Breaking News:

Extenua and American Cyber Form Strategic Alliance. Strong encryption with ImageWare biometric authentication software provides expanded Cyber security service offerings and data protection to clients. More

What Is Wearable Technology and Who Dominates? More

Qualcomm Gains A Big Ally In Its Data Center Attack On Intel More

Are Zika Virus Fears Being Blown Out of Proportion? More

Data Suggests People Don't Tweet as Much as They Used To More

Women Fire Up the Next Round of Gun Sales More

EMC Leads the Market in the Total Disk Storage System Space More

Raytheon to complete modernization of air traffic control system More

Biggest hijacking threat Americans face today More

Pentagon Finds The Best Offense Is A Good Air-Defense Missile More

Biggest hijacking threat Americans face today More

U.S. defense budget focuses on changing security environment More

Microsoft to Build First Underwater Server Pod More

SAIC unveils newest amphibious vehicle More

BIO-key and Microsoft Report Strong Response to Windows 10 and Windows Hello Biometric Solutions More

Navy Awards CGI Command Center Contract More

Guidance Software Unveils New Data Risk, Privacy and Protection Solution More

Navy Awards CGI Role on $809M Naval Supply Systems Command Business Systems Center IDIQ Contract More

FireEye buys fellow cybersecurity firm Invotas More

AT&T Is 3 Steps Closer to Seizing the $1.7 Trillion Smart City Opportunity More

The fourth quarter was another good quarter for Route1 More

This is how Google drones will deliver your packages More

IBM Bets Big on Video Streaming More

Hacking deal in dispute as government tries to control dangerous software More

Marsh Launches New Global Excess Cyber Risk Facility More

Oracle Introduces New Cloud Services for Hotels and Casinos More

Walmart Makes It Easier To Switch Clouds With OneOps More

Lockheed Martin to Separate and Combine IT and Technical Services Businesses with Leidos More

Global study shows increasing security risks to payment data and lack of confidence in securing mobile payment methods More

Johnson Controls and Tyco to Merge More

Android security: Samsung plugs six OS and seven Galaxy-specific bugs More

Synaptics 'IronVeil' Brings Biometric Security To The Desktop PC More

Verint and Squiz Announce Partnership to Further Enable Digital Transformation for Government More

Critical Yahoo email flaw patched through bug bounty program More

TASER Announces Numerous Weapons Orders More

Could Cybersecurity Pay Dividends For Raytheon? More

Twitter disruption silences swaths of US, Europe for hours More

‘Fintech’ Threat Has Big Banks Rushing to Innovate More

Unisys to Deliver Enterprise Security Innovation on the AWS Cloud More

Amazon exec: Our drones will deliver in 30 minutes or less More

Check Point Takes on Car Hackers More

New Encryption Solution from Ciena Decreases Data Breach Risks More

Alibaba Teams With Nvidia in $1 Billion Bet on Cloud Computing More

Leidos government IT business More

Route1 Receives ATO for MobiKEY from the U.S. Department of the Interior More

Google reveals the number of tech glitches in self-driving cars More

North America's underground cybercrime economy: Business is booming More

AT&T to help FCC move to the cloud More

Your refrigerator will soon be able to re-stock itself More

Trend Micro password manager had execution holes More

Gemalto's secure polycarbonate driver's license More

Apple, Alphabet, Facebook Eye New EU Privacy Law More

CACI to Support Army's Intelligence Dissemination System More

Bio-Rad Joins Food Safety Consortium With IBM and Mars More

GS1 US and Digimarc Announce Collaboration to Advance Product ID More

Microsemi Introduces Security-Hardened Platform More

2015's Biggest Data Breaches More

Obama outlines new measures for firearms industry More

Unisys Helps Department of the Interior to Move Financial Management to the Cloud More

New York City to swap out payphones for free high-speed Wi-Fi hot spots More

HARMAN Launches Connected Car Compute Platform for Advanced, Holistic Vehicle Intelligence at CES 2016 More

The doctor can see you now: The surgeons using Google Glass in the operating theatre More

AT&T Provides Valuable Insights For Businesses Looking To Tap Into The Power Of The Internet Of Things More

Magal Receives Homeland Security Orders Totaling $8.4 Million More

China asks Microsoft to explain 'major problems' with data in probe More

Introducing the Updated tactix(r) Bravo: A Tactical-Minded Multisport GPS Watch with Connected Features More

Nissan's Leaf, Infiniti models to have remote access feature More

Nortek Security & Control Introduces Integrated Proactive Wellness Solution More

Get To Know Your Home And Health Better With The Honeywell Family Of Connected Products At CES 2016 More

Amazon launches WorkMail to compete with Microsoft Outlook More

Cybersecurity Stocks: Where to Secure Your Profits In 2016 More

Facebook, Google, and Twitter have agreed to apply Germany’s strict anti-hate speech law online More

AT&T Sees Phenomenal Momentum In IoT More

Police Arrest Man In Hack of 6.4 Million Kids’ Toys More

3M Addresses Need for Stronger Visual Privacy in Healthcare and Finance More

Atmel Launches High-Performance Debugging Tool More

Barracuda Introduces New Cloud Archiving Service More

FireEye Forges Strategic Alliance With Ingram Micro to Deliver Advanced Threat Protection More

What You Need to Know About Investing in Cybersecurity More

Applied DNA Sciences Reports Fourth Consecutive Quarter of Record Revenues More

Guns Are Probably on a Lot of Christmas Lists This Year More

Google's super-fast Internet service could come to Los Angeles More

Google's super-fast Internet service could come to Los Angeles More

IBM Security Launches App Exchange to Further Industry Collaboration against Cybercrime More

Symantec to say goodbye to passwords with biometric technology More

CACI Agrees To Buy L-3 Security Business More

Gemalto enables strong authentication on any device via Bluetooth® Smart technology More

GP Strategies Awarded Contract With the US Department of Defense More

The big data technology behind online threat detection at Symantec More

TASER (TASR) Wins Order for 3,148 Axon Body 2 Cameras More

Trend Micro Releases Comprehensive Analysis of North American Cybercriminal Underground More

Fortinet Secures Advanced Threat Defense Certification From ICSA Labs More

A Closer Look at Space Debris: Lockheed Martin More

AT&T Selected To Help Feds Manage Fleets More

Why the Security Space Could See More Mergers and Acquisitions More

Pratt & Whitney, Israeli Ministry of Defense Sign Historic 15 Year Deal More

The motivation behind DDoS attacks More

Harris US Navy Radar Contract More

Private Hackers Can 'Rip Off' Governments More

Will Taser Get A Follow-Up Axon Order From Chicago? More

Cybersecurity professionals: The healthcare industry needs you More

Fraud rates on online transactions seen up during holidays More

CybeRisk(TM) Announces Go-To-Market Partnership With RiskLens to Launch Complementary Advisory Services More

Verint Expands Global Customer Conference to Security Professionals More

Unisys Selected to Provide Cybersecurity Services to Empresas Publicas de Medellin in Colombia More

Paris attacks may renew encryption debate More

French Counterattack Lifts Defense Stocks More

Facebook is using 'experimental' technology from Raytheon More

Garmin(r) Increases Mission Effectiveness for the U.S. Air Force More

ViaSat Launches High-Speed Ethernet Encryption More

Finjan Signs Licensing Agreement With Avast Software More

HP Brings New Smart Accessories to Life More

Diebold uses live video collaboration solution from Verizon More

Facebook expands Safety Check after Paris attacks More

Route1 Announces the New Standard in Secure Mobility More

Dissecting AT&T’s Mobility Business More

Microsoft unveils German data plan to tackle US internet spying More

Prosecutors Announce More Charges in Hacking of JPMorgan Chase More

What are Verizon and AT&T Doing in the Internet of Things? More

Trend Micro and VCE Expand Strategic Alliance to Offer Easy and Seamless Solution to Secure Hybrid Cloud More

Facebook says government requests for data rose in first half of 2015 More

General Dynamics & NASA's New Command and Control Infrastructure More

Apple says against opening encrypted data for Britain More

CDW Partners With ImageWare Systems to Bring Biometric Authentication to CDW Clients More

New Master Lock Bluetooth Smart Padlocks Combine Security Expertise With Mobile Device Technology That Turns Smartphones Into Keys More

Cisco Extends Security Everywhere With Broader Visibility, Control, and Protection for Shadow IT, Endpoints, and the Cloud More

Washington MTA Selects BlackBerry for Business Continuity and Crisis Communication More

FIDO Alliance Announces 72 Certified Authentication Products Are Now Available More

BIO-key Exclusive Biometric Partner; Ignite Your Business With Windows 10 and Office 2016 More

Gemalto launches multi-city ticketing solution for mobile phones More

Certified Safety Software Libraries Available for Atmel | SMART MCUs More

Fujitsu Launches GLOVIA OM V10, a Cloud-Based Mission-Critical Business Application to Cut Inventory and Lead-Time More

AT&T Government Solutions Wins Contract To Mobilize The Census Bureau More

Rackspace Survey Uncovers Massive Disconnect Between CMOs and CIOs More

Google wants to make sure you never lose your phone again More

Morpho Awarded DOHS Contract Trace Detectors More

Akamai Warns of 3 New Reflection DDoS Attack Vectors More

Panda Security and CYREN Expand Partnership More

NTT Communications Selects FortiWeb-VM to Secure Its Cloud Based Services More

Brocade Joins Intel(R) Security Innovation Alliance More

Digimarc Delivers Barcode Scanning for Smartphones More

Verizon doubles the size of Secure Cloud Interconnect footprint in Asia-Pacific More

Trend Micro Joins Microsoft Enterprise Cloud Alliance More

Federal cybersecurity spending booming as military's need to 'cyber-harden' grows More

Gemalto delivers IoT smart data to emergency responders More

Diebold Software Innovation Slashes Fraud Exposure More

Apple and Dropbox voice opposition to cybersecurity legislation More

VASCO Data Security to Acquire Silanis Technology More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Matt Barnette
AMAG Technology

In our newest version of Symmetry, we address the tightened smart card standards to counter growing physical and cyber threats and as a result are making Symmetry fully compliant with Federal Identity Credential and Access Management (FICAM) standards.  We are making Symmetry easier to install for our integrators by changing how access permissions are downloaded to the door controllers.  While this may not sound like an important detail, every Symmetry installer will notice the difference and save time and money when they install Symmetry. We have expanded our Symmetry High Definition camera line and added two new cameras.  The cameras offer an affordable option with a great feature set.  This is another way we are ramping up our video offering.  All of the Symmetry HD cameras in the range include built-in advanced motion detection as standard, and contain an option to turn on high quality video content analytics right inside the cameras themselves. Alarms from the cameras can automatically trigger commands throughout Symmetry, thus enhancing the security capabilities. More

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More

security stock solutionsMr. Brian Brunetti

Our flagship technology is MobiKEY, a mobile access solution that uses comprehensive multi-factor authentication and identity management to securely connect an organization’s assets with its employees, mobile workers, and contractors. Secure mobile access to any asset on any network using any device. MobiKEY means freedom for an organization's team members to remotely connect to enterprise assets with zero change to their workspace environment. Additionally, the use of MobiKEY means an organization can enjoy robust secure mobile access without compromising the enterprise’s integrity - no malware, no data spillage and no network breaches. More

security stock solutionsMr. Ken Mills
Global Surveillance Strategy & Business Development

A challenge I’ve seen with many public safety organizations is the inability to see the holistic picture when it comes to managing data. Addressing the topic of body-worndevices cannot be done independently of other data sources. In November, I participated on a Secured Cities panel with Rodney Monroe, the recently retired Chief of Police for Charlotte, NC. Chief Monroe highlighted three key things that police departments must to do before deploying body-worn cameras. More

security stock solutionsMr. John Mears
Senior Fellow
Information Technology & Security Solutions
Lockheed Martin IS&GS Civil

The idea behind IDHaystack™ is to make identification and verification services more accessible and evergreen within a secure Government community cloud construct. We were thinking, “Wouldn’t it be wonderful to be able to offer an advanced multi-modal biometric system in a way accessible to many different Government customers without their having to expend significant capital to get it?” We wanted to create an evergreen biometrics engine that could support an open framework in which customers’ existing unique workflows, rules, interfaces and user requirements could be accommodated as they exist or built separately to suit them. We tested these tenets with customers around the world and got positive affirmation that this is what they wanted going forward. Let me elaborate on why this idea is revolutionary. More

security stock solutionsMr. George Romas
Technical Director
HP Enterprise Services, U.S. Public Sector

The current atmosphere of porous government networks and unprotected information is demanding attention from government leaders and CIOs. The idea of a cybersecurity sprint seems to have been a decent approach to jumpstarting efforts to improve security. However, this top-down approach does not adequately address the variety of issues that lead to compromise of government networks, including cyber terrorism, cybercrime, and hacktivism. The Cyber Sprint had four specific goals: for DHS to share priority threat-actor Techniques, Tactics and Procedures (TTPs); immediately patch critical vulnerabilities on a weekly basis; improve controls and governing policies on privileged users; accelerate implementation of multi-factor authentication. While these short-term measures are adequate for improved security, they are not nearly sufficient because software does not exist in a vacuum; you must also consider vulnerabilities of the overall design of the architecture and platform.. More

security stock solutionsMr. David Benini
VP of Marketing
Aware, Inc.

Certisign is the largest certificate authority in Latin America, and is now introducing biometrics-as-services in Brazil through its new subsidiary, Certibio. Identity fraud prevention services are in high demand in Brazil and very synergistic with Certisign’s current business. The new services aim to help Certibio customers reduce identity fraud by enabling them to use biometrics to thoroughly verify an applicant’s identity information and ensure the integrity of their identity data. Biometrics collected in this process can then be used in the future to quickly verify the identities of individuals enrolled in the system. A wide variety of services and privileges can be better protected, including digital certificate issuance, healthcare, driver’s licenses, telecom services, bank accounts, government services, and even registration of new companies. Aware has provided Certisign with the identity platform and much of the biometrics software used to build the sizable infrastructure needed to support thousands of endpoints, millions of users, and many millions of daily transactions.. More

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More

security stock solutionsMr. Phil Hartstein
President & CEO
Finjan Holdings, Inc.

As we look ahead to the emergence of the Internet of Things (IoT), experts estimate that there will be 20-50 billion devices connected to the internet. All of these IoT devices are nothing more that miniature computers with internet access.  More devices connected to the internet could lead to more ways for an intelligent hacker to gather data and personal information or even as a gateway to larger hacking prizes. Protecting the networks and devices that use these services and carry data will become increasingly vital since decision making in the evolving IoT world is often done without human intervention. More

security stock solutionsMr. Raj Samani

If I utter the words cyber, what is the term that springs to mind?  In most cases they will be negative, such as crime, espionage, war, etc. However the reality is that this is only one side of the coin, and one term that is often forgotten is opportunity.  Technology has transformed every industry, every person, every section of society.  We have to recognize this and maximize the opportunities for the benefit of each of us, but do so in a way that reduces the risk to a level we are all comfortable with.. More

security stock solutionsMr. Jason Hart

Identiv’s uTrust products enable business executives and security leaders to make the paradigm shift from patchworked identity systems to a unified, simple, efficient identity solution that delivers higher security and resistance to obsolescence, for both premises and information access. Our uTrust products are unique in the marketplace as they are designed, tested, and supported to work together. No matter where a customer starts, Identiv provides the confidence that they can build a complete system in which everything works together.  Identiv’s idOnDemand service is a turn-key cloud-based platform that makes establishing a trusted ecosystem across all lines of business, geographic locations, devices, and people simple and convenient. Central to the idOnDemand service is the certification authority that issues PKI certificates — the standard for secure communications through the internet, banks, and high-security cryptographic applications within and outside the U.S. government for the last 20 years. By combining PKI with purpose-built secure hardware such as a smart card, USB token, or other devices, like mobile, the certificate’s private key is not only protected in a high state of security, but is also portable across devices and services, enabling pervasive use of strong identity whenever (and wherever) required. More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More

security stock solutionsMr. Dustin Laun
Co-Founder & CTO

Allied Barton is an amazing company and we are honored to serve them. They saw the benefits of Mobotour day one as an early adopter. Often, Allied has clients that don’t have large budgets, therefore other systems on the market can’t be leveraged. We play very well here. Per ASIS Security magazine, we helped solve their Bank of America issues quickly. This was our first opportunity with them. From there we continued to deliver on our promises and show how reliable the product is and have continued to expand. We help them in hospitals, universities, high end office spaces, condos and other areas.  All of this is achieved because of our hyper-efficient operation with very low overhead. More

security stock solutionsMr. Paul Brady
Technology and Solution Evangelist
Senior Director

The weak link is the fact that, in most cases, these breaches happened because the accounts (Target, Home Depot, and JPMorgan) were using password-based authentication. That is the weak link. Had the exploited accounts required the use of Identiv’s uTrust Credential to securely login without a password, these attacks could have been mitigated. Identiv’s uTrust Credentials are incredibly easy to use because they are a form of authentication we are all used to — the idea of a card plus PIN is something users accept, we are all accustomed to using a card plus PIN to authenticate an ATM, a gas pump, etc. Identiv has recently helped a large network hardware provider secure its administrator accounts and remote access security. The company uses Identiv’s uTrust Credentials and built-in group policy to enforce smart-card-only login to Windows, Linux, and other servers. Identiv is also currently working with major energy companies to help them become NERC-compliant while securing both physical and logical access; we are working with one of the largest credit reporting agencies to secure remote access to its networks as well as physical access to its facilities; and we have helped one of the largest insurance companies in the world move away from insecure proximity technology to secure contactless physical access.   More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More

security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More