SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities In The Physical World

Addressing Cybersecurity Vulnerabilities In The Physical World

Video Technology Strategies For Hospitals Are Moving Beyond Security

Video Technology Strategies For Hospitals Are Moving Beyond Security

Cyber security - News

Cryoserver & Solar Archive Boost VIPRE's Portfolio
Cryoserver & Solar Archive Boost VIPRE's Portfolio

VIPRE Security Group (VIPRE), a major global provider of cybersecurity solutions and a Ziff Davis company, today announces the strategic acquisition of Forensic and Compliance Systems (FCS), including its established Cryoserver and Solar Archive brands. This acquisition significantly enhances VIPRE’s email security portfolio, reinforcing its commitment to delivering comprehensive data protection and compliance solutions for businesses and Managed Service Providers (MSPs) globally. FCS Br...

Infosecurity Europe 2025: AI's Role In Cybersecurity
Infosecurity Europe 2025: AI's Role In Cybersecurity

Infosecurity Europe, the most influential information security event, running from the 3-5 June 2025 at ExCeL has announced the introduction of new theaters as AI will be a key theme of the event, not only as a threat but also as a powerful catalyst for industry change. As artificial intelligence continues to transform both the attack landscape and internal security strategies, Infosecurity Europe 2025 will respond with a sharp focus on realigning priorities across the cybersecur...

Hacking Games & Immersive Partnership: Cyber Resilience
Hacking Games & Immersive Partnership: Cyber Resilience

The Hacking Games announces its new partnership with Immersive, the pioneer in people-centric cyber resilience. This collaboration marks a significant step forward in The Hacking Games’ mission to bridge the global cybersecurity labor deficit, currently estimated at over 4.8 million unfilled roles worldwide, to create a generation of ethical hackers to make the world safer. Generation of ethical hackers Immersive joins the Virtu-os community of founding partners, which includes some of...

Ensign InfoSecurity Wins Cybersecurity Product Of The Year
Ensign InfoSecurity Wins Cybersecurity Product Of The Year

Ensign InfoSecurity, one of Asia’s largest cybersecurity service providers, has won the “Product Excellence - Cybersecurity Product of the Year” award at the Tech Fest Hong Kong Awards 2025 for its proprietary solution, Aletheia, an AI-powered real-time deepfake detection tool that enhances digital trust and protects organizations against multimedia-based deception.  Developed by Ensign Labs, Aletheia uses multi-modal artificial intelligence to identify manipulated video...

Eric Martorano Joins Calero As Chief Revenue Officer
Eric Martorano Joins Calero As Chief Revenue Officer

Calero, the provider of Technology Business Management solutions, announces the appointment of Eric Martorano as Chief Revenue Officer (CRO) and President. In this role, Martorano will lead the company’s global go-to-market strategy and revenue growth operations, supporting Calero’s continued expansion to meet rising demand for its solutions. Eric's leadership qualities  "Eric‘s leadership and proven ability to execute have guided multiple companies to and through perio...

BlueVoyant MDR Services Recognized By Forrester Report
BlueVoyant MDR Services Recognized By Forrester Report

BlueVoyant, the pioneer in integrated cyber security, has been recognized among notable providers of Managed Detection and Response (MDR) services in Forrester's latest report, The Managed Detection And Response Services In Europe Landscape, Q2 2025. The report is designed to help security and risk professionals understand the value they can expect from MDR providers in Europe, learn how providers differ, and investigate options based on organizational size and market focus. BlueVoyant grew EM...

Cybersecurity Risks In Hotels: NordPass Password Report
Cybersecurity Risks In Hotels: NordPass Password Report

If checking into a hotel or dining out, people might assume their personal data is safe. But a new study by NordPass, in collaboration with NordStellar, reveals that many hospitality businesses are guarding their digital systems with shockingly weak passwords. From hotel reservation platforms to restaurant point-of-sale systems, the research exposes an industry-wide habit of reusing predictable, outdated, or brand-specific passwords. Entries like “Reservations2022,” “Comf...

MOBOTIX 7 Platform Verified With SySS Cyber Security
MOBOTIX 7 Platform Verified With SySS Cyber Security

MOBOTIX receives three new SySS certifications for the MOBOTIX ONE and MOBOTIX 7 platform, and MOBOTIX c71 NurseAssist – powered by Kepler Vision Technologies. This is the first SySS certification for the new MOBOTIX ONE platform and the MOBOTIX c71 NurseAssist, which specializes in the healthcare market. All tests were carried out by the renowned SySS GmbH, a pioneer provider of penetration tests in Germany. MOBOTIX cyber security “For MOBOTIX, cyber security is an integral...

Commvault Extends Kubernetes Protection with Red Hat
Commvault Extends Kubernetes Protection with Red Hat

Commvault, a leading provider of cyber resilience and data protection solutions for the hybrid cloud, today announced it is extending its Kubernetes protection to support virtual machines (VMs) running on Red Hat OpenShift Virtualization. This new capability enhances cyber resilience for organizations moving to modern application environments. Containerized workload adoption Containerized workload adoption is rapidly growing: Gartner predicts 90% of G2000 companies will use container manageme...

Secure Data Management Solution By Mimer And Trustonic
Secure Data Management Solution By Mimer And Trustonic

Pioneering cybersecurity business, Trustonic, and Pioneering Swedish database company, Mimer, have announced the commercial release of ‘Mimer Trust’. Based on the collaboration initially established in 2022, the Mimer Trust product successfully combines the strengths of Mimer’s Mimer SQL database with Trustonic’s secure platform, Kinibi, to deliver trusted data management for OEMs. Development of Mimer Trust 2.0 Trustonic and Mimer have now officially released Mimer Tr...

Dell's Modern Data Center Innovations & Security
Dell's Modern Data Center Innovations & Security

Dell Technologies helps customers design modern disaggregated data centers with storage, cyber resilience, software, and integrated solution innovations. Why it matters Organizations face increasing demands to efficiently manage and secure both modern and traditional workloads across on-premises data centers, cloud and edge environments. IT and business needs keep changing, so the modern data center must be ready for anything. Dell’s approach to disaggregated infrastructure combines man...

SoSafe Report: Third-Party Vendor Cyber Risks
SoSafe Report: Third-Party Vendor Cyber Risks

Cybercriminals are increasingly targeting vulnerabilities outside traditional corporate networks, focusing on third-party vendors and employees' personal devices to bypass organizational defences, according to SoSafe's 2025 Cybercrime Trends Report. The comprehensive survey of 500 security professionals across nine countries reveals trends in how attackers are expanding their focus beyond direct corporate targets. Internal network security "Organizations can no longer rely solely on inte...

Google Cloud Expands Risk Protection Program In EMEA
Google Cloud Expands Risk Protection Program In EMEA

Google Cloud has announced an expansion of its Risk Protection Program (RPP) to over 30 EMEA markets - including the UK - and is welcoming new cyber insurance partners - Beazley and Chubb. This update comes at a critical moment for sectors like retail, where the string of recent ransomware attacks could potentially drive a surge in cyber insurance premiums. After a period of falling prices, brokers are now warning of double-digit rate hikes and tougher underwriting across industries - from...

Device Authority's KeyScaler Integrates Microsoft Copilot
Device Authority's KeyScaler Integrates Microsoft Copilot

Device Authority has introduced a new integration between KeyScaler AI and Microsoft Copilot to help organizations respond faster to threats and reduce the manual workload on stretched security teams. This new capability is designed for users of Microsoft’s productivity suite to accelerate decision-making and improve visibility across large, complex fleets of connected devices, where delays or errors can carry significant operational risk and cost. Advantage of AI-powered insights...

barox 24-Port 10Gb Switch For HD Surveillance Networks
barox 24-Port 10Gb Switch For HD Surveillance Networks

barox Kommunikation AG, the manufacturer of professional switches, media converters and IP extenders specifically designed for video applications, has released the new ultra-dynamic KN-LGIPR38-28AD, 24-port, 10Gb Managed Industrial Ethernet PoE+ switch. In addition to employing the usual extensive barox cybersecurity features, the new KN-LGIPR38-28AD includes 90~264VAC and 57VDC power inputs, enabling up to 720W PoE capability, and power redundancy with either two DC, or one DC and one AC power...

CompTIA SecOT+: Bridging OT & IT Security Skills
CompTIA SecOT+: Bridging OT & IT Security Skills

CompTIA, the pioneering provider of vendor-neutral information technology (IT) training and certification products, announced it will begin development of a new certification focused on critical cybersecurity skills in operational technology (OT). CompTIA’s proposed SecOT+ certification will bridge critical knowledge and skill gaps between OT and IT. Security risks in manufacturing The certification will equip OT positions such as floor technicians and industrial engineers The certific...

ImmuniWeb Discovery TPRM: Manage Cyber Risks Effectively
ImmuniWeb Discovery TPRM: Manage Cyber Risks Effectively

According to the 2025 Data Breach Investigations Report (DBIR) by Verizon, the number of data breaches linked to third parties doubled in a single year, attaining a stunning 30% share of all data breaches that occurred last year. Modern-day cybercriminals are militarily rational and pragmatic. They continually probe the defense perimeter of their victims to spot the weakest link – including victim’s suppliers, IT vendors, various consultants, law firms and accountants &nda...

Commvault & Deloitte Alliance For Cyber Threat Management
Commvault & Deloitte Alliance For Cyber Threat Management

Commvault, a pioneer provider of cyber resilience and data protection solutions for the hybrid cloud, announces a strategic alliance with Deloitte. Together, Commvault and Deloitte aim to help organizations stay ahead of evolving threats by becoming more resilient, enabling the enterprise of the future.     In today's digital landscape, there is an urgent need for incident response and comprehensive cyber resilience strategies Increasing danger of cyber threats 43% of US respondents cited ke...

Mitchell-Jones Heads Nexer UK's Data & AI Expansion
Mitchell-Jones Heads Nexer UK's Data & AI Expansion

Digital transformation specialist, Nexer Enterprise Applications, has appointed senior data professional, Gareth Mitchell-Jones, as its head of data & AI for the UK, who will lead the firm’s expanding data practice. Mitchell-Jones will help customers realize greater tangible value from their Microsoft Dynamics 365, Power Platform, and Copilot investments while accelerating the adoption of modern data platforms and generative AI in a fast-evolving business world. Bringing In Vast Expe...

Ensign InfoSecurity Leads Cybersecurity Innovation
Ensign InfoSecurity Leads Cybersecurity Innovation

Ensign InfoSecurity, one of Asia’s largest comprehensive cybersecurity services providers, is proud to be featured as a Research Sponsor in the 2024 MITRE Center for Threat-Informed Defense (CTID) Impact Report, commemorating the center’s fifth anniversary. The report, available at the website, highlights the collective contributions of organizations worldwide that have supported MITRE CTID’s mission to advance open, threat-informed defense against sophisticated cyber thr...

Trustonic Joins RISC-V For Enhanced Security
Trustonic Joins RISC-V For Enhanced Security

Pioneering cybersecurity business, Trustonic, has announced its new membership of RISC-V International to provide increased access to hardware-backed security. Established in 2010, RISC-V International is the non-profit home of the open standard RISC-V Instruction Set Architecture (ISA), related specifications, and stakeholder community.  Advanced technology systems RISC-V enables its growing community to develop custom processors for a variety of applications Now boasting more than 4,5...

Reversec Joins UK Cyber Security Council
Reversec Joins UK Cyber Security Council

Reversec, a new name in cybersecurity consulting, has joined the UK Cyber Security Council as its latest Spotlight Member. This prestigious membership underscores Reversec's commitment to advancing cybersecurity standards and fostering a collaborative environment within the cyber community. Reversec will work alongside the Council and its other members to develop and promote nationally recognized standards for cybersecurity, supporting the NCSC’s strategy to make the UK the safest pl...

RAD's AI-Driven Security Solutions For Enterprise Clients
RAD's AI-Driven Security Solutions For Enterprise Clients

Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, announced that it has successfully completed its SOC 2 Type 2 audit, demonstrating the Company’s continued adherence to high standards of data security, availability, and confidentiality. This achievement confirms the effectiveness of AITX’s internal controls and security protocols across its subsidiaries, further strengthening the Company’s position as a t...

EclecticIQ And TeamT5 Boost APAC Threat Intelligence
EclecticIQ And TeamT5 Boost APAC Threat Intelligence

Cyber threats are a major concern for all industries, with increased sophistication, and ransomware attacks reaching their highest levels in four years, according to the World Economic Forum's (WEF) Global Cybersecurity Outlook 2025 report. To address this growing problem, EclecticIQ, the pioneering provider of threat intelligence solutions, has announced a strategic partnership with TeamT5, the premier threat intelligence company specializing in advanced persistent threat (APT) research in the...

Immersive AppSec Range: Elevate Cybersecurity Skills
Immersive AppSec Range: Elevate Cybersecurity Skills

Immersive, the pioneer in people-centric cybersecurity, announced the launch of AppSec Range Exercises, expanding its AppSec solution beyond hands-on labs to help cyber pioneers and practitioners prove and improve their capabilities as part of a holistic cyber readiness program. The new product offers range exercises for Engineering, AppSec and DevSecOps teams to embed security into workflows, reduce friction, and ignite secure development practices at scale. Modern software development...

ThingsRecon Unveils New Supply Chain Security Product
ThingsRecon Unveils New Supply Chain Security Product

ThingsRecon, an expert in Digital Asset Discovery and Supply Chain Attack Surface Management (EASM), announced the launch of its new supply chain product and a significantly expanded strategic partnership program. This initiative is designed to empower Managed Security Service Providers (MSSPs), Application Cybersecurity Partners, and cybersecurity consultancies to deliver comprehensive, next-generation security solutions to global enterprise organizations and governments.  Intelligence o...

Kaseya Connect 2025: AI-Powered Cybersecurity Unveiled
Kaseya Connect 2025: AI-Powered Cybersecurity Unveiled

Kaseya, the pioneering provider of AI-powered cybersecurity and IT management software, began its Kaseya Connect 2025 conference in Las Vegas by celebrating its global customer community and unveiling a new set of technology and commercial innovations. Thousands of attendees are connecting and sharing best practices to grow faster, improve service quality, and operate more efficiently – all powered by the company’s flagship AI-powered platform, Kaseya 365. Latest Kaseya 3...

Richter Enhances Cybersecurity With Red Helix Services
Richter Enhances Cybersecurity With Red Helix Services

Richter, a consulting firm specializing in civil, structural, and geotechnical engineering, has selected Red Helix, a market pioneer in cyber security and network performance, to strengthen its cyber security. The collaboration has empowered Richter to better manage IT risks, streamline compliance processes and successfully secure major infrastructure projects, including work on the UK’s high-speed rail project, HS2. Cybersecurity and risk management Operating within a globally intercon...

HID Integration: Bridging Security And Cyber Systems
HID Integration: Bridging Security And Cyber Systems

HID, pioneer in trusted identity and access management solutions, announced the launch of HID Integration Service, a platform that integrates physical security, cybersecurity and digital identity management. This integration platform-as-a-service (IPaaS) was designed to empower application developers, solution integrators and software vendors to seamlessly and rapidly integrate essential physical security solutions, streamlining processes and enhancing system interoperability. Integration...

Cisco Enhances AI Security With New XDR Capabilities
Cisco Enhances AI Security With New XDR Capabilities

Cisco has made several transformative innovation and partnership announcements that will help security professionals secure and harness the power of AI. An increasingly sophisticated threat landscape combined with an expanding talent shortage means the need has never been greater for machine scale security and response. According to Cisco’s upcoming 2025 Cybersecurity Readiness Index, companies worldwide underestimate the complexities of securing AI, with 86% saying their organizations ha...

View more
  • «
  • 1
  • 2
  • ...
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • ...
  • 160
  • 161
  • »
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec