SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Quantum Security insights from DigiCert at RSAC 2024
Quantum Security insights from DigiCert at RSAC 2024

DigiCert, a provider of digital trust announced its speaker lineup for its World Quantum Readiness Day event, set to take place virtually on September 26, 2024. Announced on the eve of RSAC 2024, the event is an opportunity to gain strategies that will help safeguard organisations and accelerate their path to preparedness for the quantum era.    Quantum computing “Quantum computing is transforming the landscape of digital security, and we are excited to help organisations prep...

CSM, Flexxon, and AI MSP sign MoU at Cyber DSA 2024
CSM, Flexxon, and AI MSP sign MoU at Cyber DSA 2024

CyberSecurity Malaysia (CSM), the national cybersecurity specialist agency under the purview of Malaysia’s Ministry of Digital signed a Memorandum of Understanding (MoU) with Flexxon and AI MSP. Flexxon is a global pioneer of AI-powered hardware security solutions, and AI MSP is an IT and cybersecurity company that offers Flexxon’s X-PHY AI Cybersecurity Solutions and professional services in Malaysia. Digital transformation  The MoU aims to establish a comprehensive framewor...

Rubrik and Mandiant partner for cyber resilience
Rubrik and Mandiant partner for cyber resilience

Rubrik, Inc., the Zero Trust Data Security™ company, announces a new partnership and technology integration with Mandiant, part of Google Cloud. The collaboration brings together pioneers in data security, incident response, and threat intelligence, aiming to expedite customers’ threat detection and path to cyber recovery. “This partnership will gations leveraging Rubrik’s backup solutions to identify threats in their backups powered by Mandiant’s industry-pio...

Ransomware trends: Rapid7 ransomware Radar Report
Ransomware trends: Rapid7 ransomware Radar Report

Rapid7, Inc., a pioneer in extended risk and threat detection, announced the release of its Ransomware Radar Report in conjunction with the company’s presence at Black Hat USA. The all-new research report provides a fresh perspective on the global ransomware threat by analysing, comparing, and contrasting attacker activity and techniques over an 18-month period ending June 30, 2024. According to the report, ransomware groups continue to refine their craft, building and scaling business mo...

SaaS alerts integrates Microsoft Defender for endpoint
SaaS alerts integrates Microsoft Defender for endpoint

SaaS Alerts, a cybersecurity company delivering an automated software-as-a-service (SaaS) security platform that enables managed service providers (MSPs) to detect and stop unauthorised activity in client SaaS applications, announced the integration of Microsoft Defender for Endpoint into its SaaS security platform. Integrating Defender into the SaaS Alerts platform provides MSPs with a single pane to view Microsoft’s Identity monitoring, Microsoft 365 application suite, and the endpoint...

Commvault expands cyber resilience ecosystem
Commvault expands cyber resilience ecosystem

Commvault, a provider of cyber resilience and data protection solutions for the hybrid cloud announced an expansion of its cyber and data security ecosystem through strategic integrations with an array of security partners: Acante, Dasera, Google Cloud, Splunk, and Wiz.   Cyber resilience These integrations play a key role in helping joint customers advance cyber resilience in a variety of ways across on-premises, hybrid, and cloud environments from identifying potential th...

Censys launches Community Forum for security professionals
Censys launches Community Forum for security professionals

Censys, the pioneering Internet Intelligence Platform for Threat Hunting and Attack Surface Management, announced the Censys Community Forum, a moderated, online platform for security professionals to discuss topics focused on threat hunting, attack surface management, general security expertise and more. Designed with security professionals in mind, the space provides over 70,000 members with free resources and data-driven security solutions through a centralised, accessible platform. Security...

Enhanced security with Lucid Software's Enterprise Shield
Enhanced security with Lucid Software's Enterprise Shield

Lucid Software, the pioneer in visual collaboration software announced the launch of Enterprise Shield, an enhanced layer of fortified security and granular control that organisations can add to Lucid’s already highly secure platform.   Safeguarding data "Our customers are building incredible things, with many working in highly regulated industries with very sensitive material that requires their intellectual property to be protected at the highest level,” said David Torg...

Cohesity data cloud: Advanced AI threat detection updates
Cohesity data cloud: Advanced AI threat detection updates

Cohesity, a pioneer in AI-powered data security and management, extended its first-mover advantage in GenAI detection and recovery capabilities with the addition of significant new enhancements to the Cohesity Data Cloud. These improvements allow customers to use Cohesity’s built-in AI capabilities to rapidly detect, investigate, and address potential threats within their environment, enabling them to restore operations far more quickly. New enhancements to Cohesity’s threat detect...

Genetec wins patent infringement case against Sensormatic
Genetec wins patent infringement case against Sensormatic

Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the lawsuit filed by Sensormatic against Genetec had ended definitively in the company's favour with Genetec exonerated of any patent infringement and with the court awarding Genetec attorney fees. Sensormatic Electronics, LLC, a subsidiary of Tyco International, which is now merged with Johnson Controls, filed suit against Genetec in Delaware in Jun...

