SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

CNI Security Group: Scotland cybersecurity event
CNI Security Group: Scotland cybersecurity event

Building on their highly popular series of integrated high-security solutions events, the CNI Security Group has announced their next event, ‘Protecting CNI Scotland – The importance of cyber-secure solutions in critical national infrastructure’. Designed for all end users, consultants and system designers in the CNI sector, the free-to-attend event will be held at Dakota Eurocentral, Motherwell, on Wednesday 19th November, between 9:30 am and 4 pm. The event will show in...

AI in application security: Checkmarx's pioneering role
AI in application security: Checkmarx's pioneering role

Checkmarx, the global pioneer in agentic-AI powered application security testing, announced record-breaking growth for its flagship platform, Checkmarx One, underscoring a wave of customer adoption fuelled by innovation and strategic pioneering. The news comes alongside groundbreaking research from Checkmarx Zero that highlights the urgent need for secure software in an AI-driven development landscape. Record-breaking growth & adoption Checkmarx One has rapidly become the platform of choi...

Zimperium uncovers ClayRat spyware shaking mobile security
Zimperium uncovers ClayRat spyware shaking mobile security

Zimperium, the world's pioneer in mobile security, announced new research from its zLabs team exposing ClayRat, a rapidly expanding Android spyware campaign targeting Russian users. Disguised as popular apps, such as WhatsApp, TikTok, Google Photos, and YouTube, ClayRat steals sensitive information, including SMS, call logs, device data, and front-camera photos. New obfuscation layers While exploiting Android’s default SMS handler role to bypass security prompts While exploiting Androi...

ONVIF to end support for Profile S, promote Profile T
ONVIF to end support for Profile S, promote Profile T

ONVIF®, the pioneering standardisation initiative for IP-based physical security products, announces that it will end support for ONVIF Profile S, and is recommending the use of its successor, Profile T.   Profile S, the first-ever profile ONVIF introduced in 2011, provides a standardised set of specifications that enable basic video streaming capabilities between conformant devices (like IP cameras) and clients (like video management software) from different vendors. Pr...

Semperis launches Ready1 for identity resilience
Semperis launches Ready1 for identity resilience

Semperis, a pioneer in identity-driven cyber resilience, announced the release of Ready1 for Identity Crisis Management—which combines its innovative Active Directory Forest Recovery (ADFR), Disaster Recovery for Entra Tenant (DRET), and Identity Forensics and Incident Response (IFIR) services with its expert-built enterprise crisis management system, Ready1—to help organisations quickly return to normal business operations after identity-related cyberattacks. The ground-breaking sol...

Genetec leads in access control software market 2025
Genetec leads in access control software market 2025

According to the newly released 2025 Access Control Report from global research firm Omdia, Genetec Inc., the pioneer in enterprise physical security software, continues to expand its share of the global access control software market, maintaining its #2 position worldwide. In an industry shaped by mergers and acquisitions, the report shows that Genetec achieved the highest organic global market share gain in on-premises access control software. For customers, partnering with a c...

Jamf unveils new platform API & AI tools at JNUC 2025
Jamf unveils new platform API & AI tools at JNUC 2025

Jamf, the standard in managing and securing Apple at work, kicked off its 16th annual Jamf Nation User Conference (JNUC) in Denver, Colorado. Joined by key partners including Apple, Okta, AWS, Microsoft, Google and more, Jamf unveiled the latest updates to its pioneering Apple device management and security platform. Those updates include a rich API ecosystem, intelligent AI tools, and automated software updates powered by Declarative Device Management, making the Jamf platform more powerful...

Radiflow360 launches AI-powered OT security solution
Radiflow360 launches AI-powered OT security solution

Radiflow, a pioneering provider of cybersecurity solutions for industrial automation networks, announced that the company has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers full visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized industrial operators to gain full visibility and control over their OT networks and risks, and is supported by an AI analyst assistant that s...

DattoCon 2025: AI and security insights from Kaseya
DattoCon 2025: AI and security insights from Kaseya

Kaseya, the pioneering provider of AI-powered IT management and cybersecurity software, kicked off its sold-out Kaseya DattoCon 2025 conference in Miami Beach by unveiling its latest innovations and previewing its next generation cyber resilience and digital workforce platforms. These new capabilities enable MSPs to deliver critical services while driving meaningful business growth. Once reserved for large companies, Kaseya’s latest innovations provide enterprise-caliber protection at a m...

Genetec unveils public safety solutions at IACP 2025
Genetec unveils public safety solutions at IACP 2025

At IACP 2025, at booth #1085, Genetec Inc., the pioneer in enterprise physical security software, will showcase its latest public safety solutions that help law enforcement agencies and security professionals unify operations, streamline investigations, and enhance situational awareness. Visitors to the show will have the opportunity to experience first-hand demonstrations of Genetec Cloudrunner™,  Citigraf™, and Clearance™, exploring how these solutions provide...

Intercity boosts security as member of MISA with Microsoft
Intercity boosts security as member of MISA with Microsoft

Intercity has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of software development companies and security services partners that have integrated their solutions with Microsoft Security technology to better defend mutual customers against a world of increasing cyber threats.   The Intercity managed SOC delivers comprehensive 24/7/365 security protection, defending against threats with SIEM (Security Incident Event Management) and XDR (Extended Detec...

OPSWAT MetaDefender drive: Critical infra security
OPSWAT MetaDefender drive: Critical infra security

OPSWAT, a pioneer in critical infrastructure protection, launched MetaDefender Drive™ with Smart Touch, a portable cybersecurity device designed for malware and compliance scanning of transient cyber assets regardless of network connectivity. It works across servers, desktops, and laptops before they enter secure environments. The device empowers security teams to prevent cyberattacks, which can severely impact operations, including downtime from inbound and transient assets.  MetaD...

Kaseya acquires INKY for AI email security innovation
Kaseya acquires INKY for AI email security innovation

Kaseya, the global provider of AI-powered IT and security management software, announced the acquisition of INKY, a pioneer in modern, generative-AI-based email security for managed service providers (MSPs) and small to midsize businesses (SMBs). "Kaseya is committed to being the indispensable partner that helps MSPs lead in this next chapter of IT and security," said Rania Succar, CEO of Kaseya. AI-driven email security Rania Succar added: "No one else has our scale, data advantage, and end-...

Gigamon: AI & hybrid cloud security insights
Gigamon: AI & hybrid cloud security insights

Gigamon, a pioneer in deep observability, released new research revealing how global CISOs are reshaping 2026 cybersecurity strategies as they seek to effectively secure and manage hybrid cloud infrastructure in the AI era. AI is regarded as the most transformational technology to date, impacting everything from how businesses innovate to how adversaries operate. As a result, more than 200 global CISOs surveyed across Australia, France, Germany, Singapore, the UK, and the US are shift...

Eviden strengthens cybersecurity with Cosmian KMS
Eviden strengthens cybersecurity with Cosmian KMS

Eviden, the Atos Group product brand, pioneering in advanced computing, cybersecurity products, mission-critical systems, and vision AI announces the strengthening of its cybersecurity product offering through the integration of Cosmian’s Key Management System (KMS). In an era marked by rapidly increasing cyber threats, it is imperative that French and European companies retain control over the security of their most sensitive data, irrespective of deployment environment. Merger between...

Matrix Comsec shines at Intersec Saudi 2025
Matrix Comsec shines at Intersec Saudi 2025

Matrix Comsec, a major global provider of scalable, AI-enabled security and telecom solutions, marked a strong presence at Intersec Saudi Arabia 2025, reinforcing its position as a trusted innovator in enterprise-grade security technologies. The event brought together industry pioneers, decision-makers, and security professionals from sectors including Infrastructure, Data Centres, BFSI, and Government across Riyadh, Jeddah, and Dammam, creating a prime platform for collaboration, knowledge exc...

OpenID Foundation AI whitepaper on identity management
OpenID Foundation AI whitepaper on identity management

The OpenID Foundation (OIDF), a pioneer in open identity standards, has released a comprehensive whitepaper addressing the mounting authentication, authorisation, and identity management challenges posed by the rapid rise of AI agents. This critical whitepaper, “Identity Management for Agentic AI: The new frontier of authorisation, authentication, and security for an AI agent world,” which is STRICTLY EMBARGOED until 9 am (ET) Tuesday 07 October, was researched and compiled by the O...

Cyber resilience: Beyond compliance in the UK
Cyber resilience: Beyond compliance in the UK

Cybersecurity experts are warning that too many organisations are treating resilience as a compliance requirement rather than embedding it into core business strategy, leaving them dangerously exposed to cyber attacks. According to Gartner, resilience is too often viewed as a “tick-box” exercise focused narrowly on metrics or recovery documentation. Instead, experts stress the need for cross-department collaboration, regular testing through simulations, and executive-level involvem...

Deepgram achieves AWS Generative AI Competency
Deepgram achieves AWS Generative AI Competency

Deepgram, the world’s most realistic and real-time Voice AI platform, has announced it has achieved the Amazon Web Services (AWS) Generative AI Competency. This specialisation recognises Deepgram as an AWS Partner that helps customers and the AWS Partner Network (APN) drive the advancement of services, tools, and infrastructure pivotal for implementing generative AI technologies. AWS Generative AI Competency The AWS Generative AI Competency requires a rigorous technical audit, proof of...

iDenfy launches Criminal Background Check tool
iDenfy launches Criminal Background Check tool

iDenfy, a Lithuania-based identity verification, fraud prevention, and compliance company, announced the launch of its Criminal Background Check tool.  The solution will help enhance KYC/KYB and AML compliance by accessing up-to-date international criminal databases from all US states, pulling and extracting data on all individuals who are being screened. The solution will help save time and automatically generate reports with all data found in a single PDF file, enabling faster red flag...

Mercury MP controllers at GSX 2025: A new era of access control
Mercury MP controllers at GSX 2025: A new era of access control

Mercury Security, the pioneer in open architecture access control hardware, is putting the spotlight on its embedded application environment for Mercury MP Controllers at GSX 2025. First previewed at ISC West earlier this year, the platform is gaining strong traction, with dozens of partners already developing certified apps in preparation for its official launch later this year. “Since we first introduced the Embedded Application Environment, our focus has been on working closely with do...

Zimperium exposes VPN flaws - protect enterprise data
Zimperium exposes VPN flaws - protect enterprise data

Zimperium, the pioneer in mobile security, releases new research from its zLabs team revealing alarming weaknesses in mobile Virtual Private Network (VPN) applications. While VPNs are marketed as essential privacy tools, Zimperium’s analysis of 800 free Android and iOS apps shows that many actually put users, and the enterprises they work for at greater risk. Among the findings: 25% of iOS VPN apps lacked a valid privacy manifest, violating Apple requirements and leaving users in the...

Dataminr expands Intel Agents in physical security
Dataminr expands Intel Agents in physical security

Dataminr, the pioneer in AI-powered real-time event, threat & risk intelligence, announces the expansion of Intel Agents to cover the full spectrum of events discovered across the physical world. This groundbreaking use of Agentic AI for real-time intelligence deploys AI agents at scale to uncover and deliver the most relevant event context. By revolutionising how organisations rapidly understand, contextualise, and respond to events across the physical world, this launch marks a seminal m...

Sophos launches Sophos advisory services
Sophos launches Sophos advisory services

Sophos, a pioneer of innovative security solutions for defeating cyberattacks, announces the launch of Sophos Advisory Services, a suite of security testing services designed to identify gaps in organisations’ security programs. These offerings – External Penetration Testing, Internal Penetration Testing, Wireless Network Penetration Testing, and Web Application Security Assessment – help fortify an organisation’s defenses against cyberattacks and optimise their current...

Omny appoints Fetten as CEO for global OT security growth
Omny appoints Fetten as CEO for global OT security growth

Omny has selected Thomas Fetten to lead its next phase of growth, as the company helps organisations around the world make sense of complex operational data, identify hidden security risks, and better protect critical infrastructure. Fetten will officially assume the role on 1 October 2025.    Fetten brings more than 25 years of global leadership experience in technology, cybersecurity, and managed services, including senior executive roles at Deutsche Telekom Security, Secure Link/Or...

i-PRO joins AI security elite with ISO certification
i-PRO joins AI security elite with ISO certification

i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security, public safety and medical applications marked its 6th year as an independent organisation.   Underscoring its strong market momentum and commitment to innovation, the company reported several key milestones, including the opening of a new factory in Japan, the industry's first ISO/IEC 42001 certification for AI management, the launch of Active Guard 3.0 with generative AI capabilities, and the ex...

Hanwha QVGA AI thermal cameras for security solutions
Hanwha QVGA AI thermal cameras for security solutions

Hanwha Vision, a pioneer in security and surveillance solutions, introduces its next-generation QVGA AI thermal surveillance camera range. Featuring AI object detection, advanced thermal imaging with noise equivalent temperature difference (NETD) of less than 20mK, long-range lens options up to 60mm, and eight or 30 frames per second (fps), these high-performance cameras transform perimeter and critical infrastructure monitoring. Whether securing data centres at close range, or tracking moveme...

Flexxon X-Mask Pro: Rugged security for sensitive data
Flexxon X-Mask Pro: Rugged security for sensitive data

Flexxon, a pioneer in industrial NAND flash storage, announced the launch of X-Mask Pro – the next evolution of the company's best-selling X-Mask. Designed to secure and conceal sensitive data in mission-critical operations, X-Mask Pro delivers plug-and-play functionality, paired with unmatched durability, built-in encryption, and regulator-ready compliance, ensuring that vital information remains secure, intact, and invisible to unauthorised individuals. Infrastructure monitoring a...

Permiso expands AI identity security platform
Permiso expands AI identity security platform

Permiso, the pioneer in real-time identity security, announced the expansion of its platform to include comprehensive protection for AI identities, including AI users, AI builders, and AI agents, in order to provide enterprises with a single platform to protect all digital identities against cybersecurity threats. Available now, the expanded Permiso solution is unique in the market in that it treats AI security as an extension of identity security and offers the same comprehensive coverage for...

Why CCTV makers embrace Make in India initiative
Why CCTV makers embrace Make in India initiative

Why CCTV Manufacturers Are Turning to ‘Make in India’ Now. Earlier this year, a security upgrade planned for Indian Railways’ Eastern Zone came to a sudden halt. The project aimed to install AI-powered CCTV cameras in trains and stations. But when officials found that many of the shortlisted cameras were Chinese-made, the installation was paused. As India Today reported, this isn’t an isolated case. Similar concerns have come up in ports, metros, and government surv...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec