SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Wipro CyberShield MDR: Unified security services
Wipro CyberShield MDR: Unified security services

Wipro Limited, a pioneering AI-powered technology services and consulting company, announced an expanded partnership with CrowdStrike to launch Wipro CyberShieldSM MDR, an AI-powered unified managed security service (MSS) that simplifies and strengthens enterprise security operations. CyberShield MDR delivers industry-pioneering capabilities through a modern SOC that provides enhanced visibility, AI-driven automation, and greater efficiency...

Wireless access control rising - Assa Abloy report 2025
Wireless access control rising - Assa Abloy report 2025

The latest edition of Assa Abloy’s long-running Wireless Access Control Report has just been published, and the 2025 report paints a picture of a maturing market where digital and mobile solutions are becoming the norm. With strong momentum behind trends such as wireless adoption, sustainability, and cloud services, the focus now turns to increasingly intelligent integrations and to demonstrating ROI to cement access control's role in a new generation of smart, secure, and efficient build...

Scalable hybrid solutions with Nutanix Cloud Platform
Scalable hybrid solutions with Nutanix Cloud Platform

Nutanix, a pioneer in hybrid multicloud computing, announced it has been recognised as a Leader in the 2025 Gartner Magic Quadrant for Distributed Hybrid Infrastructure. The recognition marks Nutanix’s third time in this Magic Quadrant, and its second time as a Leader. Lee Caswell, SVP, Product & Solutions Marketing at Nutanix, said, “We feel our positioning on both vision and execution in this year’s Gartner Magic Quadrant for Distributed Hybrid Infrastructure is a d...

ISO/IEC 20059: New biometric security standard
ISO/IEC 20059: New biometric security standard

A new international standard has been developed by the IEC and ISO joint committee for biometrics, SC 37. The new ISO/IEC 20059 standard features methodologies to evaluate the resistance of biometric systems to morphing attacks.  Biometric systems are increasingly used as a solid way to authenticate identities, because using human characteristics makes them hard to forge. Yet, in the age of AI, there is rising concern about the use of ‘morphing’ to create new identities that...

Sophos' insights: Ransomware in education sector
Sophos' insights: Ransomware in education sector

Sophos, a pioneer and innovator of advanced security solutions for defeating cyberattacks, released its fifth annual Sophos State of Ransomware in Education report. The global study of 441 IT and cybersecurity pioneers shows the education sector is making measurable progress in defending against ransomware, with fewer ransom payments, dramatically reduced costs, and faster recovery rates. Yet, these gains are accompanied by mounting pressures on IT teams, who report widespread stress...

Kaseya appoints new CRO & CTO to drive AI innovation
Kaseya appoints new CRO & CTO to drive AI innovation

Kaseya, the pioneering provider of AI-powered IT management and cybersecurity software, announced the appointment of Anthony Anzevino as Chief Revenue Officer and Pratik Wadher as Chief Technology Officer, effective immediately. “We are at a pivotal moment in our industry,” said Rania Succar, CEO, Kaseya. “Small and midsize businesses are modernising their technology stacks at a once-in-a-generation pace, and MSPs are their critical partners." "Kaseya has the o...

Aduna & XConnect team up for digital identity security
Aduna & XConnect team up for digital identity security

Aduna, the aggregator of standardised network APIs, announced the signing of a Memorandum of Understanding (MoU) with Sekura.id, now a part of XConnect, a pioneering solution provider in mobile identity and numbering intelligence. The collaboration will accelerate the adoption of CAMARA-Compliant APIs such as Number Verification (NV), SIM Swap (SS), and Know Your Customer (KYC), while establishing a foundation to enable future APIs that support emerging digital identity, authentication, and fra...

Matrix showcases AI defence tech at Defence and Technology Expo 2025
Matrix showcases AI defence tech at Defence and Technology Expo 2025

Matrix Comsec made its mark at the Defence and Technology Expo 2025, showcasing cutting-edge, Made-in-India Security and Telecom solutions tailored for India’s defence forces. The Expo, held in Chennai, brought together stakeholders from the Army, Navy, Air Force, and defence manufacturing sectors. Matrix's booth became a hub of engagement for visitors exploring secure, AI-driven surveillance and access control solutions built to meet India's unique operational needs. Key Highlights St...

Cyware joins Microsoft Intelligent Security Association
Cyware joins Microsoft Intelligent Security Association

Cyware, a pioneer in AI-powered threat intelligence management, secure threat sharing and collaboration, hyper-orchestration and response, announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of software development companies and security services partners that have integrated their solutions with Microsoft Security technology to better defend the mutual customers against a world of increasing cyber threats. Intelligent action Cyware Intel Ex...

Entrust nShield HSMs: Post-quantum security validated
Entrust nShield HSMs: Post-quantum security validated

As the cybersecurity landscape rapidly evolves, Entrust announced a landmark achievement: The Entrust nShield Hardware Security Module’s (HSMs) implementation of three NIST standardised post-quantum algorithms have been validated by NIST’s Cryptographic Algorithm Validation Program (CAVP). This milestone empowers enterprises to secure their sensitive data against the looming threats of quantum computing with confidence, backed by the credibility of NIST-validated, production-ready c...

TXOne Networks: Advanced OT security solutions
TXOne Networks: Advanced OT security solutions

TXOne Networks, a pioneer in Cyber-Physical Systems (CPS) security, introduced asset-vulnerability management and other expanded capabilities for its Edge network security solution.  The new release of TXOne Edge creates an end-to-end solution for helping ensure the reliability, safety and availability of industrial processes and infrastructure, enabling organisations to maximise their return on investment in operational technology (OT) security. TXOne Networks will showcase its Edge net...

Toshiba partners with Titan Data for Enterprise HDD UK
Toshiba partners with Titan Data for Enterprise HDD UK

Toshiba Electronics Europe GmbH, Storage Products Division, is pleased to announce a new strategic partnership with Titan Data Solutions, appointing the company as a direct partner for Toshiba Enterprise hard disk drives (HDDs) in the UK. Headquartered in London, UK, Titan Data Solutions is a specialist in server and storage solutions for AI, next-generation infrastructure and Advanced Computing. This new collaboration reinforces Toshiba’s commitment to delivering high-performance, reli...

ThingsRecon: Digital hygiene study insights
ThingsRecon: Digital hygiene study insights

ThingsRecon, a pioneer in external attack surface discovery and supply chain intelligence, has released the results of its first industry-wide study into the state of digital hygiene across enterprises.  The research analysed more than 770,000 digital assets, including applications, domains, IPs, scripts, and certificates, across multiple organisations. The findings uncovered over 800,000 high-severity hygiene issues. That’s more issues than assets, meaning that on average every digi...

AlgoSec cybersecurity: Horizon platform success
AlgoSec cybersecurity: Horizon platform success

AlgoSec, a global cybersecurity pioneer, announced a gross dollar retention rate of over 90% in the first half of 2025, following the launch of its AlgoSec Horizon platform.  Since its release, the Horizon platform has gained adoption across industries, underscoring the market need for convergence of cloud and on-premises networks. This widespread adoption has driven a 36% increase in new annual recurring revenue (ARR) in the first half of 2025 compared to 2024. Advanced AI capabilities...

Ivanti's key findings on tech challenges in companies
Ivanti's key findings on tech challenges in companies

Ivanti, a global enterprise IT and security software company, released its 2025 Digital Employee Experience (DEX) Report, which surveyed over 3,300 IT professionals and end users around the world. The research draws attention to the widening disconnect between organisations’ perceptions of their digital maturity and the real-world tech challenges faced by office workers and IT professionals alike. Over the next three years, 92% of companies plan to increase their AI investments, accordi...

HENSOLDT & KX unite for defence data solutions
HENSOLDT & KX unite for defence data solutions

At this year’s Defence and Security Equipment International (DSEI) exhibition, defence technology pioneer HENSOLDT and real-time analytics pioneer KX signed a Memorandum of Understanding (MoU) to collaborate on next-generation defence data solutions. The agreement marks a strategic alignment between HENSOLDT’s advanced sensor, mission system, and Electromagnetic Warfare capabilities and KX’s world-class high-performance analytics platform, used globally across sectors where mi...

Datasphere's post-quantum cybersecurity by Sopra Steria
Datasphere's post-quantum cybersecurity by Sopra Steria

Sopra Steria, a major European player in the tech sector, announces the integration of hybrid post-quantum encryption technology at the heart of Datasphere, its data-centric security solution. The solution now offers a unique combination of data labelling, attribute-based access control and the latest quantum-proof encryption technologies. This development marks a decisive step forward in securing sensitive data, at a time when the acceleration of computing power is paving the way for new cyber...

Insta DomainLink Secret™: Secure military data exchange
Insta DomainLink Secret™: Secure military data exchange

Insta, a trusted cybersecurity and defence technology provider, has launched Insta DomainLink Secret™, a high-performance cross-domain solution (CDS) for secure, real-time data exchange between different networks and systems. Modern technological solution enables real-time, secure bi-directional data transfer between military domains, such as land, maritime, and air, and security clearance between different classification levels across the chain of command. Advanced operational secu...

Delkia showcases defence tech at DSEI 2025
Delkia showcases defence tech at DSEI 2025

Delkia, a major UK-based specialist systems integrator for safety-related and mission-critical systems, will showcase its advanced engineering capabilities at DSEI 2025, the world’s premier defence and security exhibition, taking place at ExCeL London from 9–12 September. The Delkia team will showcase the company’s cutting-edge capabilities in systems integration, digital engineering and technical consultancy across the highly regulated aerospace and maritime sectors.  O...

Microsegmentation's role in zero trust architecture
Microsegmentation's role in zero trust architecture

Zero Networks, a pioneer in zero trust security, is the ideal solution to support organisations seeking to follow CISA’s new zero trust microsegmentation guidance. While microsegmentation has long been considered complex and niche, a new survey from Enterprise Management Associates (EMA) signals a turning point in attitudes around microsegmentation: 96% of respondents consider microsegmentation to be extremely or very important for cyber defence. EMA survey results EMA’s research...

The CHERI Alliance welcomes Siemens to EDA cybersecurity progress
The CHERI Alliance welcomes Siemens to EDA cybersecurity progress

The CHERI Alliance announces that the Electronic Design Automation segment of Siemens Digital Industries Software has joined the non-profit organisation as a member to promote and enable a new level of cybersecurity in the EDA industry. This collaboration marks a significant milestone in CHERI’s mission to advance technological innovations and bolster security measures in the digital landscape. Adoption of CHERI technology The CHERI Alliance is a global consortium that unites a diverse...

Entrust & Mastercard: Elevating identity fraud prevention
Entrust & Mastercard: Elevating identity fraud prevention

Entrust, a pioneer in identity-centric security solutions, announced an expanded partnership with Mastercard to enhance fraud prevention by integrating Mastercard Identity insights (powered by Ekata) into the Entrust Identity Verification Security Platform. The collaboration empowers organisations to strengthen fraud detection and prevention, reduce time and costs associated with manual intervention, and streamline end-users' digital onboarding experience. Digital First and Iden...

Dell PowerProtect: Cyber resilience redefined
Dell PowerProtect: Cyber resilience redefined

In the hyper-connected world, cyber threats are no longer just a possibility—they’re an inevitability. Organisations across industries are grappling with increasingly sophisticated attacks that disrupt operations, compromise sensitive data and erode trust. A whopping 88% of organisations expect GenAI to explode data volumes, yet 65% of these same organisations backup less than 50% of their data. For business pioneers, the stakes couldn’t be higher. Staying competitive in this...

Narf Industries' Ranger.ai: A cybersecurity milestone
Narf Industries' Ranger.ai: A cybersecurity milestone

Narf Industries plc, a renowned U.S.-based cybersecurity group specialising in advanced threat intelligence and software system security, announced that its Ranger.ai Agentic AI threat and remediation platform has achieved “Awardable” status through the Platform One (P1) Solutions Marketplace. The P1 Solutions Marketplace is a digital repository of post-competition, 5-minute, readily-awardable pitch videos that address the U.S. Government’s most urgent requirements in hardware...

Trustonic expands in Japan with Intralink partnership
Trustonic expands in Japan with Intralink partnership

Pioneering cybersecurity firm, Trustonic, has announced the strategic appointment of international business development consultancy, Intralink, to increase its market share in Japan. Established in 2012, Trustonic delivers advanced technology systems to drive innovation, protect revenue, and enhance security for device manufacturers worldwide. Secure OS Platform Intralink is a true business growth consultancy specialising in driving growth in global markets Committed to helping companies sec...

Taegis integrates Sophos endpoint for enhanced security
Taegis integrates Sophos endpoint for enhanced security

Sophos, a global pioneer of innovative security solutions for defeating cyberattacks, announced that Sophos Endpoint is now natively integrated and automatically included in all Taegis Extended Detection and Response (XDR) and Taegis Managed Detection and Response (MDR) subscriptions. This milestone gives customers immediate access to combined prevention, detection, and response capabilities in a single platform – while lowering costs and simplifying operations. The integration follows...

Cyware & Trustmarque enhance UK threat intelligence
Cyware & Trustmarque enhance UK threat intelligence

Cyware, the industry pioneer in threat intelligence operationalisation, collaboration and orchestrated response, and Trustmarque, a pioneering provider of IT solutions and services, announced a strategic partnership.  The agreement brings Cyware’s advanced threat intelligence and cyber fusion platform to UK organisations, with extended services supporting the UK Government’s “Defend as One” cyber strategy. Integrate Cyware’s AI-driven platform Trustmarque wi...

Genetec's state of physical security report open
Genetec's state of physical security report open

Genetec Inc., the global pioneer in enterprise physical security software, is pleased to announce that the 6th annual edition of its global State of Physical Security report is now open for contributions. Last year, 5,696 physical security professionals completed the survey, offering valuable perspectives on industry challenges, emerging trends and future opportunities. Key findings included accelerated hybrid cloud adoption, the industry’s practical approach to AI adoption and IT’s...

Getronics recognised by ISG for cybersecurity solutions
Getronics recognised by ISG for cybersecurity solutions

Getronics has been recognised as a Pioneer in the UK by ISG, a pioneering technology research and advisory firm, in its 2025 Provider Lens™ Report for Cybersecurity – Services and Solutions.  This recognition specifically places Getronics as a Leader in Technical Security Services for the Midmarket, highlighting the company’s growing impact and commitment to protecting organisations across the UK. Integration-ready security solutions ISG noted that: “Getronics off...

Matrix Comsec exhibits latest innovations at FSIE 2025
Matrix Comsec exhibits latest innovations at FSIE 2025

Matrix Comsec, a pioneering provider of Security and Telecom solutions, is proud to announce its participation at FSIE 2025. With decades of innovation and a strong focus on safety, compliance, and resilience, Matrix will present its latest technologies designed to safeguard people, assets, and infrastructure. How Matrix solutions address evolving challenges? Visitors will experience how Matrix solutions address evolving challenges across key domains: Smart Buildings: Seamless integration...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec