human connection cyber community

Immersive Labs, the global pioneer in people-centric cyber resilience announced the launch of the Immersive Labs community, called the “Human Connection”.  This new online hub offers resources and cybersecurity insights from the company’s world-class subject matter experts and discussions to give cyber professionals an advantage over cyber threats. Cybersecurity The launch supports Immersive Labs’ mission to empower the world’s largest organisations with the...

GSX 2024: Latest security tech & insights by ASIS
GSX 2024: Latest security tech & insights by ASIS

Artificial intelligence, public, school, and corporate security, and cyber- and tech-related crimes are growing concerns making headlines daily. Global Security Exchange (GSX) by ASIS International brings together thousands of security professionals from approximately 100 countries to address these issues and more. Members of the press are eligible to receive a free all-access pass. For security reasons, a press badge is required to enter the event, so if they are interested in attending,...

Lenovo partners with SentinelOne for AI endpoint security
Lenovo partners with SentinelOne for AI endpoint security

SentinelOne and Lenovo announced a multi-year collaboration to bring AI-powered endpoint security to millions of Lenovo devices across the globe. Lenovo will include SentinelOne’s industry-pioneering Singularity™ Platform and generative AI capabilities (Purple AI) in new PC shipments, as well as offer upgrades to existing customers, to expand its ThinkShield security portfolio and autonomously protect devices from modern attacks. SentinelOne's Singularity Platform "The comple...

HackerOne Essential VDP: Free vulnerability disclosure program
HackerOne Essential VDP: Free vulnerability disclosure program

HackerOne, the pioneer in human-powered security, announced Essential VDP — a free, entry-level tier of HackerOne Response, its Vulnerability Disclosure Program (VDP) product. Any organisation can now establish a VDP with HackerOne to help address compliance requirements and maintain a direct channel for the global researcher community to report high-impact vulnerabilities. Regulatory requirements “Adopting a vulnerability disclosure program ensures that an organisation is pr...

SDAIA and NVIDIA elevate AI innovation in Saudi Arabia
SDAIA and NVIDIA elevate AI innovation in Saudi Arabia

SDAIA is thrilled to announce a groundbreaking collaboration with NVIDIA that will propel Saudi Arabia to the forefront of AI innovation. At the heart of this collaboration is the integration of the latest NVIDIA technological advancements to enable developers to easily build and deploy AI applications with the ALLaM Arabic LLM model, ensuring unparalleled performance and scalability for region-specific workloads. NVIDIA NeMo Leveraging NVIDIA NeMo, part of the NVIDIA AI Enterprise software p...

Security Essen 2024: Innovations and Exhibitors at Messe Essen
Security Essen 2024: Innovations and Exhibitors at Messe Essen

Over 500 exhibitors present their innovations at Messe Essen from September 17 to 20. The topic of security is more topical than ever. Whether cybercrime, burglary protection or access control-the demand in industry, companies and private households for individual and tailor-made security solutions is constantly increasing. As the pioneering trade fair, Security Essen brings the security industry together and showcases the industry's innovations and further developments with around 500 exhibito...

Infosys enables Clearstream's D7 Generation 2 platform launch
Infosys enables Clearstream's D7 Generation 2 platform launch

Infosys, a global pioneer in next-generation digital services and consulting, announced that it has collaborated with Clearstream, the post-trade services part of Deutsche Börse, an international exchange organisation and pioneering provider of market infrastructure. The collaboration supported the successful Generation 2 launch of Clearstream's D7 platform, an innovative digital post-trade platform that allows market participants to issue securities digitally. Release of D7 Generati...

Espria hosts Optimise 2024 Q3 webinar on AI in the workplace
Espria hosts Optimise 2024 Q3 webinar on AI in the workplace

In July, Espria, a provider of digital workspace solutions, hosted their Optimise 2024 Q3 webinar, which focussed on supporting operational teams and services with AI-driven tools and featured discussions with some of their key solutions partners from, Gamma, Sophos, Xerox, and TP-Link.  AI in the workplace These industry pioneers came together in an open forum to discuss AI in the workplace, identifying key benefits and challenges that have arisen and will continue to occur as more...

SIA Women in Security Forum: Jackie Bray at ISC East
SIA Women in Security Forum: Jackie Bray at ISC East

ISC East, with its premier sponsor the Security Industry Association (SIA), and in partnership with the ASIS NYC Chapter, announced 2024’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination. ISC East Keynote Series Day 1 Keynote: Proactive Security Strategies at Navy Pier, Chicago: A Unified Approach to Emergency Preparedness and Response – Brian Murphy, chief operating officer at Navy Pier in Chicago, Illinois,...

Cyber resilience strategies: Insights from Commvault
Cyber resilience strategies: Insights from Commvault

Commvault, a pioneering provider of cyber resilience and data protection solutions for hybrid cloud organisations, released new critical insights from its 2024 Cyber Recovery Readiness Report. This global survey of 1,000 security and IT professionals across 11 countries, reveals interesting behaviour changes for organisations that have been breached versus those that have not. Cyber resilience and recovery The Commvault survey, done in collaboration with GigaOm, shows that organisations...

i-PRO announces comprehensive AI governance initiative
i-PRO announces comprehensive AI governance initiative

i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for video protection and public safety, announced the establishment of a comprehensive AI governance framework. This initiative aims to ensure the responsible research, development, and utilisation of AI technologies. Building on the Ethical Principles for AI published by i-PRO in December 2023, the company has taken further steps by launching the i-PRO AI Ethics Committee in June 2024. AI ethics...

PACOM launches VIGIL CORE next-gen cloud security platform
PACOM launches VIGIL CORE next-gen cloud security platform

PACOM, a pioneering provider of access control and integrated security management solutions, has launched VIGIL CORE, its next-generation cutting-edge cloud-based platform offering greater efficiency, a long-term solution, and value beyond traditional security. The solution is a centrally controlled security and business management platform that is intelligent, user-friendly and highly cost-effective, and will prove to be a great fit for customers with single sites, hundreds of sites or large c...

Proofpoint and CyberArk enhance identity security
Proofpoint and CyberArk enhance identity security

Proofpoint, Inc., a pioneering cybersecurity and compliance company, and CyberArk, the identity security company, announced an extended strategic collaboration, working together to help organisations around the world secure identities everywhere. Supporting this joint aim, the expanded partnership includes the launch of new integrations and solutions to address critical cyber challenges. Securing Identities Digital transformation and the cloud have altered infrastructures, while mobile t...

Zerto and IDC survey: Backup failures cause data loss globally
Zerto and IDC survey: Backup failures cause data loss globally

Zerto, a Hewlett Packard Enterprise company, recently commissioned IDC to conduct a major ransomware and disaster preparedness survey, which revealed the extent to which backup-related issues are currently failing organisations across the globe. These backup-related issues are currently the number one cause of data loss —responsible for 32% of incidents — despite the fact that backup and recovery was cited as the number one priority for IT software investment this year.  Data...

TeamViewer: Boosting UK business with technology connectivity
TeamViewer: Boosting UK business with technology connectivity

Research released shows that 39% of UK businesses with excellent technology connectivity say their financial performance is among the pioneers in their industry. In addition, 62% say that excellent tech connectivity gives them a competitive edge. TeamViewer, a pioneering global provider of remote connectivity and workplace digitalisation solutions, undertook global research conducted by FT Longitude to uncover ‘The Real Value of Technology Connectivity’.  Cybersecurity perform...

Quod Orbis partners with Archer for cybersecurity and compliance
Quod Orbis partners with Archer for cybersecurity and compliance

Quod Orbis, the London-based Continuous Controls Monitoring (CCM) firm, has announced a partnership with Archer, a global pioneer in integrated risk management. Quod Orbis’ continuous monitoring solution is listed on the Archer Exchange, providing customers with complete and constant visibility into a company’s cybersecurity, compliance, and risk posture with near real-time insights.  Quod Orbis platform Archer has been a pioneer in risk management for over 20 years, unitin...

Vantiva AI innovations at IBC 2024: STBs and gateways
Vantiva AI innovations at IBC 2024: STBs and gateways

Vantiva, a global technology pioneer enabling Network Service Providers (NSPs) to connect consumers worldwide, will demonstrate innovative AI-powered products at IBC 2024, including set-top boxes (STBs) and broadband gateways, all connected to Vantiva's Navigate AI cloud. This new class of CPE features a local Neural Processing Unit (NPU) and enhanced CPU and GPU performance, ensuring more private, secure and lower latency Edge AI use cases. This positions operator as "Home AI" platform provide...

Matrix STQC-certified video surveillance for ultimate protection
Matrix STQC-certified video surveillance for ultimate protection

Matrix Video Management Software (VMS) has achieved STQC certification, underscoring its commitment to advanced cybersecurity. This certification highlights Matrix’s dedication to delivering a video surveillance solution that not only protects physical assets but also ensures the highest level of data security. In an era where cyber threats are increasingly sophisticated, securing the video surveillance system is critical. A compromised system can expose live video feeds, alter or erase f...

Absolute acquires Syxsense for cyber resilience innovation
Absolute acquires Syxsense for cyber resilience innovation

Absolute Security, the pioneer in enterprise cyber resilience, has acquired Syxsense, a recognised innovator in automated endpoint and vulnerability management. Firmware-embedded platform With Syxsense integrated, customers will be able to add automated, vulnerability and patch management capabilities. From the moment devices are powered on, organisations will be able to leverage Absolute’s firmware-embedded platform to ensure that operating systems (OS), applications, and critical secu...

Enhanced security for Confindo via iDenfy fraud prevention
Enhanced security for Confindo via iDenfy fraud prevention

iDenfy, an AI-powered identity verification, compliance, and fraud prevention solutions provider, partnered with Confindo, a provider of IT solutions specialising in customer relationship management (CRM) tools for group companies and external partners. This collaboration will help Confindo manage third-party risks and ensure proper fraud and breach prevention while building a seamless and secure verification experience. Need for robust security measures The rise in digital transactions has m...

AI training in sheet metal industry: SMACNA and TheLink.ai
AI training in sheet metal industry: SMACNA and TheLink.ai

The Sheet Metal and Air Conditioning Contractors' National Association (SMACNA) has announced a strategic partnership with TheLink.ai, a major innovator in artificial intelligence (AI) solutions. This collaboration aims to advance SMACNA's AI training and policy initiatives, enhancing the industry's adoption and implementation of cutting-edge technologies and providing members with essential insights and training, as AI continues to grow in importance. AI training programs The initiatives wil...

Enterprise AI success with Domino Data Lab's ModelOps
Enterprise AI success with Domino Data Lab's ModelOps

Domino Data Lab, provider of the pioneering Enterprise AI Platform trusted by the largest AI-driven companies, announced it has been recognised for the second year in a row as a pioneer and top performer by Dresner Advisory Services in its Wisdom of Crowds® market studies on both AI, Data Science and Machine Learning (AI/DS/ML), as well as ModelOps. Enterprise AI success “We have over a decade of research on AI/DS/ML and our latest study reflects the growing significance of these tec...

HackerOne expands with APNT for advanced cyber resilience
HackerOne expands with APNT for advanced cyber resilience

HackerOne, the pioneer in human-powered security, announced partnerships with GuidePoint Security and Softcat to simplify how enterprises access the world’s largest security researcher community. Through PartnerOne, partners will open new revenue streams with buyers worldwide who must meet growing global regulatory requirements and fight complex, emerging threats. Additional international partners, including APNT and BlueFort Security will serv...

AI-powered remote guarding by Elite at Global Security Expo
AI-powered remote guarding by Elite at Global Security Expo

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces its participation as a featured presenter at the 2024 Global Security Expo (GSX) Sept. 23-25 in Orlando, Fla.  Elite is organising the session, “Remote Guarding Has Made Real-Time Crime and Catastrophe Prevention a Reality,” scheduled for Tuesday, Sept. 24, from 11:15 a.m. to 12:15 p.m., at the Orange County Convention Center....

Genetec unveils secure I/O module for access control
Genetec unveils secure I/O module for access control

Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the introduction of a new I/O module to its portfolio of high-assurance access control system offerings.  Developed by STid, a pioneering manufacturer of highly secure access control technologies, the new I/O module enables European customers to meet the most stringent cybersecurity compliance regulations. Cybersecurity capabilities From the creden...

Proofpoint unveils human-centric data protection framework
Proofpoint unveils human-centric data protection framework

Proofpoint, Inc., a cybersecurity and compliance company announced the launch of a proprietary, partner-friendly, end-to-end information protection framework, providing organisations access to unmatched expertise, industry benchmark data, and proven methodology in designing, implementing, and maturing data loss prevention (DLP) programmes. DLP programme While DLP programmes and technology are undoubtedly maturing, only 38% of organisations say they have a “mature” DLP programme. Or...

Proofpoint boosts digital communications governance with AI
Proofpoint boosts digital communications governance with AI

Proofpoint, Inc., a cybersecurity and compliance company announced the general availability of its Digital Communications Governance (DCG) offering, bolstering its existing offerings in pace with the evolving modern data governance and enterprise archiving market. DCG offering The new offering helps organisations simplify the governance of communication data and provides security insights across all major digital channels for conducting risk. It leverages artificial intelligence (AI) to surfa...

Allied Universal: Security tips for election debates
Allied Universal: Security tips for election debates

Allied Universal®, the globally renowned provider of security solutions for the government sector, provides critical security planning and mitigation recommendations for the upcoming debates in its recently released special report titled Physical Security During an Election: Expect the Unexpected and Prepare for it All. According to Allied Universal’s experienced team of security and intelligence professionals, a wide range of security measures must be planned, reviewed, revised as ne...

View more
  • «
  • 1
  • 2
  • ...
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec