Hikvision Canada ordered to cease operations over security risks

Launched in 2014, Hikvision Canada has maintained a strong market presence in the country, supplying cost-effective end-to-end security and Artificial Intelligence with the Internet of Things (AIoT) solutions that cover IP cameras, facial detection, intrusion alerts, smart home devices, industrial automation, and building management systems. Apart from banning Hikvision Canada's operations, the decision also bans all government organizations and crown corporations from buying and using Hikvision equipment. “Following a National Security Review under the Investment Canada Act, the Government of Canada has ordered Hikvision Canada Inc. It is important to clarify that Canada’s latest action restricts to government's use of Hikvision products and does not apply to products made by Hikvision affiliates outside of Canada. While Canadian authorities did not share the findings leading to the decision, they say that the ruling is based on a multi-step review of information and evidence provided by the country's security and intelligence community. Responding to the latest development in Canada, Hikvision has issued a statement condemning the decision and calling the allegations unfounded and politically motivated. The firm also notes that, during the security review, it responded to all of Canada’s requests for information with speed and transparency but never received evidence that substantiated the decision to ban its products in the country. Though solid evidence of such allegations has not been published, multiple governments, including the US, have banned the sale of Hikvision products based on security reviews. The order was forwarded to Hikvision last Friday, and the matter was made public over the weekend by Mélanie Joly, Canada's Minister of Innovation, Science and Industry. Hikvision has faced regulatory scrutiny worldwide in recent years based on its ties to the Chinese government and the potential of its devices serving as a medium for  collecting intelligence and for espionage. The Canadian government has ordered Hikvision’s subsidiary in the country to cease all operations following a review that determined them to pose a national security risk. “We strongly disagree with this decision and view it with deep concern, as we believe it lacks a factual basis, procedural fairness, and transparency,” responded Hikvision.

This Cyber News was published on www.bleepingcomputer.com. Publication date: Mon, 30 Jun 2025 14:15:16 +0000


Cyber News related to Hikvision Canada ordered to cease operations over security risks

Hikvision Canada ordered to cease operations over security risks - Launched in 2014, Hikvision Canada has maintained a strong market presence in the country, supplying cost-effective end-to-end security and Artificial Intelligence with the Internet of Things (AIoT) solutions that cover IP cameras, facial ...
7 hours ago Bleepingcomputer.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
3 days ago Cybersecuritynews.com
Security Concerns Arise Over Chinese-Manufactured Surveillance Cameras Deployed at Romanian Military Locations - A routine procurement made by the Romanian military on January 16 for surveillance equipment manufactured in China has sparked concerns regarding national security implications. Valued at under $1,000, an employee of the Romanian Defense Ministry ...
1 year ago Cysecurity.news
Microsoft Security Copilot improves speed and efficiency for security and IT teams - First announced in March 2023, Microsoft Security Copilot-Microsoft's first generative AI security product-has sparked major interest. With the rapid innovations of Security Copilot, we have taken this solution beyond security operations use cases ...
1 year ago Microsoft.com
Authorities investigating massive security breach at Global Affairs Canada - The breach affects at least two internal drives, as well as emails, calendars and contacts of many staff members. CBC News spoke to multiple sources with knowledge of the situation, including employees who have received instructions on how the breach ...
1 year ago Cbc.ca
Top 30 Best Penetration Testing Tools - 2025 - The tool supports various protocols and offers advanced filtering and analysis capabilities, making it ideal for diagnosing network issues, investigating security incidents, and understanding complex network interactions during penetration testing. ...
2 months ago Cybersecuritynews.com
Enhancing your DevSecOps with Wazuh, the open source XDR platform - As DevSecOps practices continue to evolve, Wazuh offers a flexible, open source platform that integrates security throughout the development and operations lifecycle. Implementing automated security scans for your software environment ensures ...
2 months ago Bleepingcomputer.com
CVE-2022-49547 - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix deadlock between concurrent dio writes when low on free data space When reserving data space for a direct IO write we can end up deadlocking if we have multiple tasks ...
4 months ago Tenable.com
Lost in Translation: Mitigating Cybersecurity Risks in Multilingual Environments - With increased connectivity and linguistic diversity comes a new set of cybersecurity risks. This article will delve into the unique cybersecurity challenges in multilingual environments, focusing on solutions and best practices to mitigate such ...
1 year ago Cyberdefensemagazine.com
Key Breakthroughs from RSA Conference 2025 - Day 1 - Sumo Logic unveiled intelligent security operations with capabilities like detection-as-code (bringing DevSecOps to threat detection), UEBA historical baselining (improving accuracy by learning behavior over time), multiple threat intelligence feeds, ...
2 months ago Cybersecuritynews.com Inception
Cybersecurity jobs available right now: October 2, 2024 - Help Net Security - As an Applied Cybersecurity Engineer (Center for Securing the Homeland), you will apply interdisciplinary competencies in secure systems architecture and design, security operations, threat actor behavior, risk assessment, and network security to ...
8 months ago Helpnetsecurity.com
CVE-2021-47189 - In the Linux kernel, the following vulnerability has been resolved: btrfs: fix memory ordering between normal and ordered work functions Ordered work functions aren't guaranteed to be handled by the same thread which executed the normal work ...
1 year ago Tenable.com
Product showcase: Apiiro unifies AppSec and SSCS in a deep ASPM - With the rapidly evolving threat landscape and complexity of interconnected applications, identifying real, business-critical application risks is more challenging than ever. Application security teams need a better solution than their current siloed ...
1 year ago Helpnetsecurity.com
Cargo Security, Subversive Crime, and Insider Risk - In today's globalised world, cargo security is not just a term; it's the backbone of international trade and supply chain operations. Cargo security encompasses measures to protect cargo from theft, loss, or tampering, which could have severe ...
1 year ago Securityboulevard.com
The Board's Role in Cyber-Risk Management in OT Environments - This requires a multifaceted approach beginning with appreciating the unique challenges and risks associated with OT cybersecurity, including understanding the potential consequences of OT breaches and the importance of dedicated OT security ...
4 months ago Darkreading.com
Cybersecurity Risk Management: Top 20 essential Long-Tail Keywords - Cybersecurity risk management is essential for protecting any organization from malicious actors on the internet. In the digital age, all businesses need to understand the risks and take steps to defend themselves from cyber threats. Cybersecurity ...
2 years ago Heimdalsecurity.com
Embracing Security as Code - Everything is smooth until it isn't because we traditionally tend to handle the security stuff at the end of the development lifecycle, which adds cost and time to fix those discovered security issues and causes delays. Over the years, software ...
1 year ago Feeds.dzone.com
The Imperative for Zero Trust in a Cloud-Native Environment - The security policy is dynamically updated with the changes of users, devices, data and external risks. Due to the dynamic, containerized and microservice characteristics of cloud-native environments, traditional boundary security protection policies ...
1 year ago Securityboulevard.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
8 months ago Cyberdefensemagazine.com
What Is Cloud Security Management? Types & Strategies - Cloud security management is the process of safeguarding cloud data and operations from attacks and vulnerabilities through a set of cloud strategies, tools, and practices. The cloud security manager and the IT team are generally responsible for ...
1 year ago Esecurityplanet.com
Surge in Cloud Threats Spikes Rapid Adoption of CNAPPs for Cloud-Native Security - CNAPPs integrate multiple previously separate technologies—including Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), Cloud Infrastructure Entitlement Management (CIEM), Kubernetes Security Posture Management ...
2 months ago Cybersecuritynews.com
CVE-2024-27080 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
1 year ago Techtarget.com
IaaS vs PaaS vs SaaS Security: Which Is Most Secure? - Security concerns include data protection, network security, identity and access management, and physical security. While IaaS gives complete control and accountability, PaaS strikes a compromise between control and simplicity, and SaaS provides a ...
1 year ago Esecurityplanet.com
3 security best practices for all DevSecOps teams - It's been over 10 years since Shannon Lietz introduced the term DevSecOps, aiming to get security a seat at the table with IT developers and operators. More organizations are looking to shift-left security to ensure that security is prominent in ...
1 year ago Infoworld.com

Latest Cyber News


Cyber Trends (last 7 days)