SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities In The Physical World

Addressing Cybersecurity Vulnerabilities In The Physical World

Video Technology Strategies For Hospitals Are Moving Beyond Security

Video Technology Strategies For Hospitals Are Moving Beyond Security

Cyber security - News

Group-IB Joins INTERPOL's Operation Serengeti 2.0
Group-IB Joins INTERPOL's Operation Serengeti 2.0

Group-IB, a major creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced that it has contributed to INTERPOL’s “Operation Serengeti 2.0” between June and August 2025.  The multinational operation resulted in the arrest of 1,209 cybercriminals across Africa, targeting nearly 88,000 victims globally, and the recovery of US$97.4-million. During the operation, investigators from 18 African countries and the United Kingdom also dism...

Konica Minolta: Enhancing Print And Endpoint Security
Konica Minolta: Enhancing Print And Endpoint Security

The global market insight and research firm, which specializes in the convergence of print and digital technologies in the future workplace, recognizes how Konica Minolta ‘retains a keen focus on enhancing print and endpoint security across three pillars – device-level resilience, managed security services, and workflow automation – aligned to support zero trust environments and evolving compliance demands'. AI-driven threats redefine print security priorities Published in Ju...

Matrix Showcases Indigenous Security Tech At DTS 2025
Matrix Showcases Indigenous Security Tech At DTS 2025

Building on a decades-long focus on safety, compliance, and resilience, Matrix is set to participate in the Defense & Technology Show (DTS 2025). At the event, Matrix will showcase an integrated portfolio of security and telecom solutions designed to safeguard people, assets, and infrastructure. These solutions are not only 100% Made-in-India but also STQC ER-certified to ensure cybersecurity and data integrity aligned with Indian regulatory frameworks. Matrix’s vision of export opti...

DigiCert's Quantum Readiness Day: Prepare For The Future
DigiCert's Quantum Readiness Day: Prepare For The Future

DigiCert, a major provider of digital trust, announced the speaker lineup for its World Quantum Readiness Day event, set to take place virtually on September 10, 2025. The event will bring together top voices in quantum computing, cryptography, and cybersecurity to provide actionable guidance on preparing for the quantum era. “Quantum computing is reshaping the foundation of digital security, and it’s essential that organizations understand and prepare for this next chapter,&rdqu...

Athena Security Launches IPad Hospital VMS Solution
Athena Security Launches IPad Hospital VMS Solution

Athena Security, a pioneer in AI-driven physical security solutions, has announced the launch of its new Hospital Visitor Management System (VMS) on the Apple iPad. Purpose-built to meet the critical needs of healthcare facilities. Athena’s Hospital VMS is the first Apple iPad solution in the industry to offer seamless offline capabilities—ensuring that hospitals stay operational and secure, even amidst internet interruptions due to down servers, power outages, or natural disasters....

Rapid7's Vector Command Advanced Launch Guide
Rapid7's Vector Command Advanced Launch Guide

Rapid7, Inc., a pioneer in threat detection and exposure management, announced the launch of Vector Command Advanced. The new offering adds to its continuous red teaming and exposure validation service to now help organizations meet compliance requirements with internal penetration and segmentation testing on top of validating the effectiveness of internal controls and lateral movement protections.  Vector Command Advanced “Security leaders today are looking for outcomes. Ultimate...

Integrity360 Named In 2025 Gartner Guide For DFIR
Integrity360 Named In 2025 Gartner Guide For DFIR

Integrity360, one of Europe and EMEA’s pioneering cyber security specialists, has been named as a Representative Vendor in the 2025 Gartner Market Guide for Digital Forensics and Incident Response (DFIR). The Gartner Market Guide provides security and risk management pioneers with insights to understand the DFIR market, evaluate trends, refine requirements and identify market players. Integrity360 is listed among 40 vendors globally which, according to Gartner, best represent the DFI...

Hanwha Vision Unveils AI-Powered PTZ Surveillance Camera
Hanwha Vision Unveils AI-Powered PTZ Surveillance Camera

Hanwha Vision, a pioneer in security and surveillance solutions, launches a compact multi-directional camera that combines an 18x AI-powered PTZ module with three 5MP fixed lenses. The model, PNM-C19183RVTP, is designed to deliver seamless wide-area coverage, high-resolution zoom capabilities, and AI-powered insights. Ideal for monitoring open and complex spaces such as parking areas, intersections, and stadiums, the solution replaces traditional multi-camera setups with a streamlined design....

Join The Cyber Revolution Summit Kuwait 2025
Join The Cyber Revolution Summit Kuwait 2025

As Kuwait continues its rapid digital advancement across government, critical infrastructure, and enterprise sectors, cybersecurity threats are growing in complexity and scale. In response, TraiCon Events proudly presents the Cyber Revolution Summit – Kuwait, set to take place on September 29, 2025, at a premier venue in Kuwait City. This exclusive summit is designed to convene over 350 pre-qualified cybersecurity professionals, including CISOs, CIOs, CTOs, Risk Managers, and Government O...

Darley Uncrewed Systems Hub For Defense Solutions
Darley Uncrewed Systems Hub For Defense Solutions

Darley, a globally renowned provider of defense, fire, and emergency services equipment, is proud to announce the launch of a new section on its website, darley.com/uncrewed-systems, dedicated exclusively to uncrewed systems. This new hub showcases cutting-edge solutions from top trusted industry partners, spotlighting a robust lineup of U.S.-made, Blue UAS Cleared, and NDAA-compliant uncrewed platforms. Darley’s expanding portfolio In addition, the site features support and access to D...

AI In Application Security: Checkmarx Survey Results
AI In Application Security: Checkmarx Survey Results

Checkmarx, the pioneer in agentic AI-powered application security, released the results of its annual survey titled “Future of Application Security in the Era of AI,” offering a candid assessment of how AI‑accelerated development is reshaping the risk landscape and how to prepare for the year ahead. The study surveyed more than 1,500 CISOs, AppSec managers and developers across North America, Europe and Asia‑Pacific to understand how organizations are adapting to a world where softw...

Invicti Expands With Kondukto's ASPM Acquisition
Invicti Expands With Kondukto's ASPM Acquisition

Invicti Security, the pioneer in dynamic application security testing (DAST), announced the acquisition of Kondukto, the pioneer of the first Application Security Posture Management (ASPM) solution. With this acquisition, Invicti is delivering on what security teams have long demanded: the ability to correlate runtime-validated DAST findings with broader ASPM data to drive precise, scalable, and actionable AppSec programs. By combining Invicti’s recently launched AI-powered DAST with AS...

Trustonic Unveils Advanced Kinibi 700a TEE For Cybersecurity
Trustonic Unveils Advanced Kinibi 700a TEE For Cybersecurity

Pioneering cybersecurity business, Trustonic, has unveiled the launch of Kinibi 700a, the most sophisticated version of its Trusted Execution Environment [TEE] to date. Established in 2012, Trustonic delivers advanced technology systems to drive innovation, protect revenue, and enhance security for device manufacturers worldwide. Through its advanced Trusted Execution Environment [TEE] Kinibi, Trustonic successfully protects over 3 billion connected devices and counts the world’s major...

Absolute Security Partners With ConnectWise For Resilience
Absolute Security Partners With ConnectWise For Resilience

Absolute Security, a pioneer in enterprise cyber resilience, announced that Absolute Resilience for MSPs has launched a newly certified integration with ConnectWise RMM™ on the ConnectWise Asio™ platform. For more details on this new integration, please visit the ConnectWise Marketplace, which connects Managed Service Providers (MSPs) with a vast ecosystem of third-party integrations designed to enhance their service offerings and drive business growth. Digital ecosystem MSPs will...

DigiCert Strengthens Software Security With NIST Project
DigiCert Strengthens Software Security With NIST Project

DigiCert, a major global provider of digital trust, announced its participation in the National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE) project focused on Secure Software Development, Security, and Operations (DevSecOps) Practices. DigiCert joins 13 other technology collaborators, including Google, Microsoft, IBM, Palo Alto Networks, CyberArk, Dell Technologies, and GitLab, to help design and demonstrate integrated solutions that improve...

360 Privacy & Ontic Revolutionize Threat Management
360 Privacy & Ontic Revolutionize Threat Management

360 Privacy announced a partnership with Ontic to integrate industry-pioneering digital executive protection capabilities directly into the Ontic Platform.  This integration gives security teams a single, connected system to proactively detect, assess, and act on threats across the full spectrum of risk. Through this alliance, Ontic enhances its offering for executive protection teams by embedding 360 Privacy’s proven personal data removal and monitoring technologies—without r...

Absolute Security Appoints Ash Parikh As New CMO
Absolute Security Appoints Ash Parikh As New CMO

Absolute Security, a pioneer in enterprise cyber resilience, today announced Ash Parikh as its new Chief Marketing Officer (CMO). Ash has more than 25 years of experience leading go-to-market strategy and execution across the cybersecurity, data management, analytics, and enterprise software industries. Known for building world-class teams and nurturing top talent, Parikh will oversee global marketing for the company, including brand, demand generation, product marketing, and communications....

Zimperium: Mobile Security Risks From Rooting Tools
Zimperium: Mobile Security Risks From Rooting Tools

Zimperium, the world pioneer in mobile security, is warning organizations about the growing risks posed by rooting and jailbreaking tools, which continue to expose mobile devices to severe security vulnerabilities. These tools, often developed by independent developers without proper security oversight, enable unauthorized access to mobile systems and can be exploited by cybercriminals. Zimperium’s research Zimperium’s research has highlighted how modern rooting frameworks, such...

Top Video Surveillance Software: Genetec Dominates
Top Video Surveillance Software: Genetec Dominates

Genetec Inc. (“Genetec”), the global pioneer in enterprise physical security software, announced that it continues to dominate the global video surveillance software market, according to newly published reports from independent industry analyst firms, Omdia and Novaira Insights. According to Omdia’s 2025 Video Surveillance & Analytics Database Report, Genetec retained its #1 position worldwide in video surveillance software, and is also ranked #1 globally in the broader ca...

Rapid7's 2025 Access Brokers Report Insights
Rapid7's 2025 Access Brokers Report Insights

Rapid7, Inc., a pioneer in threat detection and exposure management, released its 2025 Access Brokers Report, a new research analysis of illicit underground marketplaces where cybercriminals buy and sell access to corporate networks. Drawing on six months of threat intelligence from dark web forums Exploit, XSS, and BreachForums, the report uncovers new insights into how initial access to compromised businesses is being sold — often for less than $1,000 — and the steps defender...

Gallagher Security Elevates Sean Pathak To Sales Manager
Gallagher Security Elevates Sean Pathak To Sales Manager

Gallagher Security is pleased to announce the appointment of Sean Pathak as the new Sales Manager for the Upper North Island region, based in Auckland. This appointment reflects Gallagher’s commitment to strengthening the team with a focus on IT and business intelligence. Sean brings extensive experience from across the technology reseller, vendor, and distribution landscape, giving him a deep appreciation of the full channel ecosystem and the vital role partnerships play in driving...

S-RM Warns: Akira Ransomware Hits SonicWall VPNs
S-RM Warns: Akira Ransomware Hits SonicWall VPNs

Global cyber risk consultancy S-RM has reported a sharp increase in ransomware incidents exploiting SonicWall firewall devices with SSL VPN enabled. The activity, tied to the Akira ransomware strain, is impacting organizations worldwide and has knock-on effects for everyday users. The warning comes amid heightened national debate around the UK Government’s Online Safety Act and the security implications of VPN usage. S-RM says the latest attacks are a timely reminder that while VPNs can b...

Viakoo Teams With UNR For Cybersecurity Awareness
Viakoo Teams With UNR For Cybersecurity Awareness

A solid defense is essential in baseball and cyberspace. The University of Nevada, Reno Cybersecurity Center and Internet of Things (IoT) cybersecurity company Viakoo are supporting cybersecurity awareness during the Reno Aces 2025 season. Viakoo will donate to the Cybersecurity Center every time the Aces make a defensive play that prevents the opposing team from stealing base, and light up the stadium with “A Salute to Cyber Defenders” across all signage. As part of this promoti...

Digital Revolution Summit 2025: Transforming Tech
Digital Revolution Summit 2025: Transforming Tech

The digital era is not approaching—it’s already reshaping the world at an unprecedented pace. From AI to fintech, smart cities to cybersecurity, the next wave of innovation is here. TraiCon Events is proud to present the Digital Revolution Summit 2025, a dynamic platform that brings together global tech visionaries, policymakers, and industry pioneers to explore the future of digital transformation. Held on September 16, 2025, in the innovation hub of Bahrain, this high-impact, one-...

Gallagher Security Insights: 2026 Trends Survey Open
Gallagher Security Insights: 2026 Trends Survey Open

Following the global impact of its 2025 Security Industry Trends Report, Gallagher Security is once again calling on security professionals and industry stakeholders to add their voice to a new year of research. The 2026 Security Industry Trends Survey is now open and is designed to uncover the shifts, challenges, and strategic priorities shaping the next era of security. From integrators and consultants to IT professionals and end users, the survey is a unique opportunity to contribute insight...

Stan Oliver Wins 2025 Influential Marylander Award
Stan Oliver Wins 2025 Influential Marylander Award

Stanford “Stan” Oliver, CEO of Camelot Secure, a revolutionary cybersecurity company, has been named a 2025 Influential Marylander by The Daily Record in the Technology category. The prestigious award recognizes pioneers who have made significant contributions to their industry and the greater Maryland community. "Throughout my life and career, I’ve believed that true leadership is about inspiring change, fostering innovation, and driving impact for the greater good,” O...

Absolute Security Unveils AI-Powered Resilience Platform
Absolute Security Unveils AI-Powered Resilience Platform

Absolute Security, a pioneer in enterprise cyber resilience, announced new innovations available on the Absolute Resilience Platform. An advanced GenAI assistant enables natural-language queries that instantly answer vital questions about the security and compliance status of endpoint devices. Foundation of AI-powered resilience Enhanced application control helps ensure critical endpoint and network security defenses are present across every device and operating with maximum effectiveness and...

Absolute Resilience: Cyber Security Solutions Available Now
Absolute Resilience: Cyber Security Solutions Available Now

Absolute Security, a pioneer in enterprise cyber resilience, announced that Absolute Resilience™ is now available for purchase in the CrowdStrike Marketplace, the one-stop destination for CrowdStrike’s world-class ecosystem of compatible security products. With Absolute Security, organizations can further strengthen their cyber resilience by ensuring that mission-critical applications maintain continuous visibility, self-healing capabilities, and operational integrity against c...

Abnormal AI's Security Posture For Microsoft 365
Abnormal AI's Security Posture For Microsoft 365

Abnormal AI, the pioneer in AI-native human behavior security, announced its updated Security Posture Management product, bringing AI-driven protection, automated prioritization, and remediation guidance to customers’ Microsoft 365 environments. As Microsoft 365 environments become more complex, accidental misconfigurations are now a major cause of cloud email vulnerabilities. The growing number of applications, layered settings, and fragmented ownership create blind spots and accidental...

Zimperium Reports Surge In Credential Theft
Zimperium Reports Surge In Credential Theft

Zimperium, the global pioneer in mobile security, issued a stark warning to organizations worldwide: mobile-based credential theft is accelerating, and the wave is far from over. Looking back over the past year, Zimperium’s global telemetry revealed more than 2,400 variants of mobile malware specifically engineered to steal login credentials and intercept multi-factor authentication (MFA) codes. These attacks are powered by mishing (mobile focused phishing) campaigns and sideloaded apps t...

View more
  • «
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • ...
  • 160
  • 161
  • »
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec