SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Northwood & 360 Vision: Surveillance excellence in Ireland
Northwood & 360 Vision: Surveillance excellence in Ireland

Through their strategic partnership, 360 Vision Technology and Northwood Technology are setting new standards of excellence in high-security surveillance across Ireland.  Sharing the same commitment to quality in visual surveillance, the partnership offers end-to-end camera solutions engineered to deliver advanced situational awareness across a broad range of specialist applications in demanding environments. With a reputation as being Ireland’s most progressive distributor, Northwo...

Hanwha Vision ISO 37001 certification achievement
Hanwha Vision ISO 37001 certification achievement

Hanwha Vision has achieved ISO 37001:2025 Anti-Bribery Management System certification, an internationally recognised standard confirming that the company has strict and independently audited processes in place to prevent, detect, and address bribery. The certification reinforces Hanwha Vision’s brand’s commitment to ethical conduct, professional transparency, and accountability across every stage of its operations, from product design and manufacturing to sales and partne...

Genetec: Physical security solutions for IT professionals
Genetec: Physical security solutions for IT professionals

Genetec Inc. (“Genetec”), the global pioneer in enterprise physical security software, outlined key considerations for IT professionals as they look to strengthen protection against today’s cyber threats while preparing for the challenges of tomorrow. With the region’s growing investments in smart cities, energy hubs, and mega events, the need for physical security solutions that seamlessly integrate with IT infrastructure has never been greater. For IT professionals t...

Commvault HyperScale Edge & Flex for cyber resilience
Commvault HyperScale Edge & Flex for cyber resilience

Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, has now announced two powerful additions to its HyperScale portfolio: HyperScale Edge and HyperScale Flex. As modern enterprises generate more data from remote offices and edge locations, these environments have become lucrative and vulnerable targets for cyberattacks. Exploitation of edge devices To help clients address this challenge and improve their resilience, Commvault has develop...

Claroty achieves AWS competency in OT security
Claroty achieves AWS competency in OT security

Claroty, the cyber-physical systems (CPS) protection company, announced it has achieved the Amazon Web Services (AWS) Manufacturing and Industrial Competency for Operational Technology (OT) Security. The designation validates Claroty’s commitment to securing mission-critical infrastructure via Claroty xDome’s unrivaled OT expertise. With the surge in connectivity and a growing reliance on digital systems, manufacturing industries from automotive to pharmaceuticals have become lucr...

Group-IB's role in INTERPOL's cybercrime crackdown
Group-IB's role in INTERPOL's cybercrime crackdown

Group-IB, a major creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced that it has contributed to INTERPOL’s “Operation Serengeti 2.0” between June and August 2025.  The multinational operation resulted in the arrest of 1,209 cybercriminals across Africa, targeting nearly 88,000 victims globally, and the recovery of US$97.4-million.  During the operation, investigators from 18 African countries and the United Kingdom also...

Konica Minolta's innovative print security solutions
Konica Minolta's innovative print security solutions

The global market insight and research firm, which specialises in the convergence of print and digital technologies in the future workplace, recognises how Konica Minolta ‘retains a keen focus on enhancing print and endpoint security across three pillars – device-level resilience, managed security services, and workflow automation – aligned to support zero trust environments and evolving compliance demands'. AI-driven threats redefine print security priorities Published in Ju...

Matrix at DTS 2025: Made-in-India security solutions
Matrix at DTS 2025: Made-in-India security solutions

Building on a decades-long focus on safety, compliance, and resilience, Matrix is set to participate in the Defence & Technology Show (DTS 2025). At the event, Matrix will showcase an integrated portfolio of security and telecom solutions designed to safeguard people, assets, and infrastructure. These solutions are not only 100% Made-in-India but also STQC ER-certified to ensure cybersecurity and data integrity aligned with Indian regulatory frameworks. Matrix’s vision of export opti...

World Quantum Readiness Day 2025: DigiCert event lineup
World Quantum Readiness Day 2025: DigiCert event lineup

DigiCert, a major provider of digital trust, announced the speaker lineup for its World Quantum Readiness Day event, set to take place virtually on September 10, 2025. The event will bring together top voices in quantum computing, cryptography, and cybersecurity to provide actionable guidance on preparing for the quantum era. “Quantum computing is reshaping the foundation of digital security, and it’s essential that organisations understand and prepare for this next chapter,&rdqu...

Athena Security's iPad hospital VMS launch
Athena Security's iPad hospital VMS launch

Athena Security, a pioneer in AI-driven physical security solutions, has announced the launch of its new Hospital Visitor Management System (VMS) on the Apple iPad. Purpose-built to meet the critical needs of healthcare facilities. Athena’s Hospital VMS is the first Apple iPad solution in the industry to offer seamless offline capabilities—ensuring that hospitals stay operational and secure, even amidst internet interruptions due to down servers, power outages, or natural disasters....

Rapid7's Vector Command Advanced: Reducing risk & compliance
Rapid7's Vector Command Advanced: Reducing risk & compliance

Rapid7, Inc., a pioneer in threat detection and exposure management, announced the launch of Vector Command Advanced. The new offering adds to its continuous red teaming and exposure validation service to now help organisations meet compliance requirements with internal penetration and segmentation testing on top of validating the effectiveness of internal controls and lateral movement protections.  Vector Command Advanced “Security leaders today are looking for outcomes. Ultimate...

Gartner names Integrity360 a key DFIR vendor 2025
Gartner names Integrity360 a key DFIR vendor 2025

Integrity360, one of Europe and EMEA’s pioneering cyber security specialists, has been named as a Representative Vendor in the 2025 Gartner Market Guide for Digital Forensics and Incident Response (DFIR). The Gartner Market Guide provides security and risk management pioneers with insights to understand the DFIR market, evaluate trends, refine requirements and identify market players. Integrity360 is listed among 40 vendors globally which, according to Gartner, best represent th...

Hanwha Vision multi-directional camera launch
Hanwha Vision multi-directional camera launch

Hanwha Vision, a pioneer in security and surveillance solutions, launches a compact multi-directional camera that combines an 18x AI-powered PTZ module with three 5MP fixed lenses.  The model, PNM-C19183RVTP, is designed to deliver seamless wide-area coverage, high-resolution zoom capabilities, and AI-powered insights. Ideal for monitoring open and complex spaces such as parking areas, intersections, and stadiums, the solution replaces traditional multi-camera setups with a streamlined de...

Cyber resilience & AI security at Kuwait Summit 2025
Cyber resilience & AI security at Kuwait Summit 2025

As Kuwait continues its rapid digital advancement across government, critical infrastructure, and enterprise sectors, cybersecurity threats are growing in complexity and scale. In response, TraiCon Events proudly presents the Cyber Revolution Summit – Kuwait, set to take place on September 29, 2025, at a premier venue in Kuwait City. This exclusive summit is designed to convene over 350 pre-qualified cybersecurity professionals, including CISOs, CIOs, CTOs, Risk Managers, and Government O...

Darley launches new uncrewed systems hub
Darley launches new uncrewed systems hub

Darley, a globally renowned provider of defense, fire, and emergency services equipment, is proud to announce the launch of a new section on its website, darley.com/uncrewed-systems, dedicated exclusively to uncrewed systems. This new hub showcases cutting-edge solutions from top trusted industry partners, spotlighting a robust lineup of U.S.-made, Blue UAS Cleared, and NDAA-compliant uncrewed platforms. Darley’s expanding portfolio In addition, the site features support and access to D...

Checkmarx report: AI's impact on application security
Checkmarx report: AI's impact on application security

Checkmarx, the pioneer in agentic AI-powered application security, released the results of its annual survey titled “Future of Application Security in the Era of AI,” offering a candid assessment of how AI‑accelerated development is reshaping the risk landscape and how to prepare for the year ahead. The study surveyed more than 1,500 CISOs, AppSec managers and developers across North America, Europe and Asia‑Pacific to understand how organisations are adapting to a world where softw...

Invicti acquires Kondukto: Boosting AppSec management
Invicti acquires Kondukto: Boosting AppSec management

Invicti Security, the pioneer in dynamic application security testing (DAST), announced the acquisition of Kondukto, the pioneer of the first Application Security Posture Management (ASPM) solution. With this acquisition, Invicti is delivering on what security teams have long demanded: the ability to correlate runtime-validated DAST findings with broader ASPM data to drive precise, scalable, and actionable AppSec programs. By combining Invicti’s recently launched AI-powered DAST with AS...

Kinibi 700a by Trustonic enhances cybersecurity solutions
Kinibi 700a by Trustonic enhances cybersecurity solutions

Pioneering cybersecurity business, Trustonic, has unveiled the launch of Kinibi 700a, the most sophisticated version of its Trusted Execution Environment [TEE] to date. Established in 2012, Trustonic delivers advanced technology systems to drive innovation, protect revenue, and enhance security for device manufacturers worldwide. Through its advanced Trusted Execution Environment [TEE] Kinibi, Trustonic successfully protects over 3 billion connected devices and counts the world’s major...

Absolute Resilience for MSPs: Enhance endpoint security
Absolute Resilience for MSPs: Enhance endpoint security

Absolute Security, a pioneer in enterprise cyber resilience, announced that Absolute Resilience for MSPs has launched a newly certified integration with ConnectWise RMM™ on the ConnectWise Asio™ platform. For more details on this new integration, please visit the ConnectWise Marketplace, which connects Managed Service Providers (MSPs) with a vast ecosystem of third-party integrations designed to enhance their service offerings and drive business growth. Digital ecosystem MSPs will...

DigiCert joins NIST project for secure software development
DigiCert joins NIST project for secure software development

DigiCert, a major global provider of digital trust, announced its participation in the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) project focused on Secure Software Development, Security, and Operations (DevSecOps) Practices. DigiCert joins 13 other technology collaborators, including Google, Microsoft, IBM, Palo Alto Networks, CyberArk, Dell Technologies, and GitLab, to help design and demonstrate integrated solutions that improve...

Ontic partners with 360 Privacy for enhanced threat management
Ontic partners with 360 Privacy for enhanced threat management

360 Privacy announced a partnership with Ontic to integrate industry-pioneering digital executive protection capabilities directly into the Ontic Platform.  This integration gives security teams a single, connected system to proactively detect, assess, and act on threats across the full spectrum of risk. Through this alliance, Ontic enhances its offering for executive protection teams by embedding 360 Privacy’s proven personal data removal and monitoring technologies—without r...

Ash Parikh joins as CMO at Absolute Security
Ash Parikh joins as CMO at Absolute Security

Absolute Security, a pioneer in enterprise cyber resilience, today announced Ash Parikh as its new Chief Marketing Officer (CMO). Ash has more than 25 years of experience leading go-to-market strategy and execution across the cybersecurity, data management, analytics, and enterprise software industries.  Known for building world-class teams and nurturing top talent, Parikh will oversee global marketing for the company, including brand, demand generation, product marketing, and communicat...

Zimperium's mobile security insights
Zimperium's mobile security insights

Zimperium, the world pioneer in mobile security, is warning organisations about the growing risks posed by rooting and jailbreaking tools, which continue to expose mobile devices to severe security vulnerabilities. These tools, often developed by independent developers without proper security oversight, enable unauthorised access to mobile systems and can be exploited by cybercriminals. Zimperium’s research Zimperium’s research has highlighted how modern rooting frameworks, such...

Top video surveillance software by Genetec Inc.
Top video surveillance software by Genetec Inc.

Genetec Inc. (“Genetec”), the global pioneer in enterprise physical security software, announced that it continues to dominate the global video surveillance software market, according to newly published reports from independent industry analyst firms, Omdia and Novaira Insights. According to Omdia’s 2025 Video Surveillance & Analytics Database Report, Genetec retained its #1 position worldwide in video surveillance software, and is also ranked #1 globally in the broader ca...

Rapid7 2025 Access Brokers Report: Cyber threat insights
Rapid7 2025 Access Brokers Report: Cyber threat insights

Rapid7, Inc., a pioneer in threat detection and exposure management, released its 2025 Access Brokers Report, a new research analysis of illicit underground marketplaces where cybercriminals buy and sell access to corporate networks. Drawing on six months of threat intelligence from dark web forums Exploit, XSS, and BreachForums, the report uncovers new insights into how initial access to compromised businesses is being sold — often for less than $1,000 — and the steps defender...

Gallagher Security appoints new sales manager
Gallagher Security appoints new sales manager

Gallagher Security is pleased to announce the appointment of Sean Pathak as the new Sales Manager for the Upper North Island region, based in Auckland. This appointment reflects Gallagher’s commitment to strengthening the team with a focus on IT and business intelligence. Sean brings extensive experience from across the technology reseller, vendor, and distribution landscape, giving him a deep appreciation of the full channel ecosystem and the vital role partnerships play in driving...

Akira ransomware exploits SonicWall SSL VPNs globally
Akira ransomware exploits SonicWall SSL VPNs globally

Global cyber risk consultancy S-RM has reported a sharp increase in ransomware incidents exploiting SonicWall firewall devices with SSL VPN enabled. The activity, tied to the Akira ransomware strain, is impacting organisations worldwide and has knock-on effects for everyday users. The warning comes amid heightened national debate around the UK Government’s Online Safety Act and the security implications of VPN usage. S-RM says the latest attacks are a timely reminder that while VPNs can b...

Viakoo & UNR: Cybersecurity support with Reno Aces
Viakoo & UNR: Cybersecurity support with Reno Aces

A solid defence is essential in baseball and cyberspace. The University of Nevada, Reno Cybersecurity Center and Internet of Things (IoT) cybersecurity company Viakoo are supporting cybersecurity awareness during the Reno Aces 2025 season. Viakoo will donate to the Cybersecurity Center every time the Aces make a defensive play that prevents the opposing team from stealing base, and light up the stadium with “A Salute to Cyber Defenders” across all signage. As part of this promoti...

Digital Revolution Summit 2025: Transforming Bahrain
Digital Revolution Summit 2025: Transforming Bahrain

The digital era is not approaching—it’s already reshaping the world at an unprecedented pace. From AI to fintech, smart cities to cybersecurity, the next wave of innovation is here. TraiCon Events is proud to present the Digital Revolution Summit 2025, a dynamic platform that brings together global tech visionaries, policymakers, and industry pioneers to explore the future of digital transformation. Held on September 16, 2025, in the innovation hub of Bahrain, this high-impact, one-...

2026 security trends: Insights from Gallagher survey
2026 security trends: Insights from Gallagher survey

Following the global impact of its 2025 Security Industry Trends Report, Gallagher Security is once again calling on security professionals and industry stakeholders to add their voice to a new year of research. The 2026 Security Industry Trends Survey is now open and is designed to uncover the shifts, challenges, and strategic priorities shaping the next era of security. From integrators and consultants to IT professionals and end users, the survey is a unique opportunity to contribute insight...

View more
  • «
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec