SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
    • Fischer's new rugged USB-C with RLS system
    • Trustonic joins RISC-V for hardware security solutions
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    46th IEEE Symposium on Security and Privacy

    46th IEEE Symposium on Security and Privacy

    Gartner Data & Analytics Summit London 2025

    Gartner Data & Analytics Summit London 2025

    Libya Build Tripoli 2025

    Libya Build Tripoli 2025

    Imagine 2025

    Imagine 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Data loss prevention
  • The Security Event 2025
  • How is AI transforming security?
  • Design vs systems
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
  • More
    Video technology strategies for hospitals are moving beyond security

    Video technology strategies for hospitals are moving beyond security

    Cyber security - News

    Eagle Eye Networks-Immix integration to deliver ground-breaking professional monitoring
    Eagle Eye Networks-Immix integration to deliver ground-breaking professional monitoring

    Eagle Eye Networks, the pioneer in cloud video surveillance, announced a technology integration enhancement with central station monitoring software provider Immix to securely connect any business location using the Eagle Eye Cloud VMS (video management system) with any central station using Immix. The integration brings the distinct advantages of cloud, including greatly simplified installation, robust end-to-end cybersecurity, centralised management of multiple locations, and AI-filteri...

    ASIS International, the National Sheriffs’ Association, and the International Association of Chiefs of Police announced the Annual International Public Law Enforcement/Private Security Partnership Day
    ASIS International, the National Sheriffs’ Association, and the International Association of Chiefs of Police announced the Annual International Public Law Enforcement/Private Security Partnership Day

    ASIS International, the National Sheriffs’ Association, and the International Association of Chiefs of Police, announce the formation of the Annual International Public Law Enforcement/Private Security Partnership Day. Security Partnership Day The International Association of Chiefs of Police (IACP), the National Sheriffs’ Association (NSA), and ASIS International (ASIS) are very pleased to announce the initiation of the Public Law Enforcement/Private Security Partnership Day. ...

    Richer features, greater integrations with the release of Gallagher Security’s Command Centre v9
    Richer features, greater integrations with the release of Gallagher Security’s Command Centre v9

    Gallagher Security is proud to announce the latest release of its award-winning security site management software, Command Centre v9.  Command Centre is designed to integrate seamlessly with a wide variety of systems and hardware, creating a single operating platform that manages total site security.  Your security, your way Meredith Palmer, Chief Product Officer at Gallagher Security explains, “Gallagher’s customer-centric mindset and commitment to research and developm...

    Nebulon delivers unmatched efficiency, security and sustainability with the first converged infrastructure DPU
    Nebulon delivers unmatched efficiency, security and sustainability with the first converged infrastructure DPU

    Nebulon, Inc.®, the pioneer of cyber-resilient smartInfrastructure™ for data centres edge to core, announced its next-generation Medusa2 SPU. It is the first and only converged infrastructure data processing unit (DPU) to unify storage, cyber and networking services on a secure, cloud-managed, server-embedded PCIe card. The Medusa2 SPU marks the first time enterprises and service providers can unify enterprise data services, cyber and network services, and server lights-out manag...

    Wazuh to unveil the latest evolution of their open-source cybersecurity platform, Wazuh 4.6.0
    Wazuh to unveil the latest evolution of their open-source cybersecurity platform, Wazuh 4.6.0

    In a world where digital threats evolve unprecedentedly, staying ahead of the curve is a necessity. The Wazuh team is delighted to unveil the latest evolution of their open-source cybersecurity platform, Wazuh 4.6.0. Together with its open-source community, Wazuh has implemented innovative strategies to enhance and fortify its cybersecurity platform to ensure organisation’s IT infrastructure remains resilient. Wazuh 4.6.0 introduces new security features, enhanced feature sets, improved p...

    Absolute’s new application Health Monitoring extends cyber resilience to endpoint security and productivity applications
    Absolute’s new application Health Monitoring extends cyber resilience to endpoint security and productivity applications

    Absolute Software, the provider of self-healing, intelligent security solutions announced the launch of Absolute Application Health. This new feature empowers digital enterprises to strengthen cyber resilience and boost end-user productivity with the industry’s most advanced application health monitoring capabilities. Health monitoring With this latest innovation to the company’s Secure Endpoint product line, customers can monitor the health of more than 2,000 commonly used Window...

    Secutech Thailand returns after three-year hiatus
    Secutech Thailand returns after three-year hiatus

    The long-awaited trade fair for security and fire safety will open its doors from 1 to 3 November at the Bangkok International Trade & Exhibition Centre (BITEC), shining a spotlight on cutting-edge solutions for various sectors including manufacturing, smart cities, the commercial sector, transportation, and hospitality. Spanning 7,500 square metres of exhibition space, the show features over 200 exhibitors from Canada, China, India, Israel, Singapore, South Korea, Taiwan, Thailand, the Uni...

    G4S: 9 in 10 security chiefs say AI will have the biggest impact on physical security operations over the next five years
    G4S: 9 in 10 security chiefs say AI will have the biggest impact on physical security operations over the next five years

    9 in 10 (90%) of Chief Security Officers (CSOs) at large, businesses operating in the UK agree that Artificial Intelligence (AI) will have the biggest impact on physical security operations over the next five years, according to G4S. The finding comes from G4S’s first-ever ‘World Security Report’-a survey of 1,775 Chief Security Officers from 30 countries with total revenue of more than $20 trillion USD. G4S has published the findings ahead of the UK hosting a two-day AI...

    SailPoint closes Osirium acquisition
    SailPoint closes Osirium acquisition

    UK subsidiary of SailPoint Technologies, Inc., a pioneer in enterprise identity security, completed its acquisition of Osirium, a UK-based security company dedicated to solving complex access needs. This acquisition will feed into the company’s vision to unify visibility, oversight, and protection across all types of access, both regular and highly sensitive, into one solution.  Clarity and real-time control “Enterprises don't have time to sort through access rights across di...

    United Kingdom (UK) schools must bolster cybersecurity amid rising cyber-attacks and threats
    United Kingdom (UK) schools must bolster cybersecurity amid rising cyber-attacks and threats

    As the new academic year rolls on, school leaders across the United Kingdom (UK) are facing a stark and unsettling reality: the rising threat of cyber-attacks looms large. Recent reports of cyber-attacks targeting institutions such as Highgate Wood School in Crouch End, St Augustine Academy in Maidstone, and Thomas Hardye School in Dorchester, UK have highlighted the pressing need for schools to fortify their cybersecurity defences. In this blog, Advantex explores how outdated infrastructure a...

    i-PRO introduces NX series network video recorders
    i-PRO introduces NX series network video recorders

    i-PRO Co. Ltd., a pioneer in professional security solutions for surveillance and public safety, announced the release of its i-PRO NX Recorder Series of professional network video recorders (NVRs), a high-capacity, secure recording solution featuring remote monitoring and no yearly licencing requirements. Designed for medium-sized businesses that require serverless simplicity and cost-effective installation and maintenance, the NX RecorderSeries provides flexible channel expansion and offers c...

    Eaton delivers enhanced connectivity and cybersecurity innovation for backup power technologies
    Eaton delivers enhanced connectivity and cybersecurity innovation for backup power technologies

    Intelligent power management company Eaton announced its latest innovation in connected backup power and cybersecurity with the North American launch of its Gigabit Network Card (Network-M3). Network-M3 card  The Network-M3 card features all the enhanced capabilities customers expect from Eaton Gigabit Network Card technology and adds new, innovative features to help organisations meet their unique cybersecurity needs. With capabilities for web-based monitoring and alerts, the Network-M3...

    Global legal GRC solution provider Exterro expands in India through partnership with mh Service to address critical challenges in the Indian forensic system
    Global legal GRC solution provider Exterro expands in India through partnership with mh Service to address critical challenges in the Indian forensic system

    Exterro, a recognised provider of legal Governance, Risk, and Compliance (GRC) solutions, is strategically expanding its presence in India through a partnership with mh Service to address pressing challenges in the Indian forensic landscape. This partnership reflects Exterro's commitment to expanding its influence in markets, with a particular focus on India's dynamic forensic ecosystem and growing technology adoption. Exterro's strategic expansion Exterro's strategic expansion in India invol...

    Cohesity names Indra Nooyi, Jim Snabe, Ken Denman, and Tami Erwin to newly formed CEO Advisory Council
    Cohesity names Indra Nooyi, Jim Snabe, Ken Denman, and Tami Erwin to newly formed CEO Advisory Council

    Cohesity, a pioneer in AI-powered data security and management, announced that Indra Nooyi, Jim Snabe, Ken Denman, and Tami Erwin have joined a newly formed CEO Advisory Council. AI-powered data security This group of well-respected and deeply connected industry pioneers will help guide Cohesity’s CEO and executive staff, as Cohesity expands its ambitions as a pioneer in AI-powered data security and data management. As strategic advisors, they will offer business insights to the CEO of...

    New Genetec research shows cybersecurity concerns continue to rise among physical security professionals
    New Genetec research shows cybersecurity concerns continue to rise among physical security professionals

    As October brings cybersecurity awareness month into the spotlight, new research conducted by Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, reveals that cybersecurity remains a key concern for physical security experts. Based on insights from over 5,500 physical security pioneers from around the world, the research shows that while organisations are putting in place new processes to protect themselves, the lev...

    SEC welcomes new subject matter experts Mark Kelly and Bill King and Emeritus Faculty Dave Komendat
    SEC welcomes new subject matter experts Mark Kelly and Bill King and Emeritus Faculty Dave Komendat

    The Security Executive Council proudly welcomes Mark Kelly and Bill King as their two newest Subject Matter Expert Faculty and Dave Komendat as Emeritus Faculty. Mark Kelly Mark Kelly has more than 25 years of experience managing global security programs for major multi-national organisations. His expertise spans the overall suite of physical security programs, but he specialises in supply chain security. He is the former Global Head of Field Security and Supply Chain operations for Dell, the...

    Versa transforms branch and campus networks with industry’s first software-defined LAN to natively provide Zero Trust and IoT security
    Versa transforms branch and campus networks with industry’s first software-defined LAN to natively provide Zero Trust and IoT security

    Versa Networks, the global pioneer in AI/ML-powered Unified Secure Access Service Edge (SASE) and Software-Defined WAN (SD-WAN) announced Versa Secure SD-LAN, the industry’s first software-defined branch and campus Local Area Network (LAN) solution to deliver Zero Trust and IoT Security natively at the LAN Edge. This software-defined approach makes campus and branch networks more agile and integrated, and Zero Trust improves the security posture. Operational challenges For years, enterp...

    New webinar: Building cyber resiliency in a physical world
    New webinar: Building cyber resiliency in a physical world

    HiveWatch, a physical security software company reimagining how organisations keep their people and assets safe, will host a webinar alongside 3GC Group, “Building Cyber Resiliency in a Physical World,” to address the rising focus on both cyber and physical security risk, resiliency, and fusion between the two.  Title: Building Cyber Resiliency in a Physical World  Date: Tuesday, October 24 Time: 10 a.m. Pacific/1 p.m. Eastern Speakers:  Gary Good...

    ISC East to offer expansive slate of keynote speakers, educational programming and more at flagship conference
    ISC East to offer expansive slate of keynote speakers, educational programming and more at flagship conference

    ISC East, the Northeast’s pioneering security and public safety event built by RX Global, hosted in collaboration with premier sponsor the Security Industry Association (SIA) and partnership with ASIS NYC, is proud to present an expansive slate of keynote speakers and educational programming at the 2023 conference. ISC East attendees are invited to participate in all programming, which takes place Nov. 14-16 at the Jacob K. Javits Convention Center in New York City. Keynote series The 2...

    Eagle Eye Networks debuts Eagle Eye QL Stream Technology to enhance local viewing of security video
    Eagle Eye Networks debuts Eagle Eye QL Stream Technology to enhance local viewing of security video

    Eagle Eye Networks, the pioneer in cloud video surveillance, launched Eagle Eye QL Stream, a new technology that powers live, full-resolution, low-latency camera feeds to enhance local video viewing. With Eagle Eye QL Stream, security professionals can immediately and directly view surveillance video that is high quality, cybersecure, full resolution, and full-frame rate when on the local network. Eagle Eye QL Stream Eagle Eye QL Stream uses secure authorisation to obtain and route live...

    Gunnebo Entrance Control debuts HiSec Portals at Data Centre World
    Gunnebo Entrance Control debuts HiSec Portals at Data Centre World

    Gunnebo Entrance Control, a pioneer in entrance security solutions, will be attending Data Centre World to showcase its innovative security solutions tailored to the unique needs of the data centre industry. Standing as the premier destination to connect data centre professionals, Gunnebo Entrance Control will be in attendance to present its HiSec Portal, designed with the stringent security demands of data centre facilities in mind. HiSec Portal in action On stand 3G05, visitors will also b...

    Rubrik appoints Ismail Elmas as Group Vice President of International Business
    Rubrik appoints Ismail Elmas as Group Vice President of International Business

    Rubrik, the Zero Trust Data Security™ Company announced the appointment of Ismail Elmas as Group Vice President of International Business. Elmas brings more than 25 years of cybersecurity experience to the role, building transformative sales teams, and driving strategic organizational growth.  Accelerating market strategies “We are delighted to welcome Ismail to the Rubrik leadership team, where he will continue to build and scale Rubrik’s international business,”...

    Intercede launches Enterprise Managed FIDO Authentication with YubiKeys
    Intercede launches Enterprise Managed FIDO Authentication with YubiKeys

    Intercede, the global company in digital identities, has launched a solution for Enterprise Managed FIDO Authentication. Passwords, PKI and Windows Hello for Business can all be replaced with highly secure and phishing-resistant FIDO authentication, using Intercede’s enterprise multi-factor authentication (MFA) software and the award-winning YubiKey hardware authentication security key, from its FIDO technology partner - Yubico. Last year, it was reported that Windows 10 and Windows 11 op...

    Gallagher Security ushers in a new generation of cyber-focused controllers with the Controller 7000
    Gallagher Security ushers in a new generation of cyber-focused controllers with the Controller 7000

    Award-winning, security manufacturer, Gallagher Security, lays the groundwork for the new age of cybersecurity by introducing a new generation of controllers, beginning with the Controller 7000 (C7000), available for purchase on November 10. New generation of technology Capable of managing all localised access control, intruder alarms, perimeter security, business automation, and logic needs for organisations, the Controller 7000 represents a new generation of Gallagher Security technology, of...

    Siemens launches new all-in-one security testing suite for industrial networks
    Siemens launches new all-in-one security testing suite for industrial networks

    With the evolving convergence of IT and OT networks in industrial manufacturing, cybersecurity concerns have risen likewise. Moreover, legal regulations force industrial companies to enhance cybersecurity in their processes. To address the growing need for industrial cybersecurity solutions, the technology company Siemens has grown its cybersecurity solution portfolio and launched an all-in-one security testing suite for industrial communication networks. The SINEC Security Inspector is a softw...

    Security from within: taking the next great cybersecurity step with privileged access management
    Security from within: taking the next great cybersecurity step with privileged access management

    In the age of technology pervasion, news headlines are rife with stories of data breaches, the actions of opportunistic cybercriminals and the financial implications of poor security hygiene. The threat landscape is constantly expanding, and the ever-increasing data load for businesses means that there are more holes and vulnerable points in a company’s cybersecurity net than ever before. Infiltrate modern systems The majority of business and IT pioneers are well aware of the spectr...

    11:11 Systems announces new case study with Rivermark Community Credit Union
    11:11 Systems announces new case study with Rivermark Community Credit Union

    11:11 Systems (11:11), a managed infrastructure solutions provider, announces a new case study with Rivermark Community Credit Union. Founded more than 70 years ago, Rivermark Community Credit Union provides financial solutions to over 90,000 members across the Pacific Northwest. Rivermark is entrusted with making sure that all its data, including that of its members, is always running, accessible and protected. More sophisticated backup As Rivermark's data continued to grow so did their ne...

    Cequence becomes the first API security vendor on the HPE GreenLake Marketplace
    Cequence becomes the first API security vendor on the HPE GreenLake Marketplace

    Cequence Security, the pioneering provider of Unified API Protection (UAP), announced the Cequence Unified API Protection (UAP) solution is now available on the HPE GreenLake Marketplace, an ecosystem of partners that enables customers to deploy software on the HPE GreenLake edge-to-cloud platform.  The API threat landscape is constantly evolving, and attackers are becoming more sophisticated and API-specific in their tactics. One of the struggles enterprises have with their...

    Quocirca report - Secure printing: The foundation of multi-layered security
    Quocirca report - Secure printing: The foundation of multi-layered security

    The hybrid work environment has expanded the exploitable attack surface, and multiple layers of security are required to protect it from external and internal threats. Implementing secure print solutions is an easy way to ensure neither network data nor printed documents fall into the wrong hands. RFID readers and mobile authentication technology solutions help organisations implement secure print policies and seamlessly enable user authentication across multiple identification platforms. Busin...

    SOAR integration arrives for WithSecure Elements
    SOAR integration arrives for WithSecure Elements

    WithSecure™ (formerly known as F-Secure Business) has continued to evolve its Elements cloud-based security platform with the addition of several new capabilities and services that can help organisations manage risks associated with cyber attacks. WithSecure™ Elements, which can be managed by a trusted service provider or in-house, provides organisations with the flexibility to pick and choose the capabilities they need via different modules. Available modules include Endpoint Prote...

    View more
    • «
    • 1
    • 2
    • ...
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • ...
    • 163
    • 164
    • »
    Related white papers
    A modern guide to data loss prevention

    A modern guide to data loss prevention

    Download
    Palm vein recognition

    Palm vein recognition

    Download
    Cybersecurity for enterprise: The essential guide to protecting your business

    Cybersecurity for enterprise: The essential guide to protecting your business

    Download
    Related articles
    How physical security consultants ensure cybersecurity for end users

    How physical security consultants ensure cybersecurity for end users

    How managed detection and response enhances cybersecurity management in organisations

    How managed detection and response enhances cybersecurity management in organisations

    Drawbacks of PenTests and ethical hacking for the security industry

    Drawbacks of PenTests and ethical hacking for the security industry

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics The Security Event 2025 Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Cyber security
    4. News
    About this page

    See an extensive list of news and developments related to Cyber security from leading industry players.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec