Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Louvre to Bolster Its Security, Issues €57m Public Tender
Cyber Security

Louvre to Bolster Its Security, Issues €57m Public Tender

Team-CWDBy Team-CWDDecember 6, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


The Louvre has announced plans to overhaul its security infrastructure following a high-profile break-in at the museum’s Apollo Gallery in October that resulted in the theft of the Crown Jewels, valued at €88m ($102.5m).

The public entity managing the museum has launched a public tender worth €57m ($66.4m) in a bid to “renovate the museum’s safety and security infrastructure with new software systems, network equipment and safety technologies.”

Some of the key missions include:

  • Establishing a new digital safety management system encompassing the remote management of connected safety mechanisms and the deployment of cybersecurity solutions
  • Deploying an IT and physical security monitoring software solution capable of consolidating and correlating data from various security-related business applications, that includes “an intuitive, user-friendly human-machine interface (HMI) to ensure seamless operation” and integrates third-party vendor systems, including incident logging, internal telephone networks and in-house public address systems
  • Revamping the CCTV network, deploying new surveillance cameras and establishing a central video management system (VMS)
  • Creating new access control mechanisms in line with certifications vetted by the French Cybersecurity Agency (ANSSI) and deploying a monitoring solution to centrally manage access controls
  • Renovating the intrusion detection systems (IDS) and the close-proximity artwork detection systems

In the procurement call notification, the Louvre specified that all hardware and software must be interoperable and sufficiently scalable and open to adapt to technological advancements and avoid vendor lock-in or closed-system limitations.

No suspension of activity is planned. The modernizations works will happen either while the museum is open to visitors or during closure times.

Companies have until December 10 to apply and show interest in providing solutions in line with the Louvre’s needs.

On October 22, just three days after the heist, Louvre director Laurence des Cars described the heist as a “brutal theft” before the members of the French Senate’s Culture Committee. She added that the incident “has deeply shaken the museum’s staff” and “profoundly shocked our fellow citizens, as well as all those, here and abroad, who cherish the Louvre and revere its collections.”

Infosecurity has contacted the Louvre, but the museum declined to share any further information.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleReact.js Hit by Maximum-Severity ‘React2Shell’ Vulnerability
Next Article RomCom Uses SocGholish Fake Update Attacks to Deliver Mythic Agent Malware
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

What’s at stake if your employees post too much online

December 1, 2025

Is it time for internet services to adopt identity verification?

January 14, 2026

What if your romantic AI chatbot can’t keep a secret?

November 18, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.