Regula's ID verification solutions for 2024 Olympics Security
Regula's ID verification solutions for 2024 Olympics Security

Regula, a developer of forensic devices and identity verification solutions, prepared a dedicated package of expert articles focused on document verification, tailored to meet the needs of carriers, border verification authorities, the hospitality industry, and businesses during the 2024 Olympics. These resources aim to address the unique challenges posed by the influx of international visitors, ensuring seamless and secure experiences for all. Security and access management France...

Bugcrowd partners with Axon Technologies in EMEA market
Bugcrowd partners with Axon Technologies in EMEA market

Bugcrowd, the pioneer in crowdsourced security, has signed Dubai-based Axon Technologies as a value-added partner in the EMEA market. Axon Technologies AXON specialises in managed security services, SOC consulting, security engineering, advanced testing, and incident response services.  It has more than 60 customers in 12 countries across financial services, healthcare, government, and other verticals, with a particularly strong presence in its UAE base and Saudi Arabia.  Bugcrowd...

Compact AI explosion-proof camera by Hanwha Vision
Compact AI explosion-proof camera by Hanwha Vision

Hanwha Vision, the global vision solution provider, has launched the TNO-C8083E, its first explosion-proof camera with artificial intelligence. The compact 5MP explosion-proof AI model features AI object detection and classification alongside intelligent video analytics. It has a wide range of explosion-proof certifications, including IECEx, ATEX, KCs, and JPEx, making the camera ideal for environments at a higher risk of an explosive atmosphere due to gas or dust - such as oil refineries, gas...

Top 3 cyber-attacked industries in Q2 2024: Check Point report
Top 3 cyber-attacked industries in Q2 2024: Check Point report

Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry, and geography. These cyber attack numbers were driven by a variety of reasons, ranging from the continued increase in digital transformation and the growing sophistication of cybercriminals using advanced techniques like AI and machine learning. Need for robust cyber security Economic motivation for income from attacks like ransomware and phishing as well as attacks f...

Teresa Anania joins Sophos to boost customer success
Teresa Anania joins Sophos to boost customer success

Sophos, a global pioneer of innovative security solutions for defeating cyberattacks announced that Teresa Anania has joined the company as Chief Customer Officer (CCO). Anania will play a key role in accelerating Sophos’ customer and partner success initiatives to maximise the value of Sophos’ portfolio of cybersecurity solutions and services, including Managed Detection and Response (MDR) services and endpoint, network, email, and cloud security. Teresa Anania Anania has more th...

CyberCube SPoF intelligence on CrowdStrike Falcon outage
CyberCube SPoF intelligence on CrowdStrike Falcon outage

The faulty CrowdStrike Falcon Sensor update and subsequent outage – the CrowdOut Event – underscore the potential for Single Point of Failure (SPoF) technology outages to impact the global digital economy. CyberCube is advising clients on how to use SPoF Intelligence to identify exposed insureds and estimate the exposure footprint of the event. SPoF Intelligence is the definitive source for analysing a portfolio's digital supply chain, integrated with the industr...

HID unveils Mercury MP controllers for enhanced cybersecurity
HID unveils Mercury MP controllers for enhanced cybersecurity

Mercury Security, the manufacturer of OEM technology, and HID, a pioneer in trusted identity and access control solutions, announce the next-generation Mercury MP Controllers, designed to deliver enhanced flexibility and security for businesses of all sizes. As technology advances, access control systems require robust encryption and advanced threat detection. Mercury MP Controllers The new Mercury MP Controllers empower access control software providers and integrators to seamlessl...

Mimecast unveils human risk management platform for cybersecurity
Mimecast unveils human risk management platform for cybersecurity

Mimecast, a global cybersecurity pioneer, has unveiled its Human Risk Management (HRM) platform, marking an important and eagerly anticipated milestone in advancing toward the next generation of cybersecurity. HRM platform In response to customer and market demand for a more effective means of mitigating risk brought on by employee mistakes and user errors, Mimecast has charted a new path forward by developing a connected HRM platform. The platform will provide unprecedented visibility into a...

Siemens Xcelerator expands with AI Suite from IFS
Siemens Xcelerator expands with AI Suite from IFS

Siemens Smart Infrastructure has expanded its Siemens Xcelerator partner ecosystem with the addition of the AI-driven field service and asset management suite from IFS, the world’s pioneering provider of industrial AI and enterprise software for companies that manage complex assets, operations, and service-focused activities. SaaS solution The powerful SaaS solution includes AI-enabled asset monitoring and a scheduling and optimisation engine that enables increased resource utilisation a...

Distributed Cloud air-gapped appliance for secure edge AI
Distributed Cloud air-gapped appliance for secure edge AI

In harsh, disconnected, or mobile environments like disaster zones, remote research stations, or long-haul trucking operations, organisations face significant challenges in providing computing capabilities. Previously, organisations with mission-critical workloads lacked access to important cloud and AI capabilities when in demanding edge environments, including those that present unique challenges and requirements. Cloud and AI capabilities Google Cloud is excited to announce the general ava...

Corsha Inc. secures SBIR phase III contract for M2M security
Corsha Inc. secures SBIR phase III contract for M2M security

Corsha Inc., a Washington D.C.-based cybersecurity firm, known for its innovative Identity Provider for Machines, pioneering the way in Machine-to-Machine (M2M) security solutions, has been awarded an SBIR Phase III contract by the United States Air Force Sustainment Centre (AFSC).  This initiative will focus on developing a blueprint for streamlining how to get Authority to Operate (ATO) and Interim Authority to Test (IATT) certifications for new technologies on the Industrial Depot Maint...

Waterfall Security HERA: Secure OT remote access
Waterfall Security HERA: Secure OT remote access

Waterfall Security is delighted to announce the launch of HERA™-Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organisations to reap the operational and economical value of remotely accessing and controlling OT devices and workstations, without introducing the risks that come with external connectivity. Remote access is one of the weakest links when it comes to OT cy...

Software AG tops process mining in Gartner review
Software AG tops process mining in Gartner review

Software AG has ranked 1st for Automation Opportunities and Digital Transformation Use Cases in the Gartner® Critical Capabilities for Process Mining Platforms. This is the second consecutive year. Marc Vietor, Chief Product and Service Officer of ARIS, commented: "I believe our continued pursuit of excellence and innovation led to this recognition, to be ranked first in two use cases. Businesses everywhere are fighting on multiple fronts to become more efficient by optimising their pr...

Heathrow innovates operations with Genetec security solutions
Heathrow innovates operations with Genetec security solutions

Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations that is securing people and assets, bringing efficiency, and enhancing the passenger experience while ensuring data privacy and cyber...

JumpCloud reports on SME cybersecurity threats in 2024
JumpCloud reports on SME cybersecurity threats in 2024

JumpCloud Inc. released the results of its Q3 2024 SME IT Trends Report, “Detours Ahead: How IT Navigates an Evolving World.” The seventh edition of the report provides new insights around the challenges and opportunities facing IT teams at small and medium-sized enterprises (SMEs). It covers topics such as: The growing threat of shadow IT and AI How teams manage complicated device and IT environments The relationship between IT and managed service providers (MSPs) IT professio...

UK-Poland led Baltic Mule boosts cyber resilience
UK-Poland led Baltic Mule boosts cyber resilience

Exercise Baltic Mule was a joint UK and Poland-led exercise to reduce the cyber vulnerabilities of frontline military activity and ensure protection against future threats. The exercise helped to improve frontline units’ ability to withstand cyberattacks and continue their missions even when facing sophisticated cyber threats.   Cyber mission assurance International participants gathered in Poland for the exercise including from Canada, Estonia, Germany, Latvia, Lithuania, Poland,...

Alibaba Cloud powers Paris 2024 with Energy Expert
Alibaba Cloud powers Paris 2024 with Energy Expert

Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, has announced that the International Olympic Committee (IOC) will deploy its data-driven sustainability solution – Energy Expert – to help measure and analyse the electricity consumption at the competition venues of the forthcoming Olympic Games Paris 2024 ('Paris 2024'). Cloud-based platform By migrating the intelligence related to the power consumption and demand of the competition venues to the clo...

Cyber protection enhanced in new Acronis True Image release
Cyber protection enhanced in new Acronis True Image release

Acronis, a global pioneer in cybersecurity and data protection, is pleased to announce that its flagship product, Acronis Cyber Protect Home Office, is reverting to its original name, Acronis True Image, with the new version release. Performance and cybersecurity Users across the globe can experience the latest release of Acronis True Image, featuring enhanced performance and cybersecurity capabilities to meet today’s cybersecurity challenges.   Introduced in 2003, Acronis Tru...

Genesis Cloud and Photoroom partnership for AI photo editing
Genesis Cloud and Photoroom partnership for AI photo editing

Whilst the transformative capabilities of AI have captured the global consciousness, the sustainability of its usage is one such topic that has been slow to attract attention. Due to the intense computational power needed to run and train AI models, the energy consumption of these computers is immense, with one study by Cornell University showing that training some models, such as GPT-3, burned up to 500 metric tons of CO2, comparable to a coal power plant running for 10 hours. AI-powered ph...

Cubbit raises $12.5M to revolutionise European cloud storage
Cubbit raises $12.5M to revolutionise European cloud storage

Cubbit, the first geo-distributed cloud storage enabler announced the closing of its $12.5M funding round. With this new funding, the company will enable European Service Providers and Companies to take back full independence and control over their data, infrastructures, and costs. Data security challenges More than 180 billion Terabytes of data will be produced in 2025, and 75% of this will be created and processed at the edge. This explosive growth raises data orchestration complexity, cybe...

View more
  • «
  • 1
  • 2
  • ...
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec