SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Clifford Chance announces participation in Department of Commerce consortium dedicated to AI safety
Clifford Chance announces participation in Department of Commerce consortium dedicated to AI safety

Global law firm Clifford Chance announced that it is participating in a Department of Commerce initiative to support the development and deployment of trustworthy and safe Artificial Intelligence (AI). Established by the Department of Commerce’s National Institute of Standards and Technology (NIST) on February 8, 2024, the U.S. AI Safety Institute Consortium (AISIC) brings together AI creators and users, academics, government and industry researchers, and civil society organisat...

Oakdoor partners with Nexor to advance high assurance security solutions
Oakdoor partners with Nexor to advance high assurance security solutions

Oakdoor, a pioneer in hardware-enforced security solutions, which is part of PA Consulting (PA), and Nexor, the pioneering specialist in Secure Information Exchange, have announced a strategic partnership to advance a high assurance cross-domain solution for secure data sharing. The partnership will start to create highly integrated software guarding and hardware verification solutions – with the aim of making access to data more secure and manageable for customers using multiple security...

Databarracks acquires PlanB for enhanced operational resilience
Databarracks acquires PlanB for enhanced operational resilience

Databarracks, the technology and business resilience specialist has acquired Glasgow-based PlanB Consulting to enhance its Operational Resilience and Cyber Continuity consulting practice. PlanB Consulting Chris Butler, Resilience Director, Databarracks commented, “We are thrilled to have PlanB join us. PlanB has been a powerhouse in Business Continuity and Resilience for almost two decades. They’re widely known, highly respected, and one of the true thought pioneers in our ind...

CISOs confident about data privacy and security risks of generative AI, according to ClubCISO study
CISOs confident about data privacy and security risks of generative AI, according to ClubCISO study

New data from the latest members’ survey of the ClubCISO community, in collaboration with Telstra Purple, highlight CISOs’ confidence in generative AI in their organisations. Around half of those surveyed (51%), and the largest contingent, 50%) believe these tools are a force for good and act as security enablers. In comparison, only 25% saw generative AI tools as a risk to their organisational security. Risks linked to Gen AI tools The study's findings underscore the proactive st...

Generative AI ‘a unique opportunity’ to level the playing field for Women in Tech, says BCG study
Generative AI ‘a unique opportunity’ to level the playing field for Women in Tech, says BCG study

The proliferation of Generative AI in the workplace has helped level the playing field for women in technology, according to a new study from Boston Consulting Group. 68 percent of women in the tech industry say they use a GenAI tool more than once a week, compared to 66 percent of men, highlighting that women are on par with, and in some cases outpacing, men in terms of GenAI adoption. This is especially true for senior women in tech functions such as engineering, IT, customer suppor...

Check Point reports rise in Androxgh0st Attacks and LockBit3 ransomware
Check Point reports rise in Androxgh0st Attacks and LockBit3 ransomware

Check Point® Software Technologies Ltd., an AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for April 2024.  Androxgh0st and LockBit3 attacks In April 2024, researchers revealed a significant increase in the use of Androxgh0st attacks, with the malware being used as a tool for stealing sensitive information using botnets.  Meanwhile, LockBit3 remained the most prevalent ransomware group in April, despite a 55% drop in its rate...

Illumio joins Microsoft Intelligent Security Association (MISA)
Illumio joins Microsoft Intelligent Security Association (MISA)

Illumio Inc., a Zero Trust Segmentation company, announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP), who have integrated their solutions with Microsoft security technology to build a better defence against a world of increasing cybersecurity threats. The development follows the release of Illumio for Microsoft Azure Firewall, which combines the security benefi...

The Cyber Safety Force officially launches to change the way businesses manage cybersecurity
The Cyber Safety Force officially launches to change the way businesses manage cybersecurity

The Cyber Safety Force (CSF) has launched to change the way businesses manage their cybersecurity. Forming a consortium of renowned cyber experts, the CSF takes a data-driven, collaborative approach to revolutionise the way businesses think about and manage threat defence and risk aversion – moving from ‘cybersecurity’ to ‘cyber safety’. The CFO recently found that 75% of security professionals have observed an increase in cyber attacks over 2023, with th...

Ransomware attacks on US infrastructure: Bridewell's report findings
Ransomware attacks on US infrastructure: Bridewell's report findings

Over three in ten US-based critical infrastructure organisations (36%) that have fallen victim to a ransomware attack have risked legal repercussions by paying a ransom. The findings are in new research by pioneering cybersecurity services firm Bridewell, surveying 519 staff responsible for cybersecurity at US critical infrastructure organisations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services and water supply. Infringing UK and US laws 66%...

Detecting & mitigating account compromise in MSPs
Detecting & mitigating account compromise in MSPs

A single compromised account can be a gateway for attackers to access confidential data, leading to financial loss, legal consequences, and damage to the company’s reputation. This threat is not limited to any specific platform and affects everything from email accounts to secure business databases.  Before exploring strategies for MSPs to mitigate this cyber risk, let’s first understand what an account compromise is, its security impacts, and ways to detect it. What Is a comp...

Three-quarters of UK critical national infrastructure organisations concerned about AI-driven cyber threats
Three-quarters of UK critical national infrastructure organisations concerned about AI-driven cyber threats

76% of the UK’s critical national infrastructure (CNI) organisations have identified the use of AI to drive cyber threats as a current security concern.  This dramatic rise in concern about how cybercriminals use AI is revealed in new research by pioneering cyber security services firm Bridewell, surveying 521 staff responsible for cyber security at UK CNI organisations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services and water suppl...

Intersec Shanghai: Debuting in 2025 to promote security, safety and fire protection markets in China
Intersec Shanghai: Debuting in 2025 to promote security, safety and fire protection markets in China

The integration of cutting-edge technology, spurred on by innovation, is propelling efficiency and productivity to new heights. In turn, this opens up prospects for manufacturers across security, smart building, fire safety and mobility sectors through the rising development of IoT and AI trends. To capitalise on the opportunities created by technological advancements, Messe Frankfurt and CCPIT-Shanghai are partnering on a new security, safety and fire protection fair – Intersec Shanghai....

Gcore launches new DDoS Protection PoP in Dubai
Gcore launches new DDoS Protection PoP in Dubai

Gcore, the global edge AI, cloud, network, and security solutions provider, has announced the launch of a new DDoS protection point of presence (PoP) for its robust global edge network, in Dubai, UAE. The company has more than 30 protection PoPs across six continents, including Europe, Africa, the Americas, and the Middle East. The new Dubai filtering point allows customers to take advantage of advanced DDoS protection services without delay. Dubai PoP By opening the Dubai PoP and expanding i...

Exabeam delivers chronological timeline visualisations for any search result to accelerate cybersecurity threat investigation
Exabeam delivers chronological timeline visualisations for any search result to accelerate cybersecurity threat investigation

Exabeam, a global cybersecurity pioneer that delivers AI-driven security operations, announced Investigation Timelines™ within the Exabeam Search™ application, a powerful new capability on the Exabeam Security Operations Platform™. An industry-first, Investigation Timelines break down silos and simplify investigations for security analysts with integrated cross-platform workflows. Designed to empower security teams amid growing threats and skills shortages, this innovative cap...

Latest VIPRE Security Group email threat trends research exposes global phishing and malware threat landscape
Latest VIPRE Security Group email threat trends research exposes global phishing and malware threat landscape

VIPRE Security Group, a global pioneer and award-winning cybersecurity, privacy, and data protection company, released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion emails. The findings reveal the evolving landscape of email-based threats and emerging tactics malicious actors are employing. The US, UK, Ireland, and Japan top the spam sources list. The report identifies the US as the top source of spam emails globally, followed by the U.K., Ireland, and Japan. The U...

Bosch's latest solution: Dicentis Hybrid Meetings for efficient remote conferencing
Bosch's latest solution: Dicentis Hybrid Meetings for efficient remote conferencing

A wider group of customers can now experience the benefits of Dicentis Hybrid Meetings with the latest rollout of this cloud-hosted end-to-end hybrid conference solution. The technology update is part of an ongoing mission of Bosch Building Technologies to meet the rapidly evolving needs of the modern professional conferencing environment. Hybrid meeting environment Dicentis Hybrid Meetings is a fully native end-to-end solution that ticks all the boxes for highly efficient, legally compliant...

Google Workspace DLP: Enhance security & prevent breaches
Google Workspace DLP: Enhance security & prevent breaches

Google Workspace is a set of productivity applications with over 3 billion users and 10 million paying customers around the world. As the storage of a massive amount of sensitive information, this cloud-based suite is a top security concern for businesses. The risk of data breaches makes it crucial for MSP to implement data loss prevention (DLP) controls to prevent leaks within apps, such as Gmail, Drive, Docs, Sheets, Slides and more. Let’s review how. What is DLP in Google Workspace?...

Barracuda appoints a Chief Product Officer to drive innovation, product and service strategy
Barracuda appoints a Chief Product Officer to drive innovation, product and service strategy

Barracuda Networks, Inc., a trusted partner and major provider of cloud-first security solutions, announced that Neal Bradbury has been elevated to the role of Chief Product Officer. In this new role, Neal will lead a unified product, engineering, and advanced technology team to steer the vision for Barracuda’s comprehensive cybersecurity platform and drive customer-centric innovation across the entire portfolio. The platform is designed to protect customers across all attack surfaces inc...

G2E Asia’s grand return to Macau: Celebrating 15 years of excellence
G2E Asia’s grand return to Macau: Celebrating 15 years of excellence

G2E Asia, the pioneering gaming and entertainment marketplace in Asia, proudly announces its return to Macau on June 4-6, 2024, marking its 15th anniversary milestone. In collaboration with the Asian IR Expo, this year’s event is set to deliver an enhanced experience in all aspects of the expo, with 360-degree opportunities across the gaming, entertainment, and integrated resort industries. Aligned with the industry’s growing focus on technology, G2E Asia’s 15th edition will u...

Eaton highlights cybersecurity education, skilled workforce training programs at White House Cyber Workforce event
Eaton highlights cybersecurity education, skilled workforce training programs at White House Cyber Workforce event

Intelligent power management company Eaton participated in The White House Office of the National Cyber Director’s Convening on Cyber Workforce event on April 29 to underscore its commitment to cybersecurity training across industries. The company’s vice president of engineering and technology, Luiz Fernando Huet de Bacellar participated in the roundtable discussion with U.S. business, government and community pioneers. Eaton’s multipronged efforts The need for cybersecurity...

Why British universities must increase security to prevent threats from hostile states
Why British universities must increase security to prevent threats from hostile states

British universities are cited as some of the best in the world; working on cutting-edge and revolutionary research. Physical security measures The Director General of MI5 and senior politicians warned last week these institutions are being targeted for their intellectual property (IP) by hostile states and spies and as a result, this is a threat to national security. In the face of this, universities must work at speed to increase their physical security measures and keep their academia and...

BSIA cyber exposure mitigation code of practice released
BSIA cyber exposure mitigation code of practice released

The British Security Industry Association (BSIA) has updated its manufacturers’ code of practice that recommends on the design, testing and manufacture of safety and security products with cyber exposure, whilst aligning with major new UK legislation. Manufacturers of safety and security systems' Cybersecurity code of practice, is based on international industry best practices regarding cybersecurity and refers to recognised guidance and standards applied to safety and security systems....

Release of Gallagher Security’s Command Centre v9.10 unlocks new era of security tech
Release of Gallagher Security’s Command Centre v9.10 unlocks new era of security tech

Gallagher Security announced the latest release of their award-winning security site management software, Command Centre v9.10, marking a significant evolution for the security platform trusted to protect some of the world’s most critical sites. Mark Junge, Chief Executive at Gallagher Security explains, “Customers and Channel Partners of Gallagher who take advantage of this upgrade will benefit from a fast-evolving ecosystem of Gallagher Security technology that sets them up for th...

NCSC warns of heightened security risk to critical national infrastructure at the hands of Russia-linked cyber criminals
NCSC warns of heightened security risk to critical national infrastructure at the hands of Russia-linked cyber criminals

The National Cyber Security Centre (NCSC) has issued a warning of heightened cyber threat to UK critical national infrastructure due to the risk posed by Russia state-aligned actors. Pro-Russia ‘hacktivists’ have been targeting vulnerable small-scale industrial control systems in the UK, Europe and North America with more attacks expected over the coming months to target critical national infrastructure. AI-enabled cyber threats The NCSC outlined that the threats have la...

DigiCert establishes World Quantum Readiness Day to propel global organisations toward future-proof security
DigiCert establishes World Quantum Readiness Day to propel global organisations toward future-proof security

DigiCert, a global provider of digital trust, announced the first World Quantum Readiness Day, which will take place on September 26, 2024.  This initiative aims to spotlight the critical need for current security infrastructures to adapt to the imminent reality of quantum computing. Quantum computing Quantum computing promises unparalleled computational power and will transform industries by making certain tasks exponentially faster. However, this leap forward also presents significant...

Arrow Electronics tapped to become sole global provider of Broadcom’s CloudHealth from VMware offering
Arrow Electronics tapped to become sole global provider of Broadcom’s CloudHealth from VMware offering

Global technology solutions provider - Arrow Electronics, Inc. (ARW) announced that Broadcom selected it as the sole provider for its CloudHealth from VMware offering. CloudHealth is designed to help businesses simplify financial management and operations (FinOps) across multi-cloud environments effectively. Arrow Electronics and Broadcom partnership “Arrow is pleased to build upon our strategic relationship with Broadcom by becoming the exclusive provider of the CloudHealth offering,&r...

Keynote speakers and education program announced for Global Security Exchange (GSX) 2024
Keynote speakers and education program announced for Global Security Exchange (GSX) 2024

ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and digital experiences taking place 23-25 September at the Orange County Convention Centre in Orlando, FL and via the online GSX event platform. "Pioneering this year’s Selection Committee has been a privilege," said Dr. Diana M. Concannon, PsyD, PCI, CTM, 2024 GSX Selection Committee Chair. "Our...

Colt Technology Services reinforces customer ESG commitments with new sustainability programmes
Colt Technology Services reinforces customer ESG commitments with new sustainability programmes

Colt Technology Services (Colt), the digital infrastructure company, announced two new sustainability programmes which will support its own Net Zero goals and could contribute to those of its customers. Colt is partnering with Sweden-based Urban Miners to extract precious metals from unused equipment and is collaborating with carbon removal experts Supercritical to deliver a customer programme built on carbon removal credits. Decommissioned SDH legacy Colt is extending the pilot with Urban Mi...

Bugcrowd introduces AI penetration testing to improve customers’ confidence in AI adoption
Bugcrowd introduces AI penetration testing to improve customers’ confidence in AI adoption

Bugcrowd, the pioneer in crowdsourced security introduced the availability of its AI Pen Testing on the Bugcrowd Platform to help AI adopters detect common security flaws before threat actors take advantage. AI Pen Testing is a part of  Bugcrowd’s AI Safety and Security Solutions portfolio, in addition to the recently announced AI Bias Assessment offering.  Access to AI Commoditised access to AI is revolutionising how work is done in every industry. AI also presents new categ...

Evolution in PID solutions - Quanergy 3D LiDAR dominates security market
Evolution in PID solutions - Quanergy 3D LiDAR dominates security market

Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like airports, data centres, warehouses, and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism, and war. Quanergy 3D LiDAR Solutions In its latest whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, global technology intelligence firm ABI Research forecasts the worldwide physica...

View more
  • «
  • 1
  • 2
  • ...
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec