SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    ASSA ABLOY SMARTair: Advanced Digital Access Control Solutions

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Eagle Eye Networks 911 Camera Sharing gives instant access to security cameras

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Dahua DH-HAC-T1A51-U 5MP IR HDCVI Fixed-focal Eyeball Camera

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

    Hikvision launches the next-generation Turbo HD 8.0, opening a new chapter in audio-visual fusion

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Ensign InfoSecurity joins MITRE CTID for cybersecurity
    • Sectigo joins Pax8 Marketplace with CLM solution
    • Alibi and MyDoorView partner for video intercom tech
    • G2E Asia highlights: Gaming & innovation trends
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Is audio underused in physical security? What are the obstacles?
    • How is AI transforming physical security?
    • ISC West update: New SoCs inside cameras drive intelligence at the edge
    • How should security adapt to the unique aspects of the corrections market?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    MOD Pizza upgrades with Hanwha Vision surveillance

    MOD Pizza upgrades with Hanwha Vision surveillance

    Sunprime & Dahua: Advanced security for solar plants

    Sunprime & Dahua: Advanced security for solar plants

    Hanwha Vision enhances security at Naval Park, New York

    Hanwha Vision enhances security at Naval Park, New York

    Verkada Enhances security for Salvation Army operations

    Verkada Enhances security for Salvation Army operations

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Imagine 2025

    Imagine 2025

    IoT Solutions World Congress 2025

    IoT Solutions World Congress 2025

    World Police Summit 2025

    World Police Summit 2025

    Gartner Supply Chain Leaders Forum 2025

    Gartner Supply Chain Leaders Forum 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    The ultimate guide to mastering key control

    The ultimate guide to mastering key control

    Using artificial intelligence (AI) to automate physical security systems

    Using artificial intelligence (AI) to automate physical security systems

    A modern guide to data loss prevention

    A modern guide to data loss prevention

    2025 Trends in video surveillance

    2025 Trends in video surveillance

About us Advertise
  • Ultimate key control guide
  • How is AI transforming security?
  • Design vs systems
  • Women in security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
  • More
    Video technology strategies for hospitals are moving beyond security

    Video technology strategies for hospitals are moving beyond security

    Cyber security - News

    Hornetsecurity protects OneNote with new backup features
    Hornetsecurity protects OneNote with new backup features

    Global cybersecurity pioneer, Hornetsecurity, has unveiled an upgraded version of its 365 Total Backup solution, introducing self-service recovery for end users while also offering full backup and recovery support for Microsoft OneNote. This new functionality is also available with 365 Total Protection Plans 3 and 4. Enabling end users to recover data Hornetsecurity has added a new self-service functionality to its backup solution. This allows end users to independently recover their mailbox,...

    S-RM's cyber security steps for DORA compliance
    S-RM's cyber security steps for DORA compliance

    Pioneering global cyber security and investigations consultancy S-RM has identified five critical steps for financial institutions and their ICT providers to achieve compliance with the Digital Operational Resilience Act (DORA), which will enter force from 17 January 2025. DORA establishes an EU-wide oversight framework designed to ensure the financial sector can withstand severe operational disruptions. Covering over 20,000 entities, including financial institutions, crypto-asset service...

    Colt Technology's 2025 enterprise tech outlook
    Colt Technology's 2025 enterprise tech outlook

    Colt Technology Services, the digital infrastructure company released key enterprise technology forecasts and market trends for 2025. Based on its proprietary research among over 1000 global CIOs, and gathered from market intelligence sources, Colt anticipates sustainability-driven innovation, AI regulation, and a ‘coming of age’ for Network as a Service (NaaS) to dominate the enterprise tech pioneer’s agenda over the next 12 months.  Need for AI frameworks Mirko Voltol...

    Audra Security: Next-gen protection for small business
    Audra Security: Next-gen protection for small business

    Dotlines UK has announced the upcoming launch of Audra Security, a new suite of hardware and software security products that promise to level up how homes and small businesses in the UK manage their security and internet usage.  Audra is designed to make internet security more accessible to a wider audience, by making it simpler, more affordable and user-friendly, while also championing planet-friendly initiatives. Key features of Audra Security  The announcement...

    Arctic Wolf 2025 report: Cybersecurity trends ahead
    Arctic Wolf 2025 report: Cybersecurity trends ahead

    Arctic Wolf® Labs, a global pioneer in security operations, has published the findings of its 2025 predictions report revealing the cybersecurity trends set to dominate the threat landscape over the next year. The report predicts social engineering and ransomware attacks to be some of the most common attack types in 2025, allowing threat actors to effectively bypass defences and gain entry to victim organisations. Weaknesses in identity and access management (IAM) systems, alongside a conti...

    Elite Interactive Solutions operators execute a voice-down and alerts police as an emergency medical response’
    Elite Interactive Solutions operators execute a voice-down and alerts police as an emergency medical response’

    Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, announces the company has produced a new series of educational videos. Consisting of five segments ranging from just over four minutes to a little more than seven, the series is designed to provide a synopsis of remote guarding along with more detail on some of the key aspects in a straightforward and easily digestible way. Panel of subject matter exp...

    Cysurance & Check Point: Cybersecurity insurability program
    Cysurance & Check Point: Cybersecurity insurability program

    In a vidcast interview for journalists, industry pioneers Kirsten Bay, CEO of Cysurance, and Enterprise Security Architect Randle Henry from Check Point, shed light on the emerging role of insurability assessments in bridging the gap between cybersecurity and insurance. The conversation put into context the Cysurance Insurability Assessment Program, Powered by Check Point – a joint initiative that is bending the risk curve in favour of businesses by assessing and managing their cybe...

    Integrity360 expands with Adsigo acquisition in DACH
    Integrity360 expands with Adsigo acquisition in DACH

    As part of its Pan-European expansion plan, Integrity360 has acquired pioneering European PCI QSA (Payment Card Industry Qualified Security Assessor) and cyber security services company Adsigo. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to expand further into continental Europe and provides additional skilled resources to its existing substantial PCI and cyber security compliance teams. QSA organisation by Visa Adsigo has a pioneering position in...

    Roc Technologies launches UK Security Operations Centre (SOC)
    Roc Technologies launches UK Security Operations Centre (SOC)

    IT services and solutions provider, Roc Technologies, has announced the launch of its Security Operations Centre (SOC), advancing its mission to provide accessible cyber security solutions to businesses and public sector organisations of all sizes across the UK. The SOC offers 24/7/365 monitoring and tailored security services that enhance resilience against the growing landscape of increasingly sophisticated cyber threats. A modular and scalable approach enables small and mid-sized organisatio...

    Ivanti report: GenAI's impact on cybersecurity
    Ivanti report: GenAI's impact on cybersecurity

    Ivanti, the tech company that breaks down barriers between IT and security so that Everywhere Work can thrive, released its latest report, Generative AI and Cybersecurity: Risk and Reward, which explores how organisations are navigating the complexities of generative AI (GenAI) in the realm of cybersecurity, highlighting both the opportunities and challenges it presents.   GenAI is a powerful tool that can be used by security teams to protect organisations, however, it can also be use...

    NCSC's annual review: Cyber threats intensifying
    NCSC's annual review: Cyber threats intensifying

    The National Cyber Security Centre (NCSC) new cyber chief, Richard Horne, has issued a stark warning about the growing complexity of “widely underestimated” cyber threats. Speaking at the launch of the NCSC’s eighth annual review, Richard Horne, Cyber Security Chief, commented: “What has struck me more forcefully than anything else since taking the helm at the NCSC is the clearly widening gap between the exposure and threat we face, and the defences that are in place to...

    Wipro & Netskope enhance cybersecurity with SASE
    Wipro & Netskope enhance cybersecurity with SASE

    Wipro Limited, a pioneering technology services and consulting company, announced a partnership with Netskope, a Secure Access Service Edge (SASE) pioneer, to provide global enterprises with an integrated service that optimises and improves cybersecurity outcomes for people, processes, and technology investments. Wipro’s CyberTransformSM Optimisation Service, powered by Netskope, analyses organisations’ current cybersecurity and infrastructure investments, provides consolidation gui...

    SecurityBridge partners with Altum for SAP security
    SecurityBridge partners with Altum for SAP security

    SecurityBridge, the Cybersecurity Command Centre for SAP, announced a strategic partnership with Altum Strategy Group (Altum), a pioneering advisory firm specialising in Responsible Transformation, Intelligence, Data & Technology, Operational Excellence, and Risk Management. This partnership will empower Altum’s small to mid-sized clients with SecurityBridge’s comprehensive SAP-native cybersecurity platform, providing a holistic approach to solving their SAP security challe...

    Optalysys and Zama advance FHE for secure computing
    Optalysys and Zama advance FHE for secure computing

    Optalysys, a company enabling the future of secure computing, has partnered with Zama, the open-source cryptography company building state-of-the-art FHE solutions for blockchain and AI, to advance the development of Fully Homomorphic Encryption (FHE). The partnership will see the integration of Zama’s FHE solution with Optalysys’ hardware acceleration product range, Enable, to expedite FHE adoption for its customers.  Zama’s software solutions Zama’s softwar...

    Datamatics achieves Cyber Essentials certification
    Datamatics achieves Cyber Essentials certification

    Datamatics, a global Digital Technologies, Operations, and Experiences company, has achieved the Cyber Essentials and Cyber Essentials Plus certifications.  Backed by the UK Government's National Cyber Security Centre (NCSC), these certifications validate Datamatics' robust security practices and position the company as a preferred partner for enterprises seeking trusted and secure solutions. Datamatics' proactive approach The process involved a specific evaluation of Datamatics' defence...

    Matrix shines at Inno Rail 2024 with RDSO solutions
    Matrix shines at Inno Rail 2024 with RDSO solutions

    Matrix concluded a remarkable showcase at Inno Rail 2024, held from November 28 to 30 at the RDSO Stadium Ground in Lucknow. At Booth No. 81, Matrix captivated attendees with its trailblazing security and communication solutions, specifically designed for railway and transportation sectors. Meeting stringent cybersecurity standards Visitors experienced Matrix’s RDSO 6.0-compliant network cameras, a first for India, which meet the stringent cybersecurity standards of Indian Railways. Th...

    Protect against malware with NordLayer's new feature
    Protect against malware with NordLayer's new feature

    The most common file formats for hiding malware are .exe and .zip, according to research by NordVPN. These are also the file formats that frequently land on employees' computers and end up posing great security risks to organisations. To address the issue, NordLayer, a provider of flexible cybersecurity tools for businesses, has just launched Download Protection, a robust security feature that automatically scans and instantly removes various types of malware-infected files from user-initiated...

    Cohesity boosts data security for Haute-Garonne Council
    Cohesity boosts data security for Haute-Garonne Council

    Cohesity, a pioneer in AI-powered data security, now supports the Haute-Garonne Departmental Council with Cohesity DataProtect. This allows the organisation to drastically reduce the time and resources needed to manage its backups, both on-premises and in the cloud and significantly accelerate the data recovery processes to enhance its cyber resilience. The Haute-Garonne Departmental Council manages a vast collection of data covering different functions, including building plans, architectural...

    Strategic leadership boosts artius.iD growth
    Strategic leadership boosts artius.iD growth

    artius.iD, the global pioneer in secure, self-managed identity and decentralised ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporatio...

    Post-quantum cryptography 2025: DigiCert predictions
    Post-quantum cryptography 2025: DigiCert predictions

    DigiCert, a pioneering global provider of digital trust, released its annual forecast of cybersecurity predictions for identity, technology, and digital trust expected to shape the landscape in 2025 and beyond. These predictions provide a snapshot of the cybersecurity challenges and opportunities enterprises will encounter in the months ahead. DigiCert’s full predictions and outlook for the new year can be found at DigiCert’s blog. Prediction 1: Post-Quantum Cryptography Takes Off...

    AI in video surveillance - Eagle Eye Networks report
    AI in video surveillance - Eagle Eye Networks report

    Eagle Eye Networks, the global pioneer in cloud video surveillance released the 2025 edition of its annual Trends in Video Surveillance report, identifying six trends that will have the largest impact on businesses around the world in 2025.  Designed as a resource for business owners and security professionals, the report offers trend analysis, simple explanations of newer technology, and practical advice on implementing video surveillance in new ways.   AI in video surveil...

    Modernise access control with Alcatraz AI's Rock solutions
    Modernise access control with Alcatraz AI's Rock solutions

    Alcatraz AI, a pioneer in access control and AI-powered security solutions, announces the launch of its “Switch to Alcatraz AI” promotion. From November 18, 2024, through February 15, 2025, this initiative offers an exclusive discount for new customers seeking to replace outdated biometric readers with Alcatraz AI’s advanced Rock or Rock X solutions–modern, frictionless facial authentication systems that enhance security without compromising user privacy. Physical and c...

    adesso joins CCS Cloud-14 framework for secure IT solutions
    adesso joins CCS Cloud-14 framework for secure IT solutions

    IT services provider - adesso has been admitted into the Crown Commercial Service (CCS) Cloud-14 framework, supporting the UK’s public sector in its journey toward secure, streamlined, and efficient digital transformation. The Cloud-14 framework facilitates access to IT services for government organisations, empowering them to innovate, strengthen data security, and scale services to meet public needs more effectively. Innovative solutions adesso delivers innovative solutions that enhan...

    Innovating security: Cisco at Black Hat MEA 2024
    Innovating security: Cisco at Black Hat MEA 2024

    Ahead of the Black Hat MEA in Riyadh from 26-28 November 2024, Cisco, the worldwide pioneer in networking and security, released insights into key cybersecurity trends that emerged between July and September 2024. The findings are based on analysis from Cisco Talos, one of the most trusted threat intelligence research teams globally, highlighting a notable increase in identity-based and ransomware attacks.  Identity-based attacks Over the three-month period, there was a noticeable rise...

    Beyond Encryption & Mimecast transform email security
    Beyond Encryption & Mimecast transform email security

    Beyond Encryption, a pioneer in secure digital communications, has announced a powerful new technology partnership with Mimecast, a global heavyweight in cybersecurity. The technology partnership aims to transform how businesses manage security and compliance, combining Beyond Encryption’s cutting-edge expertise in authenticated outbound comms with Mimecast’s proven track record in human risk management and robust email services.  Data protection standards Businesses are now...

    ENCS welcomes IPTO as new member for cybersecurity
    ENCS welcomes IPTO as new member for cybersecurity

    The European Network for Cyber Security (ENCS) announces that IPTO (Independent Power Transmission Operator), Greece's transmission system operator, has officially joined the network as a full member. With this new partnership, IPTO will actively participate in shaping the ENCS's strategy, while benefitting from the extensive cybersecurity knowledge sharing, training, and research available to ENCS members. Reliable transmission of electricity IPTO operates and keeps Greece's high-v...

    DMARC Manager by Hornetsecurity: Boost email security
    DMARC Manager by Hornetsecurity: Boost email security

    Hornetsecurity, a global pioneer in cybersecurity solutions, is excited to announce the launch of its DMARC Manager. The advanced tool addresses the complex challenges organisations face in managing DMARC, DKIM, and SPF configurations, especially for those operating across multiple domains. As email threats such as fraud and impersonation attacks continue to rise, the need for robust email authentication practices has never been more critical. DMARC Manager is designed to empower administrators...

    Cyware names Jawahar Sivasankaran as president
    Cyware names Jawahar Sivasankaran as president

    Cyware, the pioneering provider of threat intelligence management, low-code/no-code automation, and cyber fusion solutions, announced the appointment of Jawahar Sivasankaran as President, marking a pivotal step in Cyware’s mission to empower organisations with advanced threat intelligence and security solutions.  Jawahar brings 25+ years of experience fostering security product innovation, growth leadership, and customer success at Cisco, Splunk, and Appgate. Prior roles of Jawahar...

    Best enterprise security solutions 2024 reviewed by AV-Comparatives
    Best enterprise security solutions 2024 reviewed by AV-Comparatives

    AV-Comparatives, a globally recognised independent organisation specialising in cybersecurity testing, is pleased to announce the results of its 2024 Advanced Threat Protection (ATP) Test for enterprise cybersecurity solutions. This comprehensive evaluation provides Chief Information Security Officers (CISOs) with critical insights into the efficacy of leading endpoint protection products against sophisticated, targeted cyber threats. ATP Test The ATP Test rigorously assesses each product's a...

    AUCSO European Conference on physical security 2024
    AUCSO European Conference on physical security 2024

    The Association of University Chief Security Officers (AUCSO), the renowned organisation for security professionals working in Higher and Further Education around the world, is to host its first European Region Winter Conference at Leiden University in the Netherlands.  The Conference, which takes place from Wednesday, 27 November 2024 until Friday, 29 November 2024, is free to all AUCSO members. European Winter Conference Benny Vandenberghe, Chair of the European Region for AUCSO will o...

    View more
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • ...
    • 163
    • 164
    • »
    Related white papers
    A modern guide to data loss prevention

    A modern guide to data loss prevention

    Download
    Palm vein recognition

    Palm vein recognition

    Download
    Cybersecurity for enterprise: The essential guide to protecting your business

    Cybersecurity for enterprise: The essential guide to protecting your business

    Download
    Related articles
    How physical security consultants ensure cybersecurity for end users

    How physical security consultants ensure cybersecurity for end users

    How managed detection and response enhances cybersecurity management in organisations

    How managed detection and response enhances cybersecurity management in organisations

    Drawbacks of PenTests and ethical hacking for the security industry

    Drawbacks of PenTests and ethical hacking for the security industry

    Follow us

    Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos
    Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
    About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
    1. Home
    2. Topics
    3. Cyber security
    4. News
    About this page

    See an extensive list of news and developments related to Cyber security from leading industry players.

    See this on SecurityInformed.com

    Subscribe to our Newsletter

    Stay updated with the latest trends and technologies in the security industry
    Sign Up

    DMA

    SourceSecurity.com - Making the world a safer place
    Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

    Our other sites:
    SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

    Subscribe to our Newsletter


    SourceSecurity.com
    SecurityInformed.com

    Browsing from the Americas? Looking for our US Edition?

    View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

    US Edition International Edition
    Sign up now for full access to SourceSecurity.com content
    Download Datasheet
    Download PDF Version
    Download SourceSecurity.com product tech spec