SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Addressing Cybersecurity Vulnerabilities In The Physical World

Addressing Cybersecurity Vulnerabilities In The Physical World

Video Technology Strategies For Hospitals Are Moving Beyond Security

Video Technology Strategies For Hospitals Are Moving Beyond Security

Cyber security - News

TrustCore SDK: Open-Source Cryptography By DigiCert
TrustCore SDK: Open-Source Cryptography By DigiCert

DigiCert, a global pioneer in digital trust, announced the open-source release of its TrustCore SDK, a production-proven cryptographic library for embedded and IoT devices.  Now available under the AGPL v3 license on GitHub, TrustCore SDK gives developers the tools to design security into their products from the start by enabling them to evaluate, integrate, and customize trusted cryptographic capabilities with full transparency. By offering both an open-source option and a commercially-...

HikCentral Lite V1.1.1: Real-Time AI Security Solution
HikCentral Lite V1.1.1: Real-Time AI Security Solution

Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announced the launch of HikCentral Lite (HCL) v1.1.1 with AcuSeek — a next-generation software platform that brings real-time AI video search and unified system management to facilities of any size. Now embedded in HCL, AcuSeek transforms how teams manage video surveillance, access, and alerts — delivering fast, natural-la...

Semperis Enhances Service Account Protection With DSP
Semperis Enhances Service Account Protection With DSP

Semperis, a pioneer in AI-powered identity security and cyber resilience, announced Service Account Protection Essential, a new edition of Directory Services Protector (DSP) that provides unmatched visibility, monitoring, and alerting for Active Directory service accounts, a prime target for cyber attackers. "Service accounts are pernicious and nearly ungovernable by nature, so organizations struggle to adequately address them in security planning," said Ran Harel, Semperis AVP of Security Prod...

FortiGate 700G NGFW Enhances Security With Keysight
FortiGate 700G NGFW Enhances Security With Keysight

Keysight Technologies, Inc. announces that Fortinet chose the Keysight BreakingPoint QuickTest network application and security test tool to validate SSL deep packet inspection performance capabilities and security efficacy of its FortiGate 700G series next-generation firewall (NGFW). BreakingPoint QuickTest is Keysight’s turn-key performance and security validation solution with self-stabilizing, goal-seeking algorithms that quickly assess the performance and security efficacy of a vari...

Claroty & Google Boost Threat Detection In CPS
Claroty & Google Boost Threat Detection In CPS

Claroty, the cyber-physical systems (CPS) protection company, announced a new strategic collaboration with Google Security Operations that brings greater threat detection and response capabilities to organizations looking to bridge the gap between IT and operational technology (OT) in order to secure mission-critical infrastructure. This integration will enhance security by feeding high-fidelity, context-rich alerts and vulnerability data from SaaS-powered Claroty xDome or on-premise Claroty C...

Matrix's Success On Display At International Police Expo 2025
Matrix's Success On Display At International Police Expo 2025

Matrix Comsec, a globally renowned provider of indigenous Security and Telecom solutions, concluded a successful showing at the 10th International Police Expo 2025, held in New Delhi, India. This marquee event brought together top-level decision makers from the Police, Army, Military, and Homeland Security forces across 25+ countries. At the core of Matrix’s participation was its commitment to secure, cyber-resilient, and STQC (ER)-certified technologies, all conceived, designed, and manu...

Arctic Wolf Enhances Aurora Platform Integrations
Arctic Wolf Enhances Aurora Platform Integrations

Arctic Wolf, a global pioneer in security operations, announced enhancements to the Arctic Wolf Aurora Platform through new integrations with Microsoft, Oracle, OneLogin, and CyberArk. As one of the industry’s first open security operations platforms, Aurora is uniquely designed to offer a flexible approach to both data ingestion and core functionality, empowering customers to build and customize their ideal security stack.  These new integrations expand the platform’s openne...

NEXT Biometrics Expands IAM Partnership In The U.S.
NEXT Biometrics Expands IAM Partnership In The U.S.

NEXT Biometrics has extended its partnership with a U.S. based, Identity and Access Management (IAM) and biometric authentication solution provider. NEXT’s technology is already embedded in the partner’s existing solutions, and now provides the foundation for the latest solution in its range. These solutions help governments and corporations in the fight against cyber threats, like phishing, by moving to passwordless user identification through zero-trust multi-factor authenticat...

Corsha Secures Robotics With Machine Identity Platform
Corsha Secures Robotics With Machine Identity Platform

Corsha, the first and only Machine Identity Provider (mIDP) purpose-built to secure machine-to-machine (M2M) communication across operational systems and critical infrastructure, announced an investment from Cybernetix Ventures, a pioneering early-stage VC firm at the forefront of robotics, automation, and physical AI. The funds will accelerate Corsha’s mission to secure every machine connection across robotics and industrial autonomous systems. Secure identity and access management Cor...

Illumio Insights: Breach Containment At Cloud Scale
Illumio Insights: Breach Containment At Cloud Scale

Illumio, the breach containment company, announced the general availability of Illumio Insights, a powerful new product within the Illumio Platform. As the only platform that delivers a complete approach to reducing lateral movement risk, Illumio now combines AI-powered detection, real-time risk insights, and one-click containment with strategic segmentation for proactive protection. Built on an AI security graph, Illumio Insights transforms how security teams detect, prioritize, and contain t...

artius.iD Partners With Tirios For Decentralized ID Tech
artius.iD Partners With Tirios For Decentralized ID Tech

artius.iD, the global pioneer in decentralized identity management solutions, has signed a deal with real estate investment platform Tirios to bring its ultra-secure, passwordless ID verification technology to the platform’s users. Once the implementation is complete, Tirios users will be able to seamlessly access their investment accounts using artius.iD’s identity verification technology, without the need for passwords, multi-factor authentication, or verification codes. This wil...

Matrix Video Surveillance For Safer Manufacturing
Matrix Video Surveillance For Safer Manufacturing

As manufacturing facilities become more automated and interconnected, the need for robust security grows more urgent. Factors like automation, supply chain complexity, and new regulatory requirements introduce security threats that many facilities aren’t fully prepared for, putting people, assets, and operations at risk. Range of risks Modern industrial facilities face a diverse range of risks: Cargo Theft: In 2024, U.S. and Canadian businesses faced 3,625 cargo theft incidents...

Nutanix Kubernetes Platform Enhances Cloud Native Apps
Nutanix Kubernetes Platform Enhances Cloud Native Apps

Nutanix, a pioneer in hybrid multicloud computing, announced it has been positioned as a pioneer in The Forrester Wave: Multicloud Container Platforms, Q3 2025. This is Nutanix’s first appearance in the report following last year’s unveiling of the Nutanix Kubernetes Platform (NKP) at Nutanix’s NEXT conference. The launch of NKP followed Nutanix’s acquisition of D2iQ, Inc.’s Kubernetes Platform, enabling the company to provide customers with a comprehensive so...

Zimperium Warns On Discord-Based Mobile Trojan
Zimperium Warns On Discord-Based Mobile Trojan

Zimperium, the world's pioneer in mobile security, announced new findings from its zLabs team on an evolving mobile banking trojan dubbed DoubleTrouble.  The malware, which disguises itself using random two-word method names, has rapidly grown in sophistication—adding screen recording, advanced keylogging, and new UI overlay capabilities designed to steal credentials and manipulate infected devices. Discord-hosted APKs Initially spread viaphishing sites posing as European banks, Do...

Digital Trust: Regula & Indicio's Biometric Solutions
Digital Trust: Regula & Indicio's Biometric Solutions

Regula, a developer of identity verification (IDV) solutions and forensic devices, enters a strategic technology partnership with Indicio, a market pioneer in Verifiable Credential technology and decentralized identity solutions. Together, the two companies will deliver a breakthrough in portable digital trust by issuing document and biometric identity verification solutions as tamper-proof Verifiable Credentials. Set of ID authenticity checks Regula has the most complete set of ID authentici...

Rapid7 Launches AI-Driven Incident Command Platform
Rapid7 Launches AI-Driven Incident Command Platform

Rapid7, Inc., a pioneer in threat detection and exposure management, announced the launch of Incident Command, a powerful new next-gen SIEM extending the capabilities of its Command Platform, purpose-built to transform how security teams detect, investigate, and respond to threats. Incident Command unifies preventative attack and exposure management together with threat detection and response, all powered by Agentic AI workflows trained on playbooks designed by Rapid7’s own SOC experts,...

Commvault Acquires Satori: Revolutionizing Data Security
Commvault Acquires Satori: Revolutionizing Data Security

Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud, announced its intent to acquire Satori Cyber Ltd (Satori), a data and AI security company. Enterprises are facing a perfect storm of AI adoption, data growth and sprawl, and regulatory pressures globally. The need to manage these challenges across hybrid and multi-cloud environments is paramount for security, IT, and business pioneers, as well as boards. Control access to sensitive data By...

IDenfy Integrates Sweden's BankID For Secure KYC Solutions
IDenfy Integrates Sweden's BankID For Secure KYC Solutions

iDenfy, a Lithuania-based identity verification and fraud prevention software provider, has announced the integration of BankID, Sweden’s most widely used electronic identification system, into its multi-feature Know Your Customer (KYC) platform. This update enables a secure, government-compliant verification method that accepts electronic identities (eIDs). The new integration is particularly valuable for strictly regulated sectors, such as fintech, banking, and other online financial s...

Matrix At International Police Expo: Cybersecurity Focus
Matrix At International Police Expo: Cybersecurity Focus

Matrix, a trusted name in Security and Telecom solutions, is proud to announce its participation in the 10th International Police Expo, India’s premier platform focused exclusively on policing, internal security, and law enforcement technologies. Set to take place in New Delhi, the Expo brings together global manufacturers and police representatives from over 25 countries to explore next-generation technologies across policing, surveillance, disaster management, rescue, healthcare, and cy...

Windows 11 Upgrade: AI-Ready Solutions By Dell
Windows 11 Upgrade: AI-Ready Solutions By Dell

New research from Dell Technologies and Intel reveals that 71% of U.K. IT Decision Makers (ITDMs) view the move to Microsoft Windows 11 as an opportunity to upgrade their PC fleets with AI-capable systems.  The ‘Windows 11 and AI PC Readiness Report’ also found that U.K. businesses see upgrading to AI PCs when they transition to Windows 11 to transform operations, with 64% saying being able to run AI applications effectively is critical or extremely critical for their organizat...

Suprema Achieves CE RED Certification For IoT Security
Suprema Achieves CE RED Certification For IoT Security

Suprema, a pioneer in AI-powered access control and security solutions, announced that its AI-based facial authentication access control devices have obtained CE RED certification under the European Union(EU)’s updated Radio Equipment Directive (RED), which now includes stricter cybersecurity requirements. Public sources and Suprema’s own research indicate that no other access-control company has yet met this new CE RED cybersecurity standard. Earning the certificate strengthens Su...

Siren & Flashpoint Partner For Advanced Threat Intelligence
Siren & Flashpoint Partner For Advanced Threat Intelligence

Siren, the all-in-one investigation company, and Flashpoint, the pioneer in threat data and intelligence, announced a strategic partnership to deliver a unified environment to streamline end-to-end investigations, surface hidden connections, and drive timely, intelligence-led decisions for security and intelligence teams. As geopolitical tensions rise, and hybrid threats, combining cyber, physical, and informational tactics, impact both private and public sectors, organizations face increasing...

Group-IB Launches Fraud Matrix 2.0 For Cybersecurity
Group-IB Launches Fraud Matrix 2.0 For Cybersecurity

Group-IB, a pioneering creator of cybersecurity technologies to investigate, prevent, and fight digital crime, announced the launch of Fraud Matrix 2.0 - a state-of-the-art analytics tool designed to help organizations detect, respond to, and prevent fraud with greater accuracy and agility. Evolution in fraud protection Inspired by the MITRE ATT&CK® framework, Fraud Matrix is a unique comprehensive framework developed by Group-IB, designed to describe the actions and behaviors employed...

Morphean's SaaS For Video Surveillance Innovations
Morphean's SaaS For Video Surveillance Innovations

The latest in our ongoing series introducing some of Hanwha Vision’s pioneering partners leads us to Martin Jones, Director of Global Accounts at Morphean, a cloud-based video surveillance, access control, and business intelligence platform that enables users to monitor, manage, and protect their operations securely and remotely, while gaining actionable insights to drive smarter decision-making. Introduction Can you briefly introduce yourself, your role at Morphean, and what your respon...

FireMon Insights: 60% Firewalls Fail Compliance Checks
FireMon Insights: 60% Firewalls Fail Compliance Checks

FireMon, the major network security and firewall policy management company, releases powerful new findings from its AI-powered analytics platform, FireMon Insights: 60% of enterprise firewalls fail high-severity compliance checks immediately upon evaluation, with another 34% falling short at critical levels. These aren’t just technical oversights; they’re signs of deeper governance issues that can lead to audit failures, operational downtime, and increased exposure to threats. Fire...

Commvault's Clumio For DynamoDB Enhances Data Recovery
Commvault's Clumio For DynamoDB Enhances Data Recovery

Commvault, a pioneering provider of cyber resilience and data protection solutions for the hybrid cloud, announced the general availability of Clumio Backtrack for Amazon DynamoDB, an advanced offering that transforms how organizations recover data from one of the most widely used cloud-native NoSQL databases in the world.  Amazon DynamoDB has become a foundational technology for cloud-first development teams, especially those building high-scale, latency-sensitive applications such as rea...

Zimperium Unveils SarangTrap In Mobile Security Alert
Zimperium Unveils SarangTrap In Mobile Security Alert

Zimperium, the world pioneer in mobile security, announced that its zLabs threat research team has uncovered a highly coordinated and emotionally manipulative malware campaign that is targeting mobile users through fake dating and social networking apps. The campaign, identified as SarangTrap, has already leveraged over 250 malicious Android apps and more than 80 phishing domains, all designed to steal sensitive data while masquerading as trusted platforms. Legitimate dating services These a...

SecurityBridge Acquires CyberSafe For MFA SAP Integration
SecurityBridge Acquires CyberSafe For MFA SAP Integration

SecurityBridge, the creator of the Cybersecurity Command Center for SAP, announced the acquisition of CyberSafe, a UK-based pioneer in multi-factor authentication (MFA) and single sign-on (SSO) solutions for SAP users. The acquisition marks a significant milestone in SAP security innovation, as CyberSafe’s flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication...

Heligan Group Warns Of Rising Phishing Threats
Heligan Group Warns Of Rising Phishing Threats

A 2022 report from the Office for National Statistics, the most comprehensive on phishing to date, has revealed that half of all adults residing in the UK have reported receiving a phishing message. In the last year, 85% of UK businesses and 86% of charities faced at least one phishing attack, with 32% of phishing emails being AI-generated, leveraging scraped social media or dark web data and real-time language tweaking. Advance fee fraud The average loss for businesses from phishing attacks...

IDenfy & Okazio: Enhanced Identity Verification In Crypto
IDenfy & Okazio: Enhanced Identity Verification In Crypto

iDenfy, an identity verification and fraud prevention service provider, partnered with Okazio, a digital wealth management platform specializing in secure cryptocurrency investment opportunities. This partnership showcases iDenfy’s Know Your Customer (KYC) and Anti-Money Laundering (AML) services that will now be used to onboard Okazio’s users and support the latest compliance requirements with the EU’s new Crypto-Assets (MiCA) regulations while helping reduce fraud risks in t...

View more
  • «
  • 1
  • 2
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • 160
  • 161
  • »
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
About this page

See an extensive list of news and developments related to Cyber security from leading industry players.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec