SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Honeywell's fight against USB-borne malware in critical facilities
Honeywell's fight against USB-borne malware in critical facilities

Honeywell released its 2024 USB Threat Report, which provides new insight into how “silent residency” is an increasing cyber threat for industrial and critical infrastructure facilities. In the report, Honeywell highlighted the growing risk of “living off the land” (“LotL”) attacks in which adversaries use USB devices to gain access to industrial control systems to hide and observe operations before launching attacks that evade detection and manipulate the ta...

UK implements groundbreaking cybersecurity laws, smart devices fortified against hackers
UK implements groundbreaking cybersecurity laws, smart devices fortified against hackers

New Government regulations mandate that all internet-connected smart devices, spanning from phones to TVs to smart doorbells, adhere to minimum-security standards by law. Groundbreaking legislation is in effect in the UK, aimed at shielding consumers and businesses from cyber threats. Cyber laws This initiative, spearheaded by the Department for Science, Innovation and Technology, the National Cyber Security Centre, and the Office for Product Safety and Standards, along with the efforts of Ju...

DigiCert sets the benchmark for digital trust by successfully completing 31 audits in 12 months
DigiCert sets the benchmark for digital trust by successfully completing 31 audits in 12 months

DigiCert, a major global provider of digital trust, reconfirmed its commitment to standards and compliance with the successful completion of 31 audits within a 12-month period. These audits include a range of crucial certifications, including the SOC 2 Type II audit for DigiCert® DNS Trust Manager and the ETSI audit for DigiCert CertCentral® Europe, underscoring DigiCert's dedication to ensuring robust security measures and regulatory adherence across its offerings, around the world. S...

Finnish Defence Forces logistic command acquires F-35 fighter avionics and maintenance services from technology company Insta
Finnish Defence Forces logistic command acquires F-35 fighter avionics and maintenance services from technology company Insta

Technology company Insta and the Finnish Defence Forces have agreed on the three-year acquisition package related to Finland's F-35 fighter program. The acquisition is based on the strategic partnership agreement between the Finnish Defence Forces and Insta and covers the years 2024–2026. The acquisition covers, among other things, building maintenance and service capabilities for the avionics of the Finnish Air Force’s Lockheed Martin F-35 Lightning II multi-role fighters...

SaaS Alerts highlights key BEC protection strategies for MSPs
SaaS Alerts highlights key BEC protection strategies for MSPs

Business email compromise (BEC) attacks involve manipulating or impersonating email accounts to deceive employees, often leading to financial fraud, breaches or data loss. According to Verizon, BEC attacks doubled last year and comprised nearly 60% of all social engineering incidents. To deal with this growing frequency of BEC attacks, MSPs need advanced strategies, such as user behaviour analysis and employee training programs. Let’s look at the key BEC protection strategies for MSPs. W...

Enhance data protection with Quantum's all-flash DXi T-Series
Enhance data protection with Quantum's all-flash DXi T-Series

Quantum® Corporation, the pioneer in end-to-end data management solutions designed for the AI era announces DXi T-Series all-flash backup appliances to accelerate key data protection processes that help customers more effectively prepare, protect, and recover critical IT operations from ransomware and other data risks. DXi T-Series With data-intensive initiatives, like AI, a high priority, coupled with the continuing and ever-present threat of ransomware, data protection is an essential se...

Bull Products introduces new Cygnus Alert remote notification and monitoring platform for SITENET
Bull Products introduces new Cygnus Alert remote notification and monitoring platform for SITENET

The Cygnus ALERT notification and monitoring platform is a cloud-based solution designed to strengthen site safety. Using Cygnus ALERT, construction professionals and site administrators can receive event, fault, or mesh information in real time, enabling swift responses to on-site situations.   Cygnus ALERT Cygnus ALERT is a subscription-based cloud portal solution, accessed through a 2G and 4G cellular hardware module, with easy user management and notifications provided thro...

Wing Security's SaaS security automation to meet New York financial regulations
Wing Security's SaaS security automation to meet New York financial regulations

Wing Security, the pioneer in SaaS Security, announced that its SaaS security product is specifically designed to help financial firms and covered entities comply with the stringent NY-DFS regulations that mandate robust cybersecurity measures for SaaS applications in New York State. 24/7 protection framework Wing Security’s product offers a 24/7 protection framework for SaaS applications, enabling easy deployment and requiring less than two hours of labour weekly. This efficiency enabl...

Improve slack data security with SaaS Alerts
Improve slack data security with SaaS Alerts

Slack is the preferred communication, collaboration and file sharing hub for teams in more than 150 countries. The number of Slack’s monthly active users is expected to reach 79 million by 2025, per Statista. While the user-friendly interface and versatile app integrations of Slack make it a fan favourite, over time, the platform becomes a repository of sensitive data. Users often share a wealth of information, from project details to business strategies and account credentials, in both p...

Entrust fights deepfakes, phishing, and account takeover attacks with AI-powered identity-centric security solution
Entrust fights deepfakes, phishing, and account takeover attacks with AI-powered identity-centric security solution

Entrust, a global pioneer in trusted payments, identities, and data security announced a single-vendor enhanced authentication solution that integrates identity verification (IDV) and identity and access management (IAM) to fight deepfakes, phishing, account takeover (ATO) attacks and other threats.  Identity authentication By enhancing the Entrust Identity as a Service (IDaaS) platform with Onfido’s AI-powered document and biometric verification, customers will be able to deploy ne...

GBM sets new industry standards with dual CREST & DESC cybersecurity accreditation
GBM sets new industry standards with dual CREST & DESC cybersecurity accreditation

In a landmark achievement, Gulf Business Machines (GBM), an end-to-end pioneering digital solutions provider, has been awarded two new accreditations from CREST and DESC (Dubai Electronic Security Center) in Penetration Testing and Incident Response. Cybersecurity solutions GBM's achievement of these certifications showcases its leadership and expertise in providing state-of-the-art cybersecurity solutions, reflecting the company’s commitment to maintaining local roots while adhering to...

IDEMIA Secure Transactions unveils a groundbreaking crypto agility solution for post-quantum
IDEMIA Secure Transactions unveils a groundbreaking crypto agility solution for post-quantum

IDEMIA Secure Transactions (IST) once again demonstrates its post-quantum leadership, announcing the first crypto-agility solution that will enable service providers of secure products, such as banks and fintechs, mobile network operators, IoT manufacturers, and security providers, to future-proof the security of their products and to continually adapt to new threats in the post-quantum era. Quantum threat management The emergence of post-quantum cryptography has accelerated the need for agile...

Pluralsight study finds the biggest technical skills are in cybersecurity, cloud and software development
Pluralsight study finds the biggest technical skills are in cybersecurity, cloud and software development

Pluralsight, the technology workforce development company, today released its 2024 Technical Skills Report. This annual survey asked 1,400 executives and IT professionals how organisations can leverage technology to drive business value in a world where budgets and headcount are decreasing and technology is evolving at a rapid pace. The findings highlight the top areas for upskilling and learning opportunities, the biggest benefits of continuous learning, and the greatest impediments to adoptin...

Axis Communications unveils Axis Cloud Connect
Axis Communications unveils Axis Cloud Connect

Axis Communications, a pioneer in network video, has introduced Axis Cloud Connect, an open hybrid cloud platform designed to provide customers with more secure, flexible, and scalable security solutions. Together with Axis devices, the platform enables a range of managed services to support system and device management, video and data delivery, and meet high demands in cybersecurity. Cloud adoption trend The video surveillance market is increasingly utilising connectivity to the cloud, drive...

Nuke From Orbit research shows that security is failing to keep pace with smartphone utilisation by consumers
Nuke From Orbit research shows that security is failing to keep pace with smartphone utilisation by consumers

Nuke From Orbit, a UK fintech startup, has unveiled findings from its latest research report, ‘Evolving smartphone usage and the growing threat to consumers’. The report sheds light on a concerning trend in smartphone thefts, indicating that in 62% of cases in the UK, the repercussions extend far beyond the initial loss of the device.  Digital theft victims According to the research, not only were respondents' social media and email accounts accessed, but one in four individu...

Industrial AI and sustainability at scale: Siemens redefines industrial innovation at Hannover Messe
Industrial AI and sustainability at scale: Siemens redefines industrial innovation at Hannover Messe

The industrial sector is in need of digital transformation toward greater sustainability and resilience. Value creation and actions for the planet must be brought into balance. Companies need to do more with fewer resources. At Hannover Messe, Siemens will show how proven, cutting-edge technology and strong partnerships enable industries to become both more sustainable and more competitive. Visitors at Booth D53 in Hall 9 will experience showcases featuring core technologies for digital and sust...

Bosch to expand customer choice for video management with support for the new Genetec Security Center SaaS offering
Bosch to expand customer choice for video management with support for the new Genetec Security Center SaaS offering

Bringing customers greater flexibility in how they manage video security, the latest Bosch cameras will seamlessly integrate with Genetec™ Security Center SaaS. With firmware version 9.21 releasing later this year, Bosch will provide camera configuration capabilities and video viewing in the Security Center SaaS platform through direct-to-cloud or Genetec Cloudlink™ cloud-managed appliance connections.  Genetec Security Center SaaS is an enterprise-grade unified physical securi...

barox promotes depth of integration technology and launch new 10Gb ‘light-core’ switch range at The Security Event
barox promotes depth of integration technology and launch new 10Gb ‘light-core’ switch range at The Security Event

barox Kommunikation AG, the global manufacturer of professional standard managed and unmanaged switches, PoE media converters, and IP extenders, will be showing their range of Ethernet switches and Device Management System (DMS) VMS integration technology, at The Security Event (TSE), taking place between 30 April - 2 May 2024 at the NEC, Birmingham. Visitors can find barox at stand number 5/P90, where they will be showing their support of professional systems integrato...

SaaS Alerts: Best SaaS security solution finalist
SaaS Alerts: Best SaaS security solution finalist

SaaS Alerts announced that it has been named a finalist in the 2024 Cloud Security Awards program in the ‘Best SaaS Security Solution’ category. Now in its second year and with an expanded range of categories, The Cloud Security Awards program applauds the latest innovations in cloud-based security solutions. The program received entries from organisations worldwide, including North America, Canada, Europe, the Middle East, and Australasia. Aspects of cloud security...

Honeywell introduces AI-enabled software solution to improve commercial aerospace operations
Honeywell introduces AI-enabled software solution to improve commercial aerospace operations

Honeywell unveiled Honeywell Forge Performance+ for Aerospace, a cloud-based platform that utilises AI and machine learning (ML) to help commercial aerospace manufacturing and maintenance, repair & overhaul (MRO) facilities modernise production and lower operational costs through digitalisation.  This addition to the Honeywell Forge suite further supports Honeywell’s alignment with the megatrends of advancing automation and the future of aviation. Complexity and operating costs...

ISC West 2024 grows attendance and offers most expansive lineup yet
ISC West 2024 grows attendance and offers most expansive lineup yet

ISC West 2024, the comprehensive and converged security trade event, hosted in collaboration with premier sponsor the Security Industry Association (SIA), delivered another year of successful programming and welcomed more than 29,000 security industry professionals to The Venetian Expo in Las Vegas. Improving customer experience ISC West elevated the customer experience by hosting both fan-favourite and brand-new offerings throughout the four-day event, which featured over 750 exhibitors,...

AI cyber-attacks a critical threat, but CISO priorities are not changing yet, according to study from ClubCISO
AI cyber-attacks a critical threat, but CISO priorities are not changing yet, according to study from ClubCISO

A new cybersecurity report by ClubCISO in collaboration with Telstra Purple finds that despite significant concerns around the impending impact of AI cyberattacks on respondent organisations, many have not seen their priorities or investment plans change. The report, informed by a survey of cybersecurity pioneers across public and private sector organisations worldwide, emphasises that among the myriad risks vying for the CISO’s attention, AI cyber-attacks are not yet...

RiverSafe partners with Cribl to bolster data services
RiverSafe partners with Cribl to bolster data services

RiverSafe, a pioneering cybersecurity professional services provider, has partnered with Cribl, the Data Engine for IT and Security. This new partnership is set to transform the data capabilities available to RiverSafe's clients, empowering organisations to analyse, collect, process, and route all IT and security data from any source or in any destination. As data continues to grow at a 28 percent compound annual growth rate, Cribl's product suite, including the industry's pioneering observabil...

Siemens and Microsoft to converge Digital Twin Definition Language with W3C Thing Description Standard
Siemens and Microsoft to converge Digital Twin Definition Language with W3C Thing Description Standard

In a collaborative move with the W3C Consortium, Siemens and Microsoft have announced their commitment to converge the Digital Twin Definition Language (DTDL) with the Thing Description standard from the international standards organisation, W3C. Customers are offered consistent modeling experiences by unifying both languages, mitigating fragmentation in an evolving IoT landscape. With customers typically deploying a mix of vendors in their infrastructure leading to lock-in and high integration...

Security Industry Association announces winners of the 2024 SIA New Products & Solutions Awards
Security Industry Association announces winners of the 2024 SIA New Products & Solutions Awards

The Security Industry Association (SIA) has announced the 2024 winners of the SIA New Products and Solutions (NPS) Awards, the flagship awards programme presented in partnership with ISC West recognising innovative security products, services, and solutions. Top among the winners, who were recognised on April 10 during an award ceremony on the Bridge Stage on the ISC West show floor, was IronYun, receiving the 2024 Best New Product Award. SIA NPS Since its inception i...

Johnson Controls and Everbridge renew partnership to foster customer resilience amid global challenges
Johnson Controls and Everbridge renew partnership to foster customer resilience amid global challenges

Johnson Controls, the global pioneer for smart, healthy and sustainable buildings, has announced the renewal of its reseller partnership with Everbridge. The collaboration aims to assist security pioneers with a centralised view of physical assets and external risk factors—such as geopolitical threats or natural disasters—that could impact organisational safety and resiliency. Partnership with Everbridge “Not only do today’s security pioneers face the challenge of stay...

Cohesity extends collaboration to strengthen cyber resilience with IBM investment in Cohesity
Cohesity extends collaboration to strengthen cyber resilience with IBM investment in Cohesity

Cohesity announced a deepening of its cyber resilience collaboration with IBM. The enhanced relationship will accelerate the development of essential cyber resilience capabilities to address organisations' critical need for increased data security and resilience across hybrid cloud environments. With this announcement, Cohesity completes its Series F financing, with IBM joining NVIDIA as a strategic investor. Cyber resilience platform The most recent Cost of a Data Breach report spo...

LenelS2 highlights comprehensive cloud offerings and advancements in BlueDiamond Mobility at ISC West 2024
LenelS2 highlights comprehensive cloud offerings and advancements in BlueDiamond Mobility at ISC West 2024

LenelS2, the global pioneer in advanced security systems and services, will showcase new and upcoming innovations that have been developed with customers in mind, with a focus on cloud-solution enhancements at the annual International Security Conference & Exposition (ISC West 2024), in Las Vegas on April 9 - 12. LenelS2 is a part of Carrier Global Corporation, a global pioneer in intelligent climate and energy solutions. OnGuard Cloud Highlights at ISC West will include a deep dive into...

Aria Kozak of Elite Interactive Solutions joins Security Industry HOF
Aria Kozak of Elite Interactive Solutions joins Security Industry HOF

Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence to achieve proven crime prevention, announces that company Founder and CEO Aria Kozak has been inducted into the Security Industry Hall of Fame. Considered the electronic security industry’s highest recognition for lifetime achievement and excellence, Kozak was among the five Class of 2024 recipients officially enshrined during a presentation on the main expo stage of the International Security Con...

Jason Scott joins Sectigo as Chief Information Security Officer
Jason Scott joins Sectigo as Chief Information Security Officer

Sectigo®, the industry’s most innovative provider of comprehensive certificate lifecycle management (CLM) announced the newest member of its senior executive team with the appointment of Jason Scott as Chief Information Security Officer (CISO).  Jason Scott Jason Scott will oversee all aspects of cybersecurity at Sectigo including data, infrastructure, network, applications, and products. He joins the company with more than 20 years of experience including leadership roles at t...

View more
  • «
  • 1
  • 2
  • ...
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec