SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities In The Physical World

Addressing Cybersecurity Vulnerabilities In The Physical World

Video Technology Strategies For Hospitals Are Moving Beyond Security

Video Technology Strategies For Hospitals Are Moving Beyond Security

Cyber security - News

Axis Signs CISA Secure By Design For Cybersecurity
Axis Signs CISA Secure By Design For Cybersecurity

Axis Communications, a industry pioneer in video surveillance, announces it has signed the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge to transparently communicate about the cybersecurity posture of Axis products.    The voluntary Secure by Design pledge of the U.S. government agency, CISA, calls on manufacturers to make the security of customers a core business requirement by addressing seven key aspects of security:  ...

CrowdStrike 2025: Navigating The Threat Landscape
CrowdStrike 2025: Navigating The Threat Landscape

As 2026 approaches, cybersecurity threats are evolving at an unprecedented speed. Small and medium-sized enterprises (SMEs) face rising exposure as perpetrators adopt advanced AI, expand commercialised cybercrime platforms, and intensify nation-state activity. Recent intelligence, including the CrowdStrike 2025 European Threat Landscape Report, highlights how attackers are becoming faster, more capable, and more varied in their methods, raising the stakes across the UK’s interconnected su...

CIS & Astrix Guide For Secure AI Agent Environments
CIS & Astrix Guide For Secure AI Agent Environments

The Center for Internet Security, Inc. (CIS®), Astrix Security, and Cequence Security now announced a strategic partnership to develop new cybersecurity guidance tailored to the unique risks of artificial intelligence (AI) and agentic systems.  This collaborative initiative builds on the globally recognized CIS Critical Security Controls® (CIS Controls®), extending its principles into AI environments where autonomous decision‑making, tool and API access, and automated thre...

Camelot Secure Joins Duke's Cybersecurity Board
Camelot Secure Joins Duke's Cybersecurity Board

Camelot Secure, a revolutionary cybersecurity company, now announced that Stan Oliver, President/CEO of Camelot Secure, Phoenix, and DigiFlight, has been selected as a board member to the Duke University Cybersecurity Master of Engineering Program’s Industry Advisory Board. The Board’s mission is to provide expert guidance that supports and fosters innovation and excellence in curriculum, student internships, entrepreneurship, graduate outcomes, and related areas. Evolvin...

ASIS International GSX 2026 Call For Proposals Open
ASIS International GSX 2026 Call For Proposals Open

ASIS International, the world's largest association for security management professionals, is pleased to announce the opening of its Call for Proposals for the Global Security Exchange (GSX) 2026, inviting industry experts, thought leaders, and practitioners to submit cutting-edge presentations across critical security domains.  Additionally, the association is seeking distinguished security professionals to serve as proposal reviewers, furthering the conference's...

CFIUS Conference: Filing Requirements & Risk Management
CFIUS Conference: Filing Requirements & Risk Management

As the Committee on Foreign Investment in the United States (CFIUS) continues to expand its oversight and enforce compliance, it is crucial for legal, compliance, and business pioneers to stay ahead of the latest developments. This premier conference provides in-depth discussions on the evolving CFIUS landscape, including filing requirements, risk mitigation strategies, and the impact of new regulations. Safeguarding national security interests Attendees will gain exclusive insights from gov...

WatchGuard 2026 Cybersecurity Predictions & Strategies
WatchGuard 2026 Cybersecurity Predictions & Strategies

WatchGuard has revealed its top six cybersecurity predictions for 2026, forecasting a year where AI-driven threats, regulatory pressures, and the decline of legacy tools will reshape the security landscape. Corey Nachreiner, chief security officer at WatchGuard Technologies, emphasizes that organizations must prepare for rapid evolution in both attack methods and defensive strategies. Crypto-ransomware goes extinct  In 2026, crypto-ransomware will effectively go extinct, as threat actors aban...

Panaseer IQ Suite Boosts Security Teams' Proactivity
Panaseer IQ Suite Boosts Security Teams' Proactivity

Panaseer, the pioneer in Continuous Controls Monitoring (CCM), announced the Panaseer IQ Suite, a new family of GenAI-powered tools designed for organizations who are facing growing attack surfaces and attackers using AI to increase their reach and focus. By turning cybersecurity controls data into actionable remediation across the enterprise, the IQ suite empowers security teams to take a more proactive, risk-driven approach. Panaseer CCM platform The IQ Suite builds on the Panaseer Con...

ServiceNow & Veza: Revolutionizing Identity Security
ServiceNow & Veza: Revolutionizing Identity Security

ServiceNow, the AI control tower for business reinvention, announced its intent to acquire Veza, a pioneer in identity security. The acquisition will extend the capabilities of ServiceNow’s Security and Risk portfolios into one of cybersecurity’s most important areas that is at the forefront of every breach now – Identity Security. This will enable organizations to understand and control who and what has access to their critical data, applications, systems, and AI artifacts. A...

BlackFog's ADX Vision Enhances Endpoint Security
BlackFog's ADX Vision Enhances Endpoint Security

BlackFog, the pioneer in AI-based anti data exfiltration (ADX) technology, announces the availability of its newest solution, ADX Vision. Designed to secure every endpoint and every LLM interaction, ADX Vision delivers the visibility and control organizations need to manage AI securely. Operating directly on the device, it detects shadow AI activity, prevents unauthorized data movement in real-time, and enforces governance policies automatically, all without disrupting productivity. Increase...

James Stark To Drive Wachter's Growth In AI Solutions
James Stark To Drive Wachter's Growth In AI Solutions

Wachter, Inc., a premier technology solutions integrator and innovator, proudly announces the appointment of James Stark as Business Development and Strategic Innovation Lead. With over 30 years of distinguished experience across various sectors, James is set to spearhead transformative initiatives that will enhance Wachter’s offerings for clients nationwide. A thought leader and respected speaker, Stark has graced national media platforms and industry conferences, sharing insights shaped...

Cellebrite Expands With Corellium Acquisition
Cellebrite Expands With Corellium Acquisition

Cellebrite, a pioneer in AI-powered Digital Investigative and Intelligence solutions for the public and private sectors, announces it has substantially expanded its capabilities through the acquisition of Corellium, a pioneer in Arm-based virtualization software. The addition of Corellium's technology and world-class technical talent further strengthens Cellebrite's market and technology leadership. Dramatically accelerating time This combination creates the industry's most complete digital...

Magenta's Sustainability Wins At Security Awards
Magenta's Sustainability Wins At Security Awards

Magenta Security Services marked its 30th anniversary in style last night at the Security & Fire Excellence Awards, where the company was named Security & Fire Sustainability Champion for the third year running. The Security & Fire Awards for Excellence are recognized across the sector as a benchmark for outstanding performance, innovation and best practice in both security and fire. The Sustainability Champion category honors organizations that demonstrate leadership in environment...

Eversheds Sutherland Boosts Asia TMT Expertise
Eversheds Sutherland Boosts Asia TMT Expertise

Eversheds Sutherland has appointed partner Albert (Alby) Yuen to lead its Technology, Data and Cyber offering in Asia – the firm’s latest step in advancing its global growth strategy and underpinning its commitment to investing in exceptional talent across key markets and jurisdictions. Alby was previously Head of Technology, Media & Telecommunications (TMT) – Hong Kong, at international law firm, Linklaters where he led and developed its TMT practice, advising on major re...

Redshift Joins Integrity360's Cyber Security Team
Redshift Joins Integrity360's Cyber Security Team

Continuing its global expansion plan, and its commitment to the African continent, Integrity360 has acquired Redshift, a well-established and highly regarded cyber security services company operating out of Johannesburg in South Africa.  The terms of the transaction were not disclosed. The acquisition comes on the back of Integrity360’s considerable investment in the region following the 2024 and early 2025 acquisitions of the Grove Group and Nclose. The acquisition brings Integrit...

DigiCert: Boosting Trust With Verified Email Logos
DigiCert: Boosting Trust With Verified Email Logos

As AI-generated phishing attacks flood inboxes with more realistic and personalized scams, DigiCert, a pioneer in intelligent trust, today released new research revealing that consumers are turning to verified brand identities in email for reassurance--especially during Cyber Week.  The study, conducted by independent research firm Vitreous World, surveyed 5,000 consumers across the U.S., U.K., Australia, and New Zealand to understand how verified logos and sender authentication will...

Dallmeier RDF6100DN: Advanced AI Dome Cameras
Dallmeier RDF6100DN: Advanced AI Dome Cameras

With the new RDF6100DN dome cameras, Dallmeier is expanding its successful Domera product family. The new model series is characterized in particular by its edge analytics capability, enhanced security features and an attractive price-performance ratio. The cameras of the RDF6100DN series were specially developed for applications requiring a balance of functionality and cost-effectiveness. As a high-performance entry-level solution within the Domera product family, the cameras offer high resolu...

DigiCert Secures UK's Education Sector With Jisc Support
DigiCert Secures UK's Education Sector With Jisc Support

DigiCert, a global pioneer in intelligent trust, has been selected by Jisc, the UK’s national digital, data and technology agency for education and research, to help secure the future of the UK’s connected learning ecosystem. DigiCert will support the UK education and research community in protecting sensitive data against emerging cyber threats and building the foundations for secure collaboration and innovation. Through Jisc’s national procurement framework, member instituti...

ELES Joins ENCS To Combat Evolving Cyber Threats
ELES Joins ENCS To Combat Evolving Cyber Threats

The European Network for Cyber Security (ENCS) announces that ELES, Slovenia's transmission system operator, has joined the network as a member, reinforcing collaborative efforts to protect Europe’s electricity grid from evolving cyber threats. The partnership will give ELES access to ENCS’s collaborative threat intelligence, specialist training and technical expertise – strengthening its ability to detect, prevent and respond to cyber incidents targeting high-voltage networks...

Barox And Network Optix Partnership Announced
Barox And Network Optix Partnership Announced

barox Kommunikation AG is delighted to announce the launch of their new technology partnership with Network Optix, the latest addition to their extensive integration portfolio with market pioneering VMS and PSIM providers. This new integration is designed to transform the management and support of Network Optix Nx Witness video networks. Utilizing the new barox Network Optix plug-in, Nx Witness users will be able to capitalize on a greater depth of integration capabilities. Key features include...

S-RM Promotes Casey O'Brien To Head Of Incident Response
S-RM Promotes Casey O'Brien To Head Of Incident Response

Renowned global intelligence and cyber security consultancy - S-RM has promoted Casey O’Brien to Global Head of Incident Response (IR). Casey’s appointment reflects the firm’s continued investment in its international cyber practice and its ability to support clients worldwide, around the clock. Casey will work closely with Joani Green, Chief Information Officer, to deepen collaboration between regional teams, streamline ways of working, and enhance the firm’s use of tec...

Retail Cyber Security Confidence Vs Reality: Six Degrees
Retail Cyber Security Confidence Vs Reality: Six Degrees

New independent research from Six Degrees, the secure, integrated cloud services provider, reveals a dangerous disconnect between retailer cyber confidence and real-world cyber resilience. Data from the Six Degrees Retail Whitepaper shows that while most UK retailers are highly confident about their security posture, one in five admit their current defenses wouldn’t prevent a cyber-attack. This disconnect has far-reaching impacts because the retail sector faces an increasing volume of att...

Google Cloud's Major Contract With NATO For Secure AI
Google Cloud's Major Contract With NATO For Secure AI

Google Cloud announced a significant, multi-million-dollar contract with the NATO Communication and Information Agency (NCIA) to deliver highly secure, sovereign cloud capabilities. This strategic partnership is a major step in bolstering NATO's digital infrastructure, strengthening its data governance, and enabling it to securely leverage cutting-edge cloud and AI capabilities. NCIA selected Google Distributed Cloud (GDC) to support the Joint Analysis, Training and Education Centre (JATEC). JA...

Hackuity Report Reveals Key Vulnerability Management Strain
Hackuity Report Reveals Key Vulnerability Management Strain

Hackuity, the risk-based vulnerability management provider, released new research revealing the mounting pressure on security teams as they struggle to keep pace with the rising number of CVEs (Common Vulnerabilities and Exposures). The Vulnerability Management Report explores the challenges of vulnerability management and includes insights from 200 IT security decision-makers across the UK and APAC. Additional strain As the number of CVEs continues to rise, nearly half (46%) of respondents s...

HID Appoints Jos Beernink As VP For PACS In Europe
HID Appoints Jos Beernink As VP For PACS In Europe

HID, a worldwide pioneer in trusted identity solutions, announced the appointment of Jos Beernink as Vice President Europe for its Physical Access Control (PACS) business. In this role, Beernink will lead HID’s strategy, sales and operations across the whole European region, helping organizations leverage trusted identity and access control technologies to create a secure, smarter and more efficient workplace and physical spaces. Prior roles of Beernink  Beernink brings more than 2...

HID Achieves TX-RAMP For PKIaaS Security Solution
HID Achieves TX-RAMP For PKIaaS Security Solution

HID, a pioneer in trusted identity solutions, has achieved Texas Risk and Authorization Management Program (TX-RAMP) certification for its Public Key Infrastructure as a Service (PKIaaS) solution. This certification demonstrates HID’s commitment to cybersecurity excellence and enables Texas state and local government to confidently engage with approved, trusted providers to procure secure, cloud-based certificate lifecycle management services with faster timelines and reduced administrati...

Modern Security: Analytics & AI In Business Solutions
Modern Security: Analytics & AI In Business Solutions

Businesses have come a long way in terms of security measures, evolving from a simple lock and key to sophisticated digital systems. In the past, ensuring a secure premise was all about hiring guards, installing CCTV cameras, and ensuring gates were locked. Now, the landscape of business protection has changed, and with it has come the necessity for commercial establishments to adapt swiftly. Why modern security matters The contemporary business landscape is an intricate web of both offline a...

Quantum Resilience: enQase Leads Quantum-Safe Shift
Quantum Resilience: enQase Leads Quantum-Safe Shift

As the anticipated “Q-Day” approaches—the moment when quantum computers will render traditional encryption obsolete—executives are beginning to recognize that quantum risk management has evolved into a shared value-chain imperative, not a narrow cybersecurity exercise within individual organizations. The ability to withstand quantum-driven disruption now depends on how effectively corporate ecosystems—spanning suppliers, customers, platforms, and partners—coor...

Suprema: Global Top 50 Security Innovator In 2025
Suprema: Global Top 50 Security Innovator In 2025

Suprema, a global pioneer of AI-powered security solutions, has been recognized by A&S magazine as a ‘2025 Global Top 50 Security Company’, marking its fifteenth consecutive year on the prestigious list. This consistent achievement underscores the company’s sustained growth, innovation, and global influence. A&S ranks the world’s top security companies annually based on revenue and profitability. Suprema has secured its place on this list since 2011. asmag.com&r...

Immersive's Dynamic Threat Range Boosts Cyber Readiness
Immersive's Dynamic Threat Range Boosts Cyber Readiness

Immersive, the pioneer in cyber resilience, announced the general availability of Dynamic Threat Range, a groundbreaking new capability within its Immersive One platform that transforms how organizations validate and improve cyber readiness. Dynamic Threat Range runs authentic, full-chain live-fire attacks within supported enterprise environments, delivering a level of realism that traditional log replays cannot match. Powered by a new Infrastructure-as-Code foundation, it enables complex, real...

View more
  • «
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • 160
  • 161
  • »
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec