SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities in the Physical World

Addressing Cybersecurity Vulnerabilities in the Physical World

Video technology strategies for hospitals are moving beyond security

Video technology strategies for hospitals are moving beyond security

Cyber security - News

Stan Oliver, CEO of Camelot Secure, wins top Maryland tech award
Stan Oliver, CEO of Camelot Secure, wins top Maryland tech award

Stanford “Stan” Oliver, CEO of Camelot Secure, a revolutionary cybersecurity company, has been named a 2025 Influential Marylander by The Daily Record in the Technology category. The prestigious award recognises pioneers who have made significant contributions to their industry and the greater Maryland community. "Throughout my life and career, I’ve believed that true leadership is about inspiring change, fostering innovation, and driving impact for the greater good,” O...

Absolute Security enhances endpoint resilience with GenAI
Absolute Security enhances endpoint resilience with GenAI

Absolute Security, a pioneer in enterprise cyber resilience, announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint devices. Foundation of AI-powered resilience Enhanced application control helps ensure critical endpoint and network security defences are present across every device and operating with maximum effectiveness and...

Absolute Resilience now in CrowdStrike Marketplace
Absolute Resilience now in CrowdStrike Marketplace

Absolute Security, a pioneer in enterprise cyber resilience, announced that Absolute Resilience™ is now available for purchase in the CrowdStrike Marketplace, the one-stop destination for CrowdStrike’s world-class ecosystem of compatible security products. With Absolute Security, organisations can further strengthen their cyber resilience by ensuring that mission-critical applications maintain continuous visibility, self-healing capabilities, and operational integrity against c...

Abnormal AI enhances Microsoft 365 security
Abnormal AI enhances Microsoft 365 security

Abnormal AI, the pioneer in AI-native human behaviour security, announced its updated Security Posture Management product, bringing AI-driven protection, automated prioritisation, and remediation guidance to customers’ Microsoft 365 environments.  As Microsoft 365 environments become more complex, accidental misconfigurations are now a major cause of cloud email vulnerabilities. The growing number of applications, layered settings, and fragmented ownership create blind spots and acci...

Zimperium's mobile security: Combat credential theft
Zimperium's mobile security: Combat credential theft

Zimperium, the global pioneer in mobile security, issued a stark warning to organisations worldwide: mobile-based credential theft is accelerating, and the wave is far from over.  Looking back over the past year, Zimperium’s global telemetry revealed more than 2,400 variants of mobile malware specifically engineered to steal login credentials and intercept multi-factor authentication (MFA) codes. These attacks are powered by mishing (mobile focused phishing) campaigns and sideloaded...

DigiCert releases open-source TrustCore SDK on GitHub
DigiCert releases open-source TrustCore SDK on GitHub

DigiCert, a global pioneer in digital trust, announced the open-source release of its TrustCore SDK, a production-proven cryptographic library for embedded and IoT devices.  Now available under the AGPL v3 licence on GitHub, TrustCore SDK gives developers the tools to design security into their products from the start by enabling them to evaluate, integrate, and customise trusted cryptographic capabilities with full transparency. By offering both an open-source option and a commercially-...

Hikvision launches HikCentral Lite v1.1.1 with AcuSeek
Hikvision launches HikCentral Lite v1.1.1 with AcuSeek

Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announced the launch of HikCentral Lite (HCL) v1.1.1 with AcuSeek — a next-generation software platform that brings real-time AI video search and unified system management to facilities of any size. Now embedded in HCL, AcuSeek transforms how teams manage video surveillance, access, and alerts — delivering fast, natural-la...

Semperis' service account protection for active directory
Semperis' service account protection for active directory

Semperis, a pioneer in AI-powered identity security and cyber resilience, announced Service Account Protection Essential, a new edition of Directory Services Protector (DSP) that provides unmatched visibility, monitoring, and alerting for Active Directory service accounts, a prime target for cyber attackers. "Service accounts are pernicious and nearly ungovernable by nature, so organisations struggle to adequately address them in security planning," said Ran Harel, Semperis AVP of Security Prod...

Fortinet validates FortiGate 700G with BreakingPoint
Fortinet validates FortiGate 700G with BreakingPoint

Keysight Technologies, Inc. announces that Fortinet chose the Keysight BreakingPoint QuickTest network application and security test tool to validate SSL deep packet inspection performance capabilities and security efficacy of its FortiGate 700G series next-generation firewall (NGFW). BreakingPoint QuickTest is Keysight’s turn-key performance and security validation solution with self-stabilising, goal-seeking algorithms that quickly assess the performance and security efficacy of a vari...

Claroty & Google boost IT-OT security collaboration
Claroty & Google boost IT-OT security collaboration

Claroty, the cyber-physical systems (CPS) protection company, announced a new strategic collaboration with Google Security Operations that brings greater threat detection and response capabilities to organisations looking to bridge the gap between IT and operational technology (OT) in order to secure mission-critical infrastructure. This integration will enhance security by feeding high-fidelity, context-rich alerts and vulnerability data from SaaS-powered Claroty xDome or on-premise Claroty C...

Matrix Comsec unveils latest security tech at International Police Expo 2025
Matrix Comsec unveils latest security tech at International Police Expo 2025

Matrix Comsec, a globally renowned provider of indigenous Security and Telecom solutions, concluded a successful showing at the 10th International Police Expo 2025, held in New Delhi, India. This marquee event brought together top-level decision makers from the Police, Army, Military, and Homeland Security forces across 25+ countries. At the core of Matrix’s participation was its commitment to secure, cyber-resilient, and STQC (ER)-certified technologies, all conceived, designed, and manu...

Arctic Wolf enhances Aurora Platform with AI & integrations
Arctic Wolf enhances Aurora Platform with AI & integrations

Arctic Wolf, a global pioneer in security operations, announced enhancements to the Arctic Wolf Aurora Platform through new integrations with Microsoft, Oracle, OneLogin, and CyberArk.  As one of the industry’s first open security operations platforms, Aurora is uniquely designed to offer a flexible approach to both data ingestion and core functionality, empowering customers to build and customise their ideal security stack.  These new integrations expand the platform’s o...

NEXT Biometrics enhances IAM with Oyster III solution
NEXT Biometrics enhances IAM with Oyster III solution

NEXT Biometrics has extended its partnership with a U.S. based, Identity and Access Management (IAM) and biometric authentication solution provider. NEXT’s technology is already embedded in the partner’s existing solutions, and now provides the foundation for the latest solution in its range. These solutions help governments and corporations in the fight against cyber threats, like phishing, by moving to passwordless user identification through zero-trust multi-factor authenticat...

Corsha secures M2M identity with Cybernetix investment
Corsha secures M2M identity with Cybernetix investment

Corsha, the first and only Machine Identity Provider (mIDP) purpose-built to secure machine-to-machine (M2M) communication across operational systems and critical infrastructure, announced an investment from Cybernetix Ventures, a pioneering early-stage VC firm at the forefront of robotics, automation, and physical AI. The funds will accelerate Corsha’s mission to secure every machine connection across robotics and industrial autonomous systems. Secure identity and access management Cor...

Discover Illumio Insights for enhanced cyber resilience
Discover Illumio Insights for enhanced cyber resilience

Illumio, the breach containment company, announced the general availability of Illumio Insights, a powerful new product within the Illumio Platform. As the only platform that delivers a complete approach to reducing lateral movement risk, Illumio now combines AI-powered detection, real-time risk insights, and one-click containment with strategic segmentation for proactive protection. Built on an AI security graph, Illumio Insights transforms how security teams detect, prioritise, and contain t...

Tirios adopts artius.iD's decentralised ID technology
Tirios adopts artius.iD's decentralised ID technology

artius.iD, the global pioneer in decentralised identity management solutions, has signed a deal with real estate investment platform Tirios to bring its ultra-secure, passwordless ID verification technology to the platform’s users. Once the implementation is complete, Tirios users will be able to seamlessly access their investment accounts using artius.iD’s identity verification technology, without the need for passwords, multi-factor authentication, or verification codes. This wil...

Matrix cameras: Advanced solutions for manufacturing security
Matrix cameras: Advanced solutions for manufacturing security

As manufacturing facilities become more automated and interconnected, the need for robust security grows more urgent. Factors like automation, supply chain complexity, and new regulatory requirements introduce security threats that many facilities aren’t fully prepared for, putting people, assets, and operations at risk. Range of risks Modern industrial facilities face a diverse range of risks: Cargo Theft: In 2024, U.S. and Canadian businesses faced 3,625 cargo theft incidents...

Nutanix leads in multicloud container management
Nutanix leads in multicloud container management

Nutanix, a pioneer in hybrid multicloud computing, announced it has been positioned as a pioneer in The Forrester Wave: Multicloud Container Platforms, Q3 2025. This is Nutanix’s first appearance in the report following last year’s unveiling of the Nutanix Kubernetes Platform (NKP) at Nutanix’s NEXT conference. The launch of NKP followed Nutanix’s acquisition of D2iQ, Inc.’s Kubernetes Platform, enabling the company to provide customers with a comprehensive so...

Zimperium unveils DoubleTrouble trojan threat insights
Zimperium unveils DoubleTrouble trojan threat insights

Zimperium, the world's pioneer in mobile security, announced new findings from its zLabs team on an evolving mobile banking trojan dubbed DoubleTrouble.  The malware, which disguises itself using random two-word method names, has rapidly grown in sophistication—adding screen recording, advanced keylogging, and new UI overlay capabilities designed to steal credentials and manipulate infected devices. Discord-hosted APKs Initially spread viaphishing sites posing as European banks, Do...

Regula & Indicio transform digital identity solutions
Regula & Indicio transform digital identity solutions

Regula, a developer of identity verification (IDV) solutions and forensic devices, enters a strategic technology partnership with Indicio, a market pioneer in Verifiable Credential technology and decentralised identity solutions. Together, the two companies will deliver a breakthrough in portable digital trust by issuing document and biometric identity verification solutions as tamper-proof Verifiable Credentials. Set of ID authenticity checks Regula has the most complete set of ID authentici...

Rapid7's AI-powered threat detection solution
Rapid7's AI-powered threat detection solution

Rapid7, Inc., a pioneer in threat detection and exposure management, announced the launch of Incident Command, a powerful new next-gen SIEM extending the capabilities of its Command Platform, purpose-built to transform how security teams detect, investigate, and respond to threats. Incident Command unifies preventative attack and exposure management together with threat detection and response, all powered by Agentic AI workflows trained on playbooks designed by Rapid7’s own SOC experts,...

Commvault's AI cybersecurity boost with Satori acquisition
Commvault's AI cybersecurity boost with Satori acquisition

Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud, announced its intent to acquire Satori Cyber Ltd (Satori), a data and AI security company. Enterprises are facing a perfect storm of AI adoption, data growth and sprawl, and regulatory pressures globally. The need to manage these challenges across hybrid and multi-cloud environments is paramount for security, IT, and business pioneers, as well as boards. Control access to sensitive data By...

iDenfy integrates BankID for streamlined KYC
iDenfy integrates BankID for streamlined KYC

iDenfy, a Lithuania-based identity verification and fraud prevention software provider, has announced the integration of BankID, Sweden’s most widely used electronic identification system, into its multi-feature Know Your Customer (KYC) platform. This update enables a secure, government-compliant verification method that accepts electronic identities (eIDs). The new integration is particularly valuable for strictly regulated sectors, such as fintech, banking, and other online financial s...

Matrix showcases security solutions at Police Expo
Matrix showcases security solutions at Police Expo

Matrix, a trusted name in Security and Telecom solutions, is proud to announce its participation in the 10th International Police Expo, India’s premier platform focused exclusively on policing, internal security, and law enforcement technologies. Set to take place in New Delhi, the Expo brings together global manufacturers and police representatives from over 25 countries to explore next-generation technologies across policing, surveillance, disaster management, rescue, healthcare, and cy...

Dell's AI PC readiness report: Windows 11 key findings
Dell's AI PC readiness report: Windows 11 key findings

New research from Dell Technologies and Intel reveals that 71% of U.K. IT Decision Makers (ITDMs) view the move to Microsoft Windows 11 as an opportunity to upgrade their PC fleets with AI-capable systems.  The ‘Windows 11 and AI PC Readiness Report’ also found that U.K. businesses see upgrading to AI PCs when they transition to Windows 11 to transform operations, with 64% saying being able to run AI applications effectively is critical or extremely critical for their organisat...

Suprema AI access control gains CE RED certification
Suprema AI access control gains CE RED certification

Suprema, a pioneer in AI-powered access control and security solutions, announced that its AI-based facial authentication access control devices have obtained CE RED certification under the European Union(EU)’s updated Radio Equipment Directive (RED), which now includes stricter cybersecurity requirements. Public sources and Suprema’s own research indicate that no other access-control company has yet met this new CE RED cybersecurity standard. Earning the certificate strengthens Su...

Siren integrates Flashpoint for enhanced investigations
Siren integrates Flashpoint for enhanced investigations

Siren, the all-in-one investigation company, and Flashpoint, the pioneer in threat data and intelligence, announced a strategic partnership to deliver a unified environment to streamline end-to-end investigations, surface hidden connections, and drive timely, intelligence-led decisions for security and intelligence teams. As geopolitical tensions rise, and hybrid threats, combining cyber, physical, and informational tactics, impact both private and public sectors, organisations face increasing...

Group-IB's new Fraud Matrix boosts security agility
Group-IB's new Fraud Matrix boosts security agility

Group-IB, a pioneering creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced the launch of Fraud Matrix 2.0 - a state-of-the-art analytics tool designed to help organisations detect, respond to, and prevent fraud with greater accuracy and agility. Evolution in fraud protection Inspired by the MITRE ATT&CK® framework, Fraud Matrix is a unique comprehensive framework developed by Group-IB, designed to describe the actions and behaviours employe...

Morphean's cloud surveillance for Hanwha Vision
Morphean's cloud surveillance for Hanwha Vision

The latest in our ongoing series introducing some of Hanwha Vision’s pioneering partners leads us to Martin Jones, Director of Global Accounts at Morphean, a cloud-based video surveillance, access control, and business intelligence platform that enables users to monitor, manage, and protect their operations securely and remotely, while gaining actionable insights to drive smarter decision-making. Introduction Can you briefly introduce yourself, your role at Morphean, and what your respon...

AI-Powered FireMon Insights boosts security operations
AI-Powered FireMon Insights boosts security operations

FireMon, the major network security and firewall policy management company, releases powerful new findings from its AI-powered analytics platform, FireMon Insights: 60% of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34% falling short at critical levels. These aren’t just technical oversights; they’re signs of deeper governance issues that can lead to audit failures, operational downtime, and increased exposure to threats. Fire...

View more
  • «
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • 177
  • 178
  • »
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec