Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Skills Shortages Trump Headcount as Critical Cyber Challenge

December 6, 2025

RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware

December 6, 2025

Louvre to Bolster Its Security, Issues €57m Public Tender

December 6, 2025
Facebook X (Twitter) Instagram
Saturday, December 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Louvre to Bolster Its Security, Issues €57m Public Tender
Cyber Security

Louvre to Bolster Its Security, Issues €57m Public Tender

Team-CWDBy Team-CWDDecember 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Louvre has announced plans to overhaul its security infrastructure following a high-profile break-in at the museum’s Apollo Gallery in October that resulted in the theft of the Crown Jewels, valued at €88m ($102.5m).

The public entity managing the museum has launched a public tender worth €57m ($66.4m) in a bid to “renovate the museum’s safety and security infrastructure with new software systems, network equipment and safety technologies.”

Some of the key missions include:

  • Establishing a new digital safety management system encompassing the remote management of connected safety mechanisms and the deployment of cybersecurity solutions
  • Deploying an IT and physical security monitoring software solution capable of consolidating and correlating data from various security-related business applications, that includes “an intuitive, user-friendly human-machine interface (HMI) to ensure seamless operation” and integrates third-party vendor systems, including incident logging, internal telephone networks and in-house public address systems
  • Revamping the CCTV network, deploying new surveillance cameras and establishing a central video management system (VMS)
  • Creating new access control mechanisms in line with certifications vetted by the French Cybersecurity Agency (ANSSI) and deploying a monitoring solution to centrally manage access controls
  • Renovating the intrusion detection systems (IDS) and the close-proximity artwork detection systems

In the procurement call notification, the Louvre specified that all hardware and software must be interoperable and sufficiently scalable and open to adapt to technological advancements and avoid vendor lock-in or closed-system limitations.

No suspension of activity is planned. The modernizations works will happen either while the museum is open to visitors or during closure times.

Companies have until December 10 to apply and show interest in providing solutions in line with the Louvre’s needs.

On October 22, just three days after the heist, Louvre director Laurence des Cars described the heist as a “brutal theft” before the members of the French Senate’s Culture Committee. She added that the incident “has deeply shaken the museum’s staff” and “profoundly shocked our fellow citizens, as well as all those, here and abroad, who cherish the Louvre and revere its collections.”

Infosecurity has contacted the Louvre, but the museum declined to share any further information.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleReact.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Next Article RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
Team-CWD
  • Website

Related Posts

Cyber Security

How to Fix OST File cannot be Opened Error

December 5, 2025
Cyber Security

Elevating SaaS Security with NIST CSF and Agentic AI

December 4, 2025
Cyber Security

UK’s Cyber Service for Telcos Blocks 1 Billion Malicious Site Attempts

December 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest News

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views

The risks of unsupported IoT tech

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202512 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views
Our Picks

Why you should never pay to get paid

September 15, 2025

Find your weak spots before attackers do

November 21, 2025

When ‘hacking’ your game becomes a security risk

October 17, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2025 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.