SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

ONEKEY expands cybersecurity platform for vulnerabilities
ONEKEY expands cybersecurity platform for vulnerabilities

Düsseldorf-based cybersecurity company ONEKEY has expanded its platform from a major solution for detecting software vulnerabilities to a fully-fledged environment for vulnerability management. This enables companies to map the entire process of dealing with so-called “Common Vulnerabilities and Exposures” (CVEs) – from detection and assessment to documented decision-making – in a single workflow that can serve as evidence. Background: In 2024, the number of newly...

Zero Networks: Kubernetes microsegmentation insights
Zero Networks: Kubernetes microsegmentation insights

Zero Networks, a major provider of zero trust security solutions, announced enhanced Kubernetes microsegmentation capabilities that give security teams comprehensive visibility and control without relying on DevOps expertise. By leveraging native Kubernetes tools and eBPF technology, the Zero Networks platform delivers a minimal footprint, non-intrusive deployment that enables organisations to scale securely while preventing lateral movement. With 93% of organisations either using, piloting, o...

EclecticIQ unveils advanced cyber security platform
EclecticIQ unveils advanced cyber security platform

Cyber threats are growing in scale and sophistication with major incidents this year disrupting supply chains, halting operations and driving losses into hundreds of millions. Responding to this challenge, EclecticIQ, a pioneer in cyber threat intelligence technology, announced version 3.6 of its ‘Intelligence Centre’ platform which brings next-generation functionality designed to help organisations analyse, structure, and share cyber insights. Deeper AI assistance and modelling B...

DigiCert RADAR reveals surge in DDoS attacks
DigiCert RADAR reveals surge in DDoS attacks

DigiCert, a pioneering provider of digital trust, released its first RADAR Threat Intelligence Brief, a quarterly publication delivering data-driven insights on emerging cyber threats.  Drawing from trillions of network events across DigiCert’s global security platform, including UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR provides one of the most comprehensive views of the evolving threat landscape. Fundamental shift in cyber warfare The Q3 2025 RADAR brief highlights an unpr...

Counter-drone tech: Sentrycs and Omnisys collaboration
Counter-drone tech: Sentrycs and Omnisys collaboration

Sentrycs, a global pioneer in Protocol Manipulation-based counter-drone technology—commonly known as Cyber over RF, and Omnisys, a global expert in mission optimisation for defence and homeland security, have announced a strategic collaboration that combines their technologies to improve the planning and deployment of sensor systems in multi-domain operations.   The joint solution merges Sentrycs’ field-proven C-UAS systems with Omnisys’ BRO-AD (Battle Resource Optim...

Future Of commercial security systems unveiled
Future Of commercial security systems unveiled

In the present technologically driven world, the future of commercial security systems holds boundless potential. As businesses are becoming more digital, the necessity for advanced security measures is apparent now more than ever.  The advancements in technology are significantly influencing the design and capabilities of these security systems. Artificial Intelligence (AI) and Machine Learning are projected to play a central role in commercial security systems. These technologies have t...

AuditBoard acquires FairNow for AI governance boost
AuditBoard acquires FairNow for AI governance boost

AuditBoard, the pioneering AI-powered global platform for connected risk transforming audit, risk, and compliance, announced it has reached a definitive agreement to acquire FairNow, an end-to-end, purpose-built AI Governance (“AI Gov”) platform. FairNow further enhances AuditBoard’s industry-pioneering capabilities with intelligent, automated, and step-by-step AI compliance guidance. With AI Governance requirements expanding globally, AuditBoard customers are now uniquely pos...

Kaseya empowers MSPs: New automation and security tools
Kaseya empowers MSPs: New automation and security tools

Kaseya, the pioneering provider of AI-powered IT management and cybersecurity software for small businesses, announced its fall 2025 innovations.  The release includes more than 90 enhancements aimed at transforming customer outcomes and economics through automation, cybersecurity, and end-to-end experience. End-to-end IT and security platform “These new capabilities deliver on the direct feedback we have received from our partners,” said Jim Lippie, Chief Product Officer at...

AuditBoard's AI transforming risk management
AuditBoard's AI transforming risk management

AuditBoard, the AI-powered global platform for connected risk transforming audit, risk, and compliance, announced the launch of Accelerate, a powerful new AI solution that delivers natural-language workflows, continuous auditing and monitoring, document intelligence, and agentic AI. The launch builds on the strong foundation of AuditBoard’s existing AI innovations, further empowering global risk teams with the world’s first AI-driven connected risk platform. AuditBoard’s new...

Acoru tackles AI fraud in banking industry
Acoru tackles AI fraud in banking industry

Acoru, the Madrid-based startup that stops AI-enabled fraud and money laundering, has raised a €10m Series A round led by 33N Ventures. Existing investors Adara Ventures and Athos Capital also joined the round. The fresh funding will accelerate Acoru’s mission to help banks predict and prevent AI-powered fraud and money laundering before any transaction is initiated. Generative AI-driven scams Generative AI-driven scams – deepfakes, voice cloning...

Cyware & Microsoft: AI-powered threat intelligence
Cyware & Microsoft: AI-powered threat intelligence

Cyware, a pioneer in AI-powered threat intelligence management, automation, and security orchestration, announced a strategic partnership with Microsoft built on deep product integrations to help global enterprises and public sector organisations operationalise threat intelligence with greater speed, ease and confidence. The partnership delivers a uniquely integrated threat intelligence workflow across Cyware and Microsoft Sentinel, giving customers a faster path from threat insights to action....

Camelot Secure: Innovations in cybersecurity
Camelot Secure: Innovations in cybersecurity

Camelot Secure, a revolutionary cybersecurity company, announced that its CEO, Stan Oliver, has been named one of The Daily Record’s 2025 Most Admired CEOs in the category of Private Company with 50 or Fewer Employees. Oliver earned this recognition for his visionary leadership, groundbreaking innovations in proactive cybersecurity, and steadfast commitment to diversity and workforce development — qualities that continue to shape Camelot Secure’s growth and industry impact. I...

Atos Sovereign AI services for UK CNI
Atos Sovereign AI services for UK CNI

Atos, a major provider of AI-powered digital transformation, has announced a holistic new approach to delivering people-first digital sovereign and agentic AI capabilities across its end-to-end IT service portfolio. Its new suite of services provides the building blocks for companies to have a tailored, resilient, and future-ready approach that enables fast and easy adaptation to evolving regulations, geopolitical pressures and unique operational needs.  The three hubs will address the growing...

Commvault boosts cyber resilience in North Europe
Commvault boosts cyber resilience in North Europe

Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud, has announced two new appointments for North Europe, as Martin Gittins moves into the Area Vice President (AVP) role for the region and Mark Molyneux joins the company as Field CTO.  As AVP of North Europe, Gittins will be responsible for growth, leadership, and strategy within this key market for Commvault. He joined the company in February of this year, leading the charge for Strategic Ac...

Illumio Insights Agent: AI-driven threat detection
Illumio Insights Agent: AI-driven threat detection

Illumio Inc., the breach containment company, announced Insights Agent, a new capability within Illumio Insights, the company’s AI-driven cloud detection and response (CDR) solution. Agent is an AI-powered, persona-driven guide designed to reduce alert fatigue, accelerate threat detection, and enable containment by delivering real-time, tailored alerts and instant one-click remediation recommendations. This powerful extension of Insights helps security teams stay focused and move quickly...

Hikvision achieves NIST CSF 2.0 certification
Hikvision achieves NIST CSF 2.0 certification

Hikvision has successfully achieved certification under the NIST Cybersecurity Framework (CSF) 2.0, following a rigorous independent audit conducted by the British Standards Institution (BSI). With this milestone, Hikvision becomes one of the first companies worldwide to achieve this certification, demonstrating its commitment to aligning its cyber security governance, risk management, and compliance practices with internationally recognised standards. What is NIST CSF 2.0? The NIST Cybersecu...

iDenfy KYC: SMS and email verification for security
iDenfy KYC: SMS and email verification for security

iDenfy, an identity verification, compliance and fraud prevention company from Lithuania, introduced new SMS and Email verification features to its industry-pioneering Know Your Customer (KYC) software. iDenfy is now able to improve both accuracy and simplicity during the initial user onboarding phase to help solve issues like multiple accounts, invalid phone numbers, forged IDs and other relevant security challenges that are commonly encountered during identity verification.  Standa...

Jamf enhances mobile security with AI analysis
Jamf enhances mobile security with AI analysis

Jamf, the standard in managing and securing Apple at work, announces the beta release of AI Analysis for Jamf Executive Threat Protection — a new artificial intelligence–powered capability designed to accelerate and simplify mobile forensic analysis. Jamf Executive Threat Protection is an advanced mobile forensics solution that helps organisations detect sophisticated attacks targeting high-value users such as executives, journalists, and political figures. In recent years, Apple h...

AuditBoard identifies AI's role in risk maturity
AuditBoard identifies AI's role in risk maturity

AuditBoard, the AI-powered global platform for connected risk, announces the findings of its Risk Intelligence Report - revealing a critical disconnect in enterprise risk management: while 53% of companies are implementing AI tools, many are trapped in cycles of inconsistent execution, resulting in sharp drops in confidence and deployment stalling in "pilot mode." Proprietary platform data The inaugural report, which combines proprietary platform data that includes over 50% of the Fortune 500...

Semperis cybersecurity film: Midnight in the war room
Semperis cybersecurity film: Midnight in the war room

Semperis, a provider of AI-powered identity security and cyber resilience, released the official trailer for Midnight in the War Room, a groundbreaking new documentary. The film features top voices in cybersecurity and national security, including Chris Inglis, the first U.S. National Cyber Director; General (Ret.) David Petraeus, former Central Intelligence Agency (CIA) Director; Jen Easterly, former Cybersecurity and Infrastructure Security Agency (CISA) Director; Marcus Hutchins, WannaCry h...

NIS2 compliance with ASSA ABLOY Solutions
NIS2 compliance with ASSA ABLOY Solutions

In the ongoing implementation of the EU’s NIS2 Directive, much attention has been paid to its implications for cybersecurity. Yet, arguably, the impact on organisations’ physical security and access strategy is just as important. In fact, NIS2 ushers in a new degree of focus on cyber–physical resilience – with significant potential penalties for organisations which do not comply with the framework’s demands. NIS2 replaces 2016’s original NIS Directive on Netw...

Mobile access: The future of digital security by ASSA ABLOY
Mobile access: The future of digital security by ASSA ABLOY

End-users, security professionals and C-suite strategists continue to see significant rewards in access digitalisation. The most important factor, according to ASSA ABLOY’s survey data, is convenience. When employees, contractors and temporary visitors can come-and-go with ease, operations for building and security managers are made more efficient, including cost-efficient. Wireless solutions are often the fastest, simplest way to digitalise. Adopters cite reduced installation costs, easi...

AI-driven cyber defence: Cyberseer & Darktrace
AI-driven cyber defence: Cyberseer & Darktrace

Cyberseer, one of Darktrace’s first Managed Security Service Provider (MSSP) partners and previous winner of Darktrace’s EMEA Service Partner of the Year award, today announced it has achieved Authorised Managed Detection & Response (MDR) Partner status with Darktrace, a pioneer in cybersecurity. This recognition underscores Cyberseer’s proven expertise, extensive training and commitment to delivering world-class MDR services powered by the Darktrace ActiveAI Security Plat...

ImmuniWeb's new AI penetration testing features
ImmuniWeb's new AI penetration testing features

ImmuniWeb has introduced new AI-powered penetration testing capabilities within its ImmuniWeb® On-Demand solution and launched two new Continuous Threat Exposure Management (CTEM) packages — ASM (Attack Surface Management) and Dark Web monitoring — in response to emerging cybersecurity risks and novel threats. ImmuniWeb® On-Demand, the company’s award-winning web application penetration testing solution, now offers expert-dr...

Zurich boosts fraud detection with Quantexa partnership
Zurich boosts fraud detection with Quantexa partnership

Zurich Insurance is increasing the power of its real-time fraud detection by becoming the first insurer to partner with Quantexa in the UK. The new AI-enabled platform will operate across multiple lines of business written by Zurich, alerting claims handlers to suspicious activity using an expanded range of sources and records so they are able to make decisions more effectively. Real-time fraud detection Zurich has been operating real-time fraud detection for the past three years and detected...

HackerOne AI enhances security with Hai and Code
HackerOne AI enhances security with Hai and Code

HackerOne, a pioneer in offensive security solutions, announces the evolution of HackerOne AI, Hai, from a copilot into an agentic AI system, and the general availability of its AI-native code security product, HackerOne Code. Together, they set a new standard in continuous exposure management by accelerating how enterprises find, prioritise, and remediate vulnerabilities. Hai is HackerOne’s coordinated team of AI agents that continuously analyses and contextualises findings to help organ...

OPSWAT & NetApp: Advanced storage security integration
OPSWAT & NetApp: Advanced storage security integration

OPSWAT, a pioneer in critical infrastructure protection, announced the integration of its MetaDefender Storage Security™ with NetApp® ONTAP®. This solution brings together OPSWAT’s advanced file security tools with NetApp’s widely adopted storage platforms to help organisations detect and prevent hidden malware, macro threats, sensitive data leakage, and file-borne vulnerabilities before they reach critical applications or users. Without disrupting existing workfl...

WatchGuard EDR: Recognised for innovation & protection
WatchGuard EDR: Recognised for innovation & protection

WatchGuard® Technologies, a pioneer in unified cybersecurity for managed service providers (MSPs), announced that it has been recognised as both a Leader and an Outperformer in the 2025 GigaOm Radar Report for Endpoint Detection and Response (EDR). The GigaOm Radar Report for EDR evaluates vendors across innovation, execution, and deployment models to guide IT and security pioneers in solution selection. WatchGuard’s strength In the 2025 report, GigaOm recognised...

Regula IDV platform simplifies identity verification
Regula IDV platform simplifies identity verification

Regula, a global developer of identity verification (IDV) solutions and forensic devices, has launched its brand-new Regula IDV Platform. This ready-to-use orchestration solution is designed to replace fragmented identity verification and management systems with a single, unified workflow. Built to scale according to an organisation’s growth pace and fully vendor-agnostic, the platform enables businesses to manage every stage of the identity lifecycle, from onboarding through continuous r...

Shinobi enhances mobile app security with AI
Shinobi enhances mobile app security with AI

AI-powered cybersecurity firm Shinobi has announced a major expansion of its platform – the ability to penetration test mobile applications with the same skill, reasoning, and precision as human experts, but delivered continuously and at machine speed.  With phones having become vaults for employees’ digital lives, holding money, messages, health data, and work communications, attackers are increasingly targeting mobile apps. New vulnerabilities emerge with every update But t...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec