SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos
Security and surveillance technologies for the casino market

Security and surveillance technologies for the casino market

Cloud security - News

Abnormal AI leads 2025 Gartner Magic Quadrant
Abnormal AI leads 2025 Gartner Magic Quadrant

Abnormal AI, the pioneer in AI-native human behaviour security, announced it has been recognised as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security, marking the company’s second consecutive year in the Leaders Quadrant. Gartner evaluated vendors based on their Completeness of Vision and Ability to Execute. Among 14 vendors evaluated, Abnormal was placed furthest right on the Vision axis. API-based approach In the report, Gartner highlights that “the high...

DigiCert 2026 security predictions: AI & quantum shift
DigiCert 2026 security predictions: AI & quantum shift

DigiCert, a pioneer in intelligent trust, unveiled its 2026 Security Predictions, forecasting how AI, quantum computing, and automation will reshape global trust frameworks. The predictions highlight a pivotal shift toward AI integrity, resilience, and quantum readiness as core tenets of intelligent trust. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog. 1. AI Integrity Becomes the New Trust Standard: AI authenticity will overtake dat...

Zimperium's ClayRat Android Spyware evolution
Zimperium's ClayRat Android Spyware evolution

Building on earlier research published in October 2025, Zimperium announced that its zLabs team has uncovered a significantly enhanced variant of ClayRat, an Android spyware family first detailed in the technical brief “ClayRat: A New Android Spyware Targeting Russia”. While the original ClayRat strain was able to exfiltrate SMS messages, call logs, notifications, device data, take photos, and send mass SMS or place calls, effectively allowing infected devices to become distribution...

2026 Cybersecurity threats: Key risks and strategies
2026 Cybersecurity threats: Key risks and strategies

As 2026 approaches, cybersecurity threats are evolving at an unprecedented speed. Small and medium-sized enterprises (SMEs) face rising exposure as perpetrators adopt advanced AI, expand commercialised cybercrime platforms, and intensify nation-state activity. Recent intelligence, including the CrowdStrike 2025 European Threat Landscape Report, highlights how attackers are becoming faster, more capable, and more varied in their methods, raising the stakes across the UK’s interconnected su...

CIS, Astrix & Cequence partner on AI security guidance
CIS, Astrix & Cequence partner on AI security guidance

The Center for Internet Security, Inc. (CIS®), Astrix Security, and Cequence Security now announced a strategic partnership to develop new cybersecurity guidance tailored to the unique risks of artificial intelligence (AI) and agentic systems.  This collaborative initiative builds on the globally recognised CIS Critical Security Controls® (CIS Controls®), extending its principles into AI environments where autonomous decision‑making, tool and API access, and automated thre...

WatchGuard's 2026 cybersecurity predictions unveiled
WatchGuard's 2026 cybersecurity predictions unveiled

WatchGuard has revealed its top six cybersecurity predictions for 2026, forecasting a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape. Corey Nachreiner, chief security officer at WatchGuard Technologies, emphasises that organisations must prepare for rapid evolution in both attack methods and defensive strategies. Crypto-ransomware goes extinct  In 2026, crypto-ransomware will effectively go extinct, as threat actors aban...

Teleport wins AWS Rising Star Partner 2025
Teleport wins AWS Rising Star Partner 2025

Teleport is excited to announce it has been named the winner of Rising Star Partner of the Year, recognising Teleport as a top Amazon Web Services (AWS) Partner that has seen significant YoY growth in its technology business. Announced during the Partner Awards Gala at AWS re:Invent 2025, the Geographic and Global AWS Partner Awards recognise a wide range of AWS Partners that have embraced specialisation, innovation, and cooperation over the past year. Geo and Global AWS Partner Awards recognis...

Panaseer IQ Suite boosts cybersecurity control
Panaseer IQ Suite boosts cybersecurity control

Panaseer, the pioneer in Continuous Controls Monitoring (CCM), announced the Panaseer IQ Suite, a new family of GenAI-powered tools designed for organizations who are facing growing attack surfaces and attackers using AI to increase their reach and focus. By turning cybersecurity controls data into actionable remediation across the enterprise, the IQ suite empowers security teams to take a more proactive, risk-driven approach. Panaseer CCM platform The IQ Suite builds on the Panaseer Con...

Gcore expands with new VP for Digital Native sales
Gcore expands with new VP for Digital Native sales

Gcore, the AI, cloud, network, and security solutions provider, announced the appointment of Botir Bayzakov as Vice President of Sales, Digital Native Verticals. In this newly created role, Botir will lead Gcore’s strategy and sales execution for cloud-native, high-growth companies.  A proven sales pioneer with a strong track record of driving revenue growth and delivering meaningful customer success, Botir Bayzakov brings deep expertise in building customer-focused strategies and le...

ADX Vision: BlackFog's AI security solution
ADX Vision: BlackFog's AI security solution

BlackFog, the pioneer in AI-based anti data exfiltration (ADX) technology, announces the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision delivers the visibility and control organisations need to manage AI securely. Operating directly on the device, it detects shadow AI activity, prevents unauthorised data movement in real-time, and enforces governance policies automatically, all without disrupting productivity. Increase...

Wachter appoints James Stark to drive innovation strategy
Wachter appoints James Stark to drive innovation strategy

Wachter, Inc., a premier technology solutions integrator and innovator, proudly announces the appointment of James Stark as Business Development and Strategic Innovation Lead. With over 30 years of distinguished experience across various sectors, James is set to spearhead transformative initiatives that will enhance Wachter’s offerings for clients nationwide. A thought leader and respected speaker, Stark has graced national media platforms and industry conferences, sharing insights shaped...

Securitas Technology acquires Sonitrol Ft. Lauderdale
Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology, a world pioneer and global provider of security, health, and safety technologies, is proud to announce the acquisition of Sonitrol Ft. Lauderdale and Level 5 Security Group. This strategic move reinforces Securitas Technology’s commitment to delivering client-centric solutions and expanding its geographic footprint to better serve clients across North America. Best-in-class security solutions “This acquisition aligns with our focus and commitment to deliver...

Genetec Cloudrunner app: Secure mobile vehicle intelligence
Genetec Cloudrunner app: Secure mobile vehicle intelligence

Genetec Inc., the pioneer in enterprise physical security software, announced the launch of Genetec Cloudrunner™ Mobile, a companion app for its vehicle-centric investigation system, Genetec Cloudrunner. Designed for law enforcement and security professionals, the app extends Cloudrunner’s investigative capabilities to the field, giving users faster access to critical vehicle data and alerts wherever they are. Enhanced data analysis Cloudrunner uses automatic licence pla...

Magenta Security: Leading sustainability in security
Magenta Security: Leading sustainability in security

Magenta Security Services marked its 30th anniversary in style last night at the Security & Fire Excellence Awards, where the company was named Security & Fire Sustainability Champion for the third year running. The Security & Fire Awards for Excellence are recognised across the sector as a benchmark for outstanding performance, innovation and best practice in both security and fire. The Sustainability Champion category honours organisations that demonstrate leadership in environmen...

Kindoo expands reseller program in North America
Kindoo expands reseller program in North America

Kindoo, a pioneer in modern smartphone wireless access control system solutions, announces the expansion of its Reseller Partner Program to serve the growing North American market. Kindoo’s unique access solution eliminates the longstanding barriers to entry for modern access control systems with a high-performance, highly cost-effective mobile access control solution that is easy to sell and to use providing a win-win for both resellers and end-users. Installing security dealers &ldquo...

Eversheds Sutherland expands TMT expertise with Alby Yuen
Eversheds Sutherland expands TMT expertise with Alby Yuen

Eversheds Sutherland has appointed partner Albert (Alby) Yuen to lead its Technology, Data and Cyber offering in Asia – the firm’s latest step in advancing its global growth strategy and underpinning its commitment to investing in exceptional talent across key markets and jurisdictions. Alby was previously Head of Technology, Media & Telecommunications (TMT) – Hong Kong, at international law firm, Linklaters where he led and developed its TMT practice, advising on major re...

DigiCert boosts email trust in Cyber Week
DigiCert boosts email trust in Cyber Week

As AI-generated phishing attacks flood inboxes with more realistic and personalised scams, DigiCert, a pioneer in intelligent trust, today released new research revealing that consumers are turning to verified brand identities in email for reassurance--especially during Cyber Week.  The study, conducted by independent research firm Vitreous World, surveyed 5,000 consumers across the U.S., U.K., Australia, and New Zealand to understand how verified logos and sender authentication will...

Suprema's AI security wins dual readers' choice awards
Suprema's AI security wins dual readers' choice awards

Suprema, a pioneer of AI-powered security solutions, announced that BioEntry W3 has been named the top product in the SecurityInfoWatch.com Readers’ Choice Product Awards for the Access Control Hardware category, while BioStar Air has been selected as the top product in the Access Control Software category. Suprema’s dual win in these categories demonstrates the company’s ability to deliver industry-leading innovation and reliability across both edge AI devices and advanced s...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more surveillance, access control, and IoT systems move into the cloud.  Surveillance video, access control logs, and IoT sensor readings are among an organisation's most sensitive assets. As they are increasingly hosted in data centres around the world, questions such as where that data resides, who governs it, and how it...

Milestone's AI vision model for smart cities
Milestone's AI vision model for smart cities

Milestone Systems will use the GEFION supercomputer to accelerate the development of sovereign, responsible, and high-performance AI within Europe. The work will focus on the deployment and fine-tuning of the world’s most advanced AI Vision Language Model (VLM) for traffic and smart city applications, developed by Milestone in collaboration with NVIDIA.  Today, millions of video cameras capture valuable footage that could improve everyday life. Yet much of this potential remains...

S-RM promotes Casey O'Brien, boosts cyber IR capability
S-RM promotes Casey O'Brien, boosts cyber IR capability

Renowned global intelligence and cyber security consultancy - S-RM has promoted Casey O’Brien to Global Head of Incident Response (IR). Casey’s appointment reflects the firm’s continued investment in its international cyber practice and its ability to support clients worldwide, around the clock.  Casey will work closely with Joani Green, Chief Information Officer, to deepen collaboration between regional teams, streamline ways of working, and enhance the firm’s use...

Retail sector cyber security: Six Degrees insights
Retail sector cyber security: Six Degrees insights

New independent research from Six Degrees, the secure, integrated cloud services provider, reveals a dangerous disconnect between retailer cyber confidence and real-world cyber resilience.   Data from the Six Degrees Retail Whitepaper shows that while most UK retailers are highly confident about their security posture, one in five admit their current defenses wouldn’t prevent a cyber-attack. This disconnect has far-reaching impacts because the retail sector faces an increasing v...

Genetec cloud security in 2026 predictions
Genetec cloud security in 2026 predictions

Genetec Inc., the global pioneer in enterprise physical security software, shared its top predictions for the physical security industry in 2026.  In 2026, the conversation around cloud adoption will continue to mature. Organisations will prioritize solutions that offer deployment flexibility and scalability. Rather than committing to a single deployment model, enterprises will evaluate each workload based on performance, cost, and data residency requirements. They will then choose the en...

Google Cloud secures NATO contract for sovereign cloud
Google Cloud secures NATO contract for sovereign cloud

Google Cloud announced a significant, multi-million-dollar contract with the NATO Communication and Information Agency (NCIA) to deliver highly secure, sovereign cloud capabilities. This strategic partnership is a major step in bolstering NATO's digital infrastructure, strengthening its data governance, and enabling it to securely leverage cutting-edge cloud and AI capabilities.  NCIA selected Google Distributed Cloud (GDC) to support the Joint Analysis, Training and Education Centre (JATE...

OpenText secure AI solutions with Google Cloud
OpenText secure AI solutions with Google Cloud

OpenText, a global pioneer in secure information management for AI, announced an expanded partnership with Google Cloud to deliver transformative solutions across artificial intelligence (AI), data privacy, and sovereign cloud infrastructure.  The collaboration combines OpenText’s enterprise information management expertise with Google Cloud’s AI and infrastructure technologies to help organisations solve complex business challenges with confidence and agility. Suite of intell...

Suprema: Global top security innovator in AI solutions
Suprema: Global top security innovator in AI solutions

Suprema, a global pioneer of AI-powered security solutions, has been recognised by A&S magazine as a ‘2025 Global Top 50 Security Company’, marking its fifteenth consecutive year on the prestigious list. This consistent achievement underscores the company’s sustained growth, innovation, and global influence. A&S ranks the world’s top security companies annually based on revenue and profitability. Suprema has secured its place on this list since 2011. asmag.com&r...

VAST AI OS: Transforming AI with Microsoft Azure
VAST AI OS: Transforming AI with Microsoft Azure

VAST Data, the AI Operating System company, announced at Microsoft Ignite a collaboration with Microsoft to power the next wave of agentic AI. Available soon to Azure customers, the VAST AI OS provides a simple way to deploy high-performance, scalable AI infrastructure in the cloud. Enterprises will be able to access VAST’s complete suite of data services in Azure, including unified storage, data cataloging, and database capabilities to support complex AI workflows. This integration...

API security tools: 42Crunch surpasses 2M downloads
API security tools: 42Crunch surpasses 2M downloads

42Crunch, the pioneer in DevSecOps for API security, announced that its freely available API security testing tools for developers—integrated directly into popular IDEs including VS Code, JetBrains, and Eclipse—has surpassed the 2 million downloads worldwide. This milestone reflects the accelerating demand from CISOs for enterprises to adopt a proactive approach to API security.    As AI workloads multiply and organisations rely more heavily on automated systems that consu...

Nutanix Cloud Platform supports Azure Virtual Desktop
Nutanix Cloud Platform supports Azure Virtual Desktop

Nutanix, a pioneer in hybrid multicloud computing, announced at Microsoft Ignite 2025 that its Nutanix Cloud Platform solution will support Microsoft Azure Virtual Desktop for hybrid environments. This will enable organisations to run Azure Virtual Desktop on premises on the Nutanix AHV hypervisor, offering a new level of flexibility in how virtual desktops are deployed and managed. This effort aims to meet the evolving needs of distributed workforces and will give IT teams more infrastruc...

Transform workloads with PowerScale for Microsoft Azure
Transform workloads with PowerScale for Microsoft Azure

In today’s fast-paced digital landscape, enterprises need more than just storage, they need a platform that drives innovation, scales effortlessly, and adapts to their most demanding workloads. Dell PowerScale for Microsoft Azure is purpose-built to meet these needs. Co-developed with Microsoft, this enterprise-class file storage solution delivers high performance, robust security, and seamless integration, empowering organisations to achieve their next breakthrough. From accelerating AI...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 178
  • 179
  • »
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
About this page

See an extensive list of news and developments related to Cloud security from leading industry players.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec