SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Ensign InfoSecurity joins MITRE CTID for cybersecurity
    • Sectigo joins Pax8 Marketplace with CLM solution
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Imagine 2025

    Imagine 2025

    IoT Solutions World Congress 2025

    IoT Solutions World Congress 2025

    World Police Summit 2025

    World Police Summit 2025

    Gartner Supply Chain Leaders Forum 2025

    Gartner Supply Chain Leaders Forum 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Ultimate key control guide
  • How is AI transforming security?
  • Design vs systems
  • Women in security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
  • More
    Video technology strategies for hospitals are moving beyond security

    Video technology strategies for hospitals are moving beyond security

    Cyber security - News

    Green Raven: DORA's minimal effect on cyber confidence
    Green Raven: DORA's minimal effect on cyber confidence

    Adopting the provisions of the EU’s Digital Operational Resilience Act (DORA) has inspired negligible additional confidence in supply chain cybersecurity among senior cybersecurity professionals, research by consultancy Green Raven Limited indicates. UK financial entities engaging in cross-border operations with the EU must comply with DORA as of January 17th 2025. Responsibility for cybersecurity Green Raven’s research formed a quantitative survey of 200 CISOs and senio...

    Commvault boosts Active Directory recovery speed
    Commvault boosts Active Directory recovery speed

    Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, introduced an expansion of its platform to provide full and automated forest recovery for the world’s most widely used enterprise identity and access solution, Microsoft Active Directory.   As organisations continue to combat non-stop cyberattacks and threats, Commvault® Cloud Backup & Recovery for Active Directory Enterprise Edition is the latest addit...

    Wiz appoints Fazal Merchant as CFO for strategic growth
    Wiz appoints Fazal Merchant as CFO for strategic growth

    Cloud security pioneer Wiz announced the appointment of Fazal Merchant as its President & Chief Financial Officer. Merchant will lead Wiz's financial strategy and partner to drive operational excellence in support of the company's unprecedented growth while also ensuring IPO readiness. Endpoint management company Merchant joins Wiz as a highly accomplished executive, advisor, and board member with nearly 30 years of diverse global leadership experience scaling public and private companies...

    Keysight's AppFusion: Network visibility revolution
    Keysight's AppFusion: Network visibility revolution

    Keysight Technologies, Inc. launched AppFusion, a network visibility partner programme that integrates third-party security and monitoring solutions directly into its network packet brokers. The programme integrates market-pioneering technologies from Forescout, Instrumentix, and Nozomi Networks, enabling customers to streamline network and security operations (NetOps/SecOps) while significantly reducing infrastructure costs. This all-in-one, multi-vendor solution helps IT professionals reduce...

    Aryaka unveils new Cyber Threat Research Lab
    Aryaka unveils new Cyber Threat Research Lab

    Aryaka®, the pioneer in Unified SASE as a Service announced new personnel and programme investments in its commitment to delivering performance, agility, simplicity, and security across customers' global networks. The company has promoted Vidyaranya Maddi to Chief Customer Officer and hired Scott Fanning, formerly of Palo Alto Networks, as VP of Security Product Management. Aryaka also announced the launch of the Aryaka Cyber Threat Research Lab (CTRL), a proactive research centre committed...

    Hanwha Vision: Enhance video security and compliance
    Hanwha Vision: Enhance video security and compliance

    Over the years, video surveillance has transformed from a security solution to an organisation-wide intelligence tool, delivering data that improves operational efficiency, sales and marketing planning, business operations, and more. As new capabilities and analytics emerge in video systems, their popularity continues to rise — but, so does their attractiveness to malicious actors. Cybersecurity must, therefore, be at the forefront of every video deployment and maintenance strategy. Sha...

    Kivu joins Quorum Cyber to boost global security
    Kivu joins Quorum Cyber to boost global security

    Quorum Cyber – headquartered in the U.K., with offices across North America, announced the acquisition of Kivu Consulting Inc., a global cybersecurity firm specialising in Incident Response. The strategic move bolsters Quorum Cyber’s rapid global expansion, as it comes just months after it acquired Difenda, a North American company specialising in Microsoft Security Managed Services. Advisory services Founded in 2009, Kivu Consulting Inc, or ‘Kivu’, is a trusted partne...

    GlobalLogic & Hitachi Cyber unveil Kraków SOC
    GlobalLogic & Hitachi Cyber unveil Kraków SOC

    GlobalLogic Inc. is pleased to announce the opening of a new Security Operations centre (SOC) in Kraków, Poland that utilises the capabilities of Hitachi Cyber. This announcement comes as organisations face a critical moment in cybersecurity, with the start of 2025 bringing heightened risks from AI-driven attacks, ransomware-as-a-service, and supply chain vulnerabilities.  According to recent reports by ENISA, cyber incidents across Europe have doubled in 2024, and the impact o...

    Top cybersecurity insights at ISC West 2025
    Top cybersecurity insights at ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security.  Actionable strategies "We're honored to present such a remarkable array of thought pioneers at ISC West 2025," said Mary Beth Shaughnessy, ISC Eve...

    Generative AI in video surveillance by Hanwha Vision
    Generative AI in video surveillance by Hanwha Vision

    Hanwha Vision, the global vision solution provider, has unveiled its key trend forecast for video surveillance in 2025.  The industry is poised to enter an era of super-intelligent video surveillance, transcending basic detection and search capabilities and moving towards autonomous decision-making based on comprehensive understanding and analysis.  Powerful Edge AI: The next frontier  Artificial intelligence continues to redefine what’s possible in video surveillance, an...

    S-RM joins Distology to boost cyber incident response
    S-RM joins Distology to boost cyber incident response

    Global cyber security and corporate intelligence consultancy S-RM has announced a new channel distribution partnership with cyber security solutions provider and distributor, Distology. Distology represents best-in-class cyber security vendors and supports an extensive network of resellers across the EMEA region. This partnership will enable Distology’s network to access S-RM’s global, award-winning, cyber incident response services.   Incident response team S-RM has the...

    ISC West 2025: Premier security innovation event
    ISC West 2025: Premier security innovation event

    ISC West 2025 opens registration with its premier sponsor, the Security Industry Association (SIA). Taking place March 31–April 4 (SIA Education@ISC: March 31–April 3|Exhibit Hall: April 2-4) at The Venetian Expo in Las Vegas, ISC West will feature an additional day of education for the first time in the event’s history. Now spanning four days, SIA Education@ISC returns bigger and more impactful than ever. The expanded program features over 110 sessions led by 220 industry exp...

    Matrix at Intersec Dubai 2025: Discover innovative security
    Matrix at Intersec Dubai 2025: Discover innovative security

    Matrix is thrilled to announce its participation in Intersec Dubai 2025, the premier global exhibition for security, emergency response, and safety. From January 14th to 16th, 2025, at Booth CA-29, Saeed Hall 1, Matrix will showcase its comprehensive portfolio of cutting-edge, NDAA-compliant security solutions designed to meet the diverse needs of modern enterprises. End-to-end cyber-secure solutions  VMS has gained cybersecurity certification and aligns with the OWASP Top 10 Desktop Ri...

    Abnormal Security in Gartner Email Magic Quadrant
    Abnormal Security in Gartner Email Magic Quadrant

    Abnormal Security, the pioneer in AI-native human behaviour security, announced it has been recognised as a pioneer in the first-ever Gartner® Magic Quadrant™ for Email Security Platforms. A complimentary version of the full report can be found. Gartner evaluated 14 vendors across the email security market and placed Abnormal in the Leaders Quadrant. They feel this placement recognises Abnormal for excelling in both Completeness of Vision by addressing current and future email threats...

    OPSWAT acquires Fend for advanced data diode security
    OPSWAT acquires Fend for advanced data diode security

    OPSWAT, a global pioneer in critical infrastructure protection established in the U.S., announced its acquisition of Fend Incorporated. Fend is a pioneering data pipeline and cybersecurity company dedicated to securing operational technology (OT) against cyber threats, ransomware, and other evolving risks. Based in Arlington, Virginia, Fend is known for its expertise in protecting U.S. government agencies, utilities, oil and gas, manufacturing, and other critical industries where air-gappe...

    Performanta's Torvald Johnson named Microsoft MVP
    Performanta's Torvald Johnson named Microsoft MVP

    Global cybersecurity firm Performanta celebrates the recognition of its Head of Security Automation, Torvald Johnson, as one of Microsoft’s first Security Copilot Most Valuable Professionals (MVPs). The first of only 10 Security Copilot MVPs worldwide, Johnson has been recognised for his practical expertise, leadership and guidance across the cybersecurity sector and wider industries, and commitment to pursuing a future of cyber safety. Performanta’s cyber innovation “It is...

    Gallagher Security, a landmark year of innovation 2024
    Gallagher Security, a landmark year of innovation 2024

    Gallagher Security is celebrating a landmark year distinguished by the growth and innovation of its industry-pioneering solutions. As 2024 approaches, the global executive team reflects on the milestones that defined the year and offers a glimpse into the bold plans for 2025.  Award-winning excellence  Gallagher’s dedication to innovation and quality was recognised across the globe in 2024. Controller 7000 The cyber-forward Controller 7000 (C7000) earned top honours in New Z...

    Genetec security SaaS integration with Bosch cameras
    Genetec security SaaS integration with Bosch cameras

    The collaboration of Bosch and Genetec™ is bringing even greater benefits to customers with direct-to-cloud integration of Bosch cameras with Genetec Security Centre SaaS, as well as new intelligent detection and enhanced search capabilities available through Genetec Cloudlink™ cloud-managed appliance connections. Available with camera firmware release 9.40, customers choosing Genetec Security Centre SaaS gain support for Bosch application-specific artificial int...

    Rubrik Turbo Threat Hunting in cybersecurity
    Rubrik Turbo Threat Hunting in cybersecurity

    As organisations around the world struggle with extended downtime and revenue loss due to widespread cyberattacks, cybersecurity company Rubrik, Inc. announces Rubrik Turbo Threat Hunting. This unprecedented new feature is designed to dramatically accelerate cyber recovery and enables organisations to locate clean recovery points across their entire data estate in seconds.  Turbo Threat Hunting aims to allow customers to immediately identify clean recovery points and swiftly recover from c...

    Colt and Cisco's 800G route: Future of networking
    Colt and Cisco's 800G route: Future of networking

    Colt Technology Services, the digital infrastructure company, announced that it is first to successfully trial Cisco’s 800G ZR+ coherent pluggable optics in its production network using the Cisco 8000 series routers, powered by Cisco Silicon One. The Routed Optical Networking testing– carried out across the 667 km between Frankfurt and Munich, Germany– is the latest in a series of Colt trials with high-profile global partners designed to rethink technology’s previous lim...

    Cequence API security defends retail in holiday season
    Cequence API security defends retail in holiday season

    Cequence, a pioneer in API security and bot management, unveiled new insights from its CQ Prime threat research team that underscore the growing cyber threats targeting the global retail sector during the holiday season. The research reveals that businesses could face average potential losses of £2.02 million ($2.58 million) per hour throughout December due to malicious bot traffic and fraud attempts. Cequence’s UAP platform Drawing on billions of real transactions and attack data...

    HackerOne boosts security with Hai updates
    HackerOne boosts security with Hai updates

    HackerOne, the cybersecurity company dedicated to eliminating vulnerabilities through continuous testing, announced updates to its intelligent copilot Hai. Hai’s new program insights synthesise data across a customer’s programs, giving them instant understanding and actionable summaries of performance, results, and trends. Now more seamlessly integrated into workflows, Hai continues to help customers save time by making it easy to understand comprehensive program data, imp...

    Bridewell wins Thriving Together Award at Heathrow Summit
    Bridewell wins Thriving Together Award at Heathrow Summit

    Bridewell, the trusted cyber security partner for organisations operating within Critical National Infrastructure (CNI), is proud to announce that it has been awarded the prestigious ‘Thriving Together’ award at the Heathrow Business Summit. The award recognises Bridewell’s integral role in supporting Heathrow Airport’s sustainable growth and operations. Heathrow Business Summit The Heathrow Business Summit brought together strategic suppliers, senior representatives,...

    Endpoint security insights from AV-Comparatives' EPR test
    Endpoint security insights from AV-Comparatives' EPR test

    AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its 2024 Endpoint Prevention and Response (EPR) Comparative Report, showcasing the exceptional performance of pioneering cybersecurity solutions. The report evaluates the ability of these products to detect, prevent, and respond to advanced threats in real-world scenarios. MITRE ATT&CK® framework AV-Comparatives' rigorous assessment covered products from Bitdefender, Check P...

    AI trends in Genetec's physical security sector 2025
    AI trends in Genetec's physical security sector 2025

    Genetec Inc., the global pioneer in enterprise physical security software, shared the results of its 2025 State of the Physical Security Report. Based on insights from more than 600 physical security pioneers, including end users, channel partners, systems integrators, and consultants based in the Middle East, Turkey, and Africa (MEA) markets, the report offers a comprehensive analysis of evolving trends in physical security operations. Hybrid cloud adoption According to the report, 48%...

    Arctic Wolf joins Immersive Labs Cyber Million program
    Arctic Wolf joins Immersive Labs Cyber Million program

    Arctic Wolf, a pioneering provider of security operations, and Immersive Labs, the pioneer in people-centric cyber resilience, announced that Arctic Wolf has joined the Immersive Labs Cyber Million program, which aims to solve the cybersecurity talent deficit by increasing access to one million entry-level cybersecurity operations jobs over the next decade. As a new partner, Arctic Wolf has made entry-level cyber jobs available on the platform.  Cyber Million program Launched by Imme...

    Auguria enhances platform with key security integrations
    Auguria enhances platform with key security integrations

    Auguria, Inc., a pioneer in AI-powered security operations solutions announced the latest version of its Security Knowledge Layer™ Platform. The newly enhanced platform can integrate with some of today's biggest data sources, including SentinelOne, CrowdStrike, Palo Alto Networks, and Microsoft Windows Event Logs. Auguria also unveiled its Explainability Graph Feature, a trailblazing tool that provides visual, context-rich threat data for security teams. Expanded integrations Secur...

    Kong Inc. on API security and AI developments
    Kong Inc. on API security and AI developments

    Kong Inc., a pioneering developer of cloud API technologies, recently released findings from their API Security Perspectives 2025: AI-Enhanced Threats and API Security Report, which highlights the API security landscape and how new developments in AI will impact it. Most notably, 25% of respondents have encountered AI-enhanced security threats related to APIs or LLMs, with 75% of respondents expressing serious concern about AI-enhanced attacks in the future. And while 85% say they’re conf...

    iDenfy expands in US with SOC II certification
    iDenfy expands in US with SOC II certification

    iDenfy, a global RegTech company specialising in Know Your Customer (KYC), Anti-Money Laundering (AML), and Know Your Business (KYB) verification solutions, has announced its achievement of SOC II certification with the submission of an independent auditor’s report. New office  This milestone confirms iDenfy’s position as a trusted partner in the US market, ensuring that its data handling practices meet rigorous standards of security and confidentiality. The certification coi...

    Rubrik DSPM boosts Gen AI data protection
    Rubrik DSPM boosts Gen AI data protection

    Sensitive data exposure is a top concern given the volume and types of data consumed by generative AI (Gen AI). Inadequate sensitive data controls and resulting data leakage can halt the use of innovative AI tools. DSPM helps accelerate AI adoption by quickly and easily identifying data risks, which is why Rubrik, Inc. is announcing Rubrik DSPM in RSC. Available in early 2025, organisations can rapidly enable DSPM for increased data visibility and sensitive data control across cloud, SaaS, and...

    View more
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • ...
    • 163
    • 164
    • »
    Related white papers
    A modern guide to data loss prevention

    A modern guide to data loss prevention

    Download
    Palm vein recognition

    Palm vein recognition

    Download
    Cybersecurity for enterprise: The essential guide to protecting your business

    Cybersecurity for enterprise: The essential guide to protecting your business

    Download
    Related articles
    How physical security consultants ensure cybersecurity for end users

    How physical security consultants ensure cybersecurity for end users

    How managed detection and response enhances cybersecurity management in organisations

    How managed detection and response enhances cybersecurity management in organisations

    Drawbacks of PenTests and ethical hacking for the security industry

    Drawbacks of PenTests and ethical hacking for the security industry

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Cyber security
    4. News
    About this page

    See an extensive list of news and developments related to Cyber security from leading industry players.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec