SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Progress partners with Veeam Software to deliver AI-powered network detection and response to global enterprises
Progress partners with Veeam Software to deliver AI-powered network detection and response to global enterprises

Progress, the trusted provider of infrastructure software, announced a strategic partnership with Veeam® Software, the #1 pioneer by market share in Data Protection and Ransomware Recovery, to provide customers with an enterprise-ready cyber defence solution that strengthens the security of their business-critical data. Cybersecurity attacks are occurring at an ever-increasing pace, crippling organisations and costing millions of dollars in ransom payoffs, lost productivity, reput...

Omega Systems enhances EDR endpoint security solution with automated moving target defence (AMTD)
Omega Systems enhances EDR endpoint security solution with automated moving target defence (AMTD)

Omega Systems, an award-winning MSP and MSSP, announced it has fortified its endpoint detection and response (EDR) solution with the addition of automated moving target defence (AMTD) capabilities. According to market research, traditional EDR technology fails to detect or prevent as much as one-third of all endpoint security threats, leaving companies and their networks susceptible to data theft or compromise. Zero-day vulnerabilities This evolution is a necessary response to the advanc...

Cybersecurity firm launches UK operation to fight growing cyber crime
Cybersecurity firm launches UK operation to fight growing cyber crime

The award-winning Canadian firm has opened its first operation in London to support its growing transatlantic client base and offer its outstanding Detection, Response, and Recovery Services and Managed Security Services (MSS) to the UK market.  Cybercrime warnings  A recent warning from the National Cyber Security Centre (NCSC) on the growing threat of state-sponsored attacks targeting critical infrastructure highlights the predominance of cybercrime. This comes in addition to the...

AI fuels cyber surge as top tech priority for the boardroom
AI fuels cyber surge as top tech priority for the boardroom

Cyber security, fuelled by AI, has become the top tech priority for the boardroom with 30 percent of business pioneers seeing it as their main concern, according to a new report from The IN Group. Hiring cyber security staff was also labeled as the biggest talent pain point for C-level executives, with 38 percent listing it as a top issue. According to a Deloitte report, more than 90 percent of cyber security professionals are concerned that hackers will use AI in cyber attacks against their co...

Crossword Cybersecurity launches new CyberAI practice, helping CISOs embrace AI with confidence across the enterprise
Crossword Cybersecurity launches new CyberAI practice, helping CISOs embrace AI with confidence across the enterprise

Crossword Cybersecurity Plc, the cybersecurity solutions company focused on cyber strategy and risk, has launched a new CyberAI Practice. The practice, which sits within Crossword Cybersecurity’s Consulting business, consolidates Crossword’s artificial intelligence (AI) expertise into a centre of excellence that will deliver AI-focused cybersecurity consulting services and products to help clients harness the power of AI in the organisation.  The ever-evolving threat lands...

Claroty and Axonius partner to bring enterprise attack surface management to cyber-physical systems
Claroty and Axonius partner to bring enterprise attack surface management to cyber-physical systems

Claroty, the cyber-physical systems (CPS) protection company, and Axonius, the pioneer in cybersecurity asset management and SaaS management, announced a new partnership that combines technologies to bring enterprise attack surface management to all assets across an organization’s networks, including IT, cloud, and the Extended Internet of Things (XIoT) — the vast network of CPS including OT, IoT, BMS, and IoMT. By combining Claroty’s knowledge of CPS environments with Axonius...

Intercede launches MyID® MFA v5 to protect on-premise, legacy and cloud-based applications
Intercede launches MyID® MFA v5 to protect on-premise, legacy and cloud-based applications

Intercede, the global pioneer in managing digital identities announces the launch of MyID® MFA (Multi-Factor Authentication) 5.0. The latest addition to the MyID product family raises the security bar, by enabling organisations to protect on-premise and cloud-based applications, as well as the Windows desktop logon (on and off-line) with a range of phishing-resistant MFA options including OTP (one-time passwords), mobile apps, syncable FIDO passkey, and biometric protected hardware devices....

WithSecure offers partners early access to its new intelligent exposure management
WithSecure offers partners early access to its new intelligent exposure management

WithSecure™ is offering partners exclusive access to its intelligent exposure management technology, to give them a first look at its comprehensive new way of proactively preventing breaches. Proactive prevention Set to launch at WithSecure’s SPHERE24 event on 28–29 May 2024, the solution is the latest addition to WithSecure™ Elements Cloud, enabling mid-market companies to drive the paradigm shift from reactive to proactive cyber security.  A rapidly expanding at...

The Connectivity Standards Alliance Product Security Working Group launches the IoT Device Security Specification 1.0
The Connectivity Standards Alliance Product Security Working Group launches the IoT Device Security Specification 1.0

The Connectivity Standards Alliance ("Alliance") Product Security Working Group is pleased to announce the release of their IoT (Internet of Things) Device Security Specification 1.0, with the accompanying certification program, and Product Security Verified Mark. This groundbreaking initiative aims to establish a unified IoT cybersecurity standard and certification program, providing manufacturers with a one-stop solution to certify their devices, enabling them to comply with mu...

iC Consult announces strategic partnership with Transmit Security to elevate cybersecurity and combat fraud
iC Consult announces strategic partnership with Transmit Security to elevate cybersecurity and combat fraud

iC Consult, the world’s renowned independent consultancy, systems integrator, and managed services provider for identity-driven cybersecurity is thrilled to announce a ground-breaking partnership with Transmit Security, the pioneering innovator of identity verification and fraud prevention services, including market-pioneering orchestration, phishing-resistant authentication with true passwordless MFA, passkeys and modern customer identity and access management (CIAM). This partnership ma...

Sonatype's groundbreaking software compliance & security tool launches at KubeCon
Sonatype's groundbreaking software compliance & security tool launches at KubeCon

Working with the world’s largest enterprises and global policymakers to address the complexities of optimising software supply chain with SBOMs (Software Bill of Materials), Sonatype announced SBOM Manager. This industry-first solution provides an integrated approach to managing SBOMs from third-party vendors, alongside those SBOMs created for their software, powered by Sonatype’s unique data and security research. Compliance and cybersecurity By enabling comprehensive optimi...

Genetec talks Future of Physical Security at ASIS Europe 2024
Genetec talks Future of Physical Security at ASIS Europe 2024

Genetec Inc., a global technology provider of unified security, public safety, operations, and business intelligence solutions, is pleased to announce its plans for ASIS Europe 2024, taking place in Vienna, Austria from 20-22 March, 2024. Genetec can be found on Stand #D4-D5 where it will be showcasing the power and flexibility of its unified physical security software to transform all aspects of physical security and operations. The company will also actively participate in the speaker program...

Quanergy unveils Q-Track® out of the box experience - cloud-based coverage tool and windows compatibility
Quanergy unveils Q-Track® out of the box experience - cloud-based coverage tool and windows compatibility

Quanergy Solutions, Inc., a major provider of 3D LiDAR technology, proudly announces two innovations for its Q-Track® solution; an industry-first cloud-based sensor coverage tool and full Windows compatibility. Both of these new products further improve the customers’ out-of-the-box experience for Quanergy’s Q-Track portfolio. Q-Track Coverage Tool The cloud-based Q-Track Coverage Tool is aimed at revolutionising pre-deployment planning and site surveys. This innovative tool a...

Cohesity unlocks generative AI capabilities for customers through new collaboration and investment from NVIDIA
Cohesity unlocks generative AI capabilities for customers through new collaboration and investment from NVIDIA

Cohesity, a pioneer in AI-powered data security and management, announced a collaboration with NVIDIA to help organisations safely unlock the power of generative AI and data using the recently announced NVIDIA NIM microservices and by integrating NVIDIA AI Enterprise into the Cohesity Gaia platform. Cohesity Gaia, the company’s comprehensive, patent-pending collection of artificial intelligence (AI) capabilities, will offer NVIDIA NIM and additional technolog...

Siemens and NVIDIA expand collaboration on generative AI for immersive real-time visualisation
Siemens and NVIDIA expand collaboration on generative AI for immersive real-time visualisation

Siemens announced that it will deepen its collaboration with NVIDIA to help build the industrial metaverse. Siemens is bringing immersive visualisation powered by new NVIDIA Omniverse Cloud APIs to the Siemens Xcelerator platform, driving increased use of AI-driven digital twin technology. At the NVIDIA GTC, Siemens and NVIDIA demonstrated how generative AI can revolutionise the visualisation of complex data, making photorealism possible, and showcased how sustainable shipbuilder HD Hyundai can...

Gallagher Security’s Controller 7000 wins outstanding new security product at the India and South Asia OSPAs
Gallagher Security’s Controller 7000 wins outstanding new security product at the India and South Asia OSPAs

Award-winning global security manufacturer Gallagher Security’s Controller 7000 (C7000) has been named Outstanding New Security Product at the India and South Asia OSPAs held in New Delhi on March 14th. Released in November 2023, this is the first award win for Gallagher’s C7000, the latest addition to their Controller suite. New generation of technology UL-certified and capable of managing all localised access control, intruder alarms, perimeter security, business automation, an...

One Identity Cloud PAM Essentials launched to streamline management and strengthen protection of privileged access
One Identity Cloud PAM Essentials launched to streamline management and strengthen protection of privileged access

One Identity, a pioneer in unified identity security, announced the general availability of One Identity Cloud PAM Essentials. This innovative SaaS-based solution will simplify privileged access management (PAM) across the enterprise, with a specific focus on cloud applications and infrastructure. The surge in cloud migration, coupled with the expansion of the attack surface and the growing sophistication and frequency of cyberattacks, underscores the critical need for effective PAM solutions....

India Cyber Revolution Summit 2024, cybersecurity innovations pioneering the future of protection
India Cyber Revolution Summit 2024, cybersecurity innovations pioneering the future of protection

TraiCon Events will be hosting India’s premier cybersecurity event titled “Cyber Revolution Summit” scheduled on 25th and 26th April 2024 in New Delhi, India.   This summit will feature keynote presentations and panel discussions with top security experts from various industries covering a range of topics, including cybersecurity innovations, data privacy & security, risk management, network security, threat detection & intelligence, and vulnerability managem...

Mitsubishi Electric and Nozomi Networks to expand operational technology security business
Mitsubishi Electric and Nozomi Networks to expand operational technology security business

Mitsubishi Electric Corporation announced that it has reached an agreement with Nozomi Networks Inc., a developer and distributor of operational technology (OT) security solutions, to jointly pursue OT security initiatives including marketing and technical development.  As part of the agreement, Mitsubishi Electric has acquired an equity stake in Nozomi Networks. OT security solutions Mitsubishi Electric will integrate its factory automation (FA) equipment and OT security solutions with...

Bridewell fuels growth with strategic acquisition of Arculus Cyber Security
Bridewell fuels growth with strategic acquisition of Arculus Cyber Security

Bridewell, a pioneering UK cyber security firm, has completed its first acquisition of public sector cyber security specialists, Arculus Cyber Security. The acquisition will increase Bridewell’s headcount by 15% and triple its public sector revenue with all of Arculus’ employees retained. The deal strengthens Bridewell’s public sector footprint and aligns with the organisation’s overarching strategic Critical National Infrastructure (CNI) focus. Bridewell’s growth...

IriusRisk announces appointment of new Head of AI
IriusRisk announces appointment of new Head of AI

IriusRisk, the industry-pioneering platform for automated threat modelling, has announced the appointment of Jose López Muñoz as its new Head of AI. The appointment represents another key milestone in IriusRisk’s plans to power the development of advanced AI-driven threat modelling solutions, transforming how the company can help its customers design secure software and systems. Prior roles of Jose López Muñoz Jose López Muñoz’s immediate...

Celebrating innovation and excellence in banking at the 11th Edition Connected Banking Summit- Innovation & Excellence Awards East Africa 2024, Nairobi, Kenya
Celebrating innovation and excellence in banking at the 11th Edition Connected Banking Summit- Innovation & Excellence Awards East Africa 2024, Nairobi, Kenya

The Connected Banking Summit, an annual event conceptualised and organised by The International Centre For Strategic Alliances (ICSA), once again proved to be a cornerstone for the banking industry's evolution with its 11th Edition Connected Banking Summit- Innovation & Excellence Awards East Africa 2024 took place on 6th of March, in Nairobi, Kenya. This gathering not only underscored the significance of digital transformation and financial inclusion but also celebrated the remarkable ach...

GISEC Global celebrates women in cybersecurity ahead of annual exhibition
GISEC Global celebrates women in cybersecurity ahead of annual exhibition

As the Middle East’s largest and most impactful cybersecurity event, GISEC Global continues to provide a solid platform and expand the opportunities for women in the field, fuelling the growth of a diverse industry set to transform the world’s digital behaviours.  This International Women’s Day, GISEC Global 2024 is spotlighting some of the most influential women in cybersecurity who will take centrestage at the Inspire conference, the most awaited annual progra...

Angola Cyber Revolution Summit 2024–cybersecurity innovations: Pioneering the future of protection
Angola Cyber Revolution Summit 2024–cybersecurity innovations: Pioneering the future of protection

TraiCon Events will be hosting Angola’s premier cybersecurity event titled as “Cyber Revolution Summit” scheduled on 22nd &23rd May 2024 in Luanda, Angola. This summit will feature keynote presentations and panel discussions with top security experts from various industries covering a range of topics, including cybersecurity innovations, data privacy and security, risk management, network security, threat detection & intelligence, and vulnerability management. Cyber...

Delinea's new Privilege Control for Servers revolutionises PAM solutions
Delinea's new Privilege Control for Servers revolutionises PAM solutions

Delinea, a provider of solutions that seamlessly extend Privileged Access Management (PAM) announced the introduction of Privilege Control for Servers on the Delinea Platform, enforcing least privilege principles on critical systems consistently across identities to combat stolen credentials and restrict lateral movement. Delinea Platform The Delinea Platform combines enterprise vaulting, VPN-less privileged remote access, and privilege controls to enforce just-in-time and just enough privileg...

Oxford academics issue warning over use in UK of unregulated AI chatbots in the care sector
Oxford academics issue warning over use in UK of unregulated AI chatbots in the care sector

The UK’s carers should be cautious of using unregulated AI bots, according to researchers from Oxford University. Study findings A pilot study by academics at the University of Oxford found some care providers had been using generative AI chatbots such as ChatGPT and Bard to create care plans for people receiving care. That presents a potential risk to patient confidentiality, according to Dr. Caroline Green, an early career research fellow at the Institute for Ethics in AI at Oxford, w...

'Technology is Not Neutral' author, Stephanie Hare, to headline women in cybersecurity event at Infosecurity Europe 2024
'Technology is Not Neutral' author, Stephanie Hare, to headline women in cybersecurity event at Infosecurity Europe 2024

Infosecurity Europe 4-6 June 2024, the most influential information security event running at ExCeL London, announced that renowned technology ethics broadcaster and researcher, Stephanie Hare will give the keynote address for the eighth annual Women in Cybersecurity event. The event will be held on day two of Infosecurity Europe on Wednesday, June 5, 2024. Hare, author of Technology is Not Neutral: A Short Guide to Technology Ethics, brings a wealth of experience to th...

ImmuniWeb launches cybersecurity compliance service
ImmuniWeb launches cybersecurity compliance service

To deliver cybersecurity compliance services, ImmuniWeb is looking to collaborate with law firms around the globe including Switzerland, the UK, the EU, and the US. While a law firm will review a client’s cybersecurity compliance from a legal viewpoint and create an action plan to remediate the non-conformities and to comply with legal and regulatory requirements; ImmuniWeb will then help the client to implement the technical part under the law firm’s supervision thereby preser...

Nation-state attacks: SaaS Alerts warns MSPs
Nation-state attacks: SaaS Alerts warns MSPs

With the rising speculation of nation-state-sponsored attacks against Microsoft by Russia, SaaS Alerts are asking that all MSPs be hyper-vigilant at this time. Beginning on March 7th, SaaS Alerts witnessed an increase of over 50% (above late February average activity) on event types, which indicate password spray, bruteforce, and non-interactive sign-in attacks – and this trend has continued throughout the day (March 8th) and to present. SaaS Alerts’ engineering team SaaS Alerts&r...

RagaAI open-sources the most comprehensive platform for evaluation & guardrails
RagaAI open-sources the most comprehensive platform for evaluation & guardrails

RagaAI, the pioneering AI testing company, is significantly expanding its testing platform by launching “RagaAI LLM Hub," its open-source and enterprise-ready LLMs evaluation and guardrails platform. With over 100 meticulously designed metrics, it is the most comprehensive platform that allows developers and organisations to evaluate and compare LLMs effectively and establish essential guardrails for LLMs and Retrieval Augmented Generation (RAG) applications. These tests assess various as...

View more
  • «
  • 1
  • 2
  • ...
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec