home

Breaking News:

Mobile Fraud Soars 24% Year-on-Year More

State Department is failing at basic cybersecurity standards More

What can AMAG's RISK360 do for you? Check out these Resources! More

ImageWare Systems Closes $8.9 Million Preferred Stock Private Placement and Approximately $6.9 Million Debt Conversion into Equity More

7 Ways Blockchain is Being Used for Security More

The Isla Malware Isolation appliance family delivers uncompromising protection in an easy to use, easy to deploy and easy to manage package. Appliances are available in a range of configurations supporting between 90 and 1800 concurrent users enabling you to easily scale the solution to your needs. More

Most US Orgs Had IT Disruption in Last 12 Months More

Flaws Found in Fuji Electric Tool That Links Corporate PCs to ICS More

SAP Patches Critical Vulnerability in Business Client More

Next Generation Cyber Security Market Report 2018-2028 More

China-linked Hackers Use Signed Network Filtering Driver in Recent Attacks More

The front line: Microsoft UK CTO on tackling cyber security More

Trend Micro, HITRUST Launch New Cyber Risk Management Firm Cysiv More

Threatlist: Email Attacks Surge, Targeting Execs More

FINRA takes down an unregistered cryptocurrency security More

Feeling the Pulse of Cyber Security in Healthcare More

Cyber security threats against small businesses on the rise in 2018 More

VOTI Detection XR3D Series 5 security scanners deployed at the ASIAN GAMES 2018 in Jakarta More

New Zero-Day Vulnerability for Windows Tweeted, Immediately Exploited More

Security Think Tank: Four key steps to managing software vulnerabilities More

First IoT security bill reaches governor's desk in California More

Finding the Middle Ground: Securing Smart Cities More

Dangerous New ATM Fraud Scheme Attacks Dual Fronts Simultaneously More

How GDPR is Unintentionally Driving the Next Decade of Technology More

IT Security Pros Lay Bare Election Hacking Fears More

IBM - Malicious Email Payloads Increased in Volume and Diversity in Q2 2018 More

Google Tracks Your Movements, Like It or Not More

10 Threats Lurking on the Dark Web More

Critical Bug Opens Millions of HP OfficeJet Printers to Attack More

Beware the Fax Machine: Some Hackers Target Old Gadgets More

ImageWare Reports 2Q 2018 Results - Revenue Increased 78% More

The Enigma of AI & Cybersecurity More

#DEFCON Government Attacks and Surveillance Continue to Increase More

Ransomware Strikes Computer Servers Of Golfers’ Association More

Election Security Becomes A Political Issue In Georgia Governor's Race More

Smart Irrigation Systems Expose Water Utilities to Attacks More

SURPRISE, THE FCC LIED ABOUT THAT DDOS ATTACK More

Identiv 2Q 2018 Results - 37% Growth, Strength Across all Segments, Market Share Gains More

ImageWare Systems Extends Global Reach into Japanese Market with TwoFive, Inc. Partnership More

FireEye White Paper - Security Beaches Are Inevitable ! More

19 HOT security stories in August! More

VOTI Inc. completes previously announced private placements for gross proceeds of approximately $11.8 million More

Critical Vulnerability Patched in Oracle Database More

ImageWare sales to Canadian financial institution, Philadelphia-based credit union and a New York-based financial services company. More

Trump Dismisses Russian Interference Indictments in Presser with Putin More

"Red Alert" Warning on US Cyber-Attacks, Now at "Critical Point" More

To Grow The Internet Of Things, Improve Security More

Forget the Summit: How Trump Let Putin Win the Cyber-Security War More

Microsoft-related bug reports up 121%, virtualization software bugs up 275% More

7 Ways to Keep DNS Safe More

IBM's new Nabla containers are designed for security first More

Russia Fends Off 25 Million Cyber-Attacks During World Cup More

Duty of care: Why (and how) law firms should up their security game More

Consider these indoor security cameras for a safer smarter home More

Spread of 'Fake News' Could Affect Irish Elections, says Gov Report More

U.S. Customs Expects Face Scanning to Speed Up Security at Florida Airport More

UK Tax Agency Collects 5.1M Biometric Voice IDs, May Violate GDPR More

7 Places Where Privacy and Security Collide More

Supreme Court Boosts Privacy with Mobile Data Ruling More

WannaCry Extortion Fraud Reemerges More

State Officials Request More Federal Money For Election Security More

Security Pros Expect Rise in Nation-State Attacks More

Malware in South Korean Cyberattacks Linked to Bithumb Heist More

Phishing Scams Targeted World Cup Fans — Here’s What to Do More

Air-Gapped Systems Targeted with Weaponized USBs More

Mozilla's Firefox Monitor aims to keep your accounts safe More

Analytics Are Empowering Next-Gen Access And Zero Trust Security More

How to Prioritize Security Vulnerabilities in SecDevOps More

So you're doing an IoT project. Cute. Let's start with the basics: Security More

Lazarus Targets South Korea with Malicious Docs More

Financial Services Sector Rife with Hidden Tunnels More

Afghan-Based Attack Disguised as News More

FBI Arrests 74 In Global Takedown Of Business Email Compromise Scammers More

Senate Banking Committee: Want Fewer Cybersecurity Threats? Ramp Up Regulations More

Cloud security: The reason hackers have it so easy will infuriate you More

2 Canadian banks hacked, 90,000 customers' data stolen More

The Threat 3-D Printing Could Pose To Global Security More

National security expert questions latest effort to protect schools More

Alexa, stop recording conversations and sending them to other people! More

FBI: Reboot your home and small office routers to counter Russian malware More

Hacker gets 5 years for Russian-linked Yahoo security breach More

How worried are you about the security of the 2018 election? More

Brazilian Banking Trojan Communicates Via Microsoft Sql Server More

Coca-Cola Data Breach More

Destroyed Keys Cost WIRED $100,000 in Bitcoin More

VOTI Detection XR3D-6D X-ray Scanner Approved by the US TSA for Air Cargo Screening More

ImageWare Systems Reports 2018 First Quarter Financial Result More

FBI: Cybercrime Losses Drop as Ransomware Reporting Falls Sharply More

Multiple OS Vendors Release Security Patches After Misinterpreting Intel Docs More

Colorado Passes Bill Advocating Blockchain For Gov't Data Protection And Cyber Security More

Small Firms Up to 20 Times More Likely to be Breached More

Minimizing physical security risks at your plant More

Amazon's Ring app lets you report package-stealing neighbors More

What is a Chief Security Officer? Understanding this critical role More

'I'm hacked' message left on dozens of defaced Canon IoT security cameras in Japan More

Data Breaches Decline in Q1 2018 More

Security lockdown: cloud and physical worlds converge More

Bitcoin network 3 to 10 times more 'evil' than the rest of the internet More

Firefox moves browsers into post-password future with WebAuthn tech More

Data Center Physical Security Market Report 2018: Growing More

Romanian Hackers Extradited to U.S. over $18M Vishing Scam More

Russia tried to undermine voting process in US, Senate panel reports More

Equifax Update Clarifies Breach Details to SEC More

12 Trends Shaping Identity Management More

Canada's Trudeau Talks About Security After Toronto Van Attack More

Apple Releases Security Updates for MacOS, iOS, and Safari More

CIA says foreign AI is tracking its spies More

Improved Security Standards for Electric Grids More

8 Ways Hackers Monetize Stolen Data ... More

Here's how Facebook defines terrorism -- and how it's responding. More

Security Fears as TSB Customers Able to Access Other Accounts More

Hackers Can Steal Cryptocurrency From Air-Gapped Wallets More

Healthcare Targeted by Hacker Group Orangeworm More

SunTrust Ex-Employee May Have Stolen Data on 1.5 Million Bank Clients More

Gmail spam mystery: Before you change your password, read this More

Kaspersky Lab Rails Against Twitter Ad Ban More

ImageWare Provides Sales Update of GoVerifyID Biometric Authentication Technology More

Zuckerberg: We're in “Arms Race” with Russian Election Meddlers More

DHS detects stingrays in DC, but can't find the surveillance devices More

When Identity Thieves Hack Your Accountant More

Organizations Failing at Timely Detection of Threats More

Standards Milestone Could Mark Beginning of End for Passwords More

Mobile Phishing Attacks Up 85 Percent Annually More

Can schools juggle hardened security with welcoming culture? More

New Authentication Standard Coming to Major Web Browsers More

Ransomware incidents double, threatening companies of all sizes More

Security warning: Your suppliers are now your weakest link More

Warning: Your Windows PC Can Get Hacked by Just Visiting a Site More

Facebook says data leak hits 87 million users, widening privacy scandal More

DHS Detects Cell-Phone Spy Gear in DC More

Half of Cyber-Pros Believe They're Losing the Fight More

Facebook Bolsters Privacy Measures With New Data Access Restrictions More

Many White House domains lack required email security More

US Gas Pipelines Hit by Cyber-Attack More

What is a supply chain attack? Why you should be wary of third-party providers More

U.S. DoD Hopes To Stamp Out Threats With Bug Bounty Program More

Saks, Lord & Taylor hacked; 5 million payment cards compromised More

Security firm: Panera Bread website still vulnerable More

IoT Security Spending to Top $1.5 Billion This Year More

Growing Mistrust Threatens Facebook After Data Mining Scandal More

Troopers added to security detail at Stoneman Douglas High School ... More

Senators Examine Election Security More

Google Adds to its Cloud Security Offering More

Orbitz: Hackers likely stole credit card details of nearly 900K Orbitz users More

Bitcoin's Blockchain Could Be Illegal in 112 countries More

U.S. Military Should Step Up Cyber Ops: General More

Police ask Google for location data to narrow suspect lists More

Cyber-security and the blockchain: evolving technology for our safety More

Blockchain is gaining traction but critics who question the scalability, security, and sustainability of the technology remain says Deloitte. More

How to stop hackers from stealing your Apple ID More

GE Transportation Joins Global Blockchain Transport Alliance More

Half of All Orgs Hit with Ransomware in 2017 More

Starbucks Could Serve Up a Blockchain Payments App More

IoT Security Guidelines Must Go Further More

World Economic Forum leads creation of fintech cyber security consortium More

Dark Web Experts: ID Fraudsters Unaffected by Police Efforts More

Despite Crackdown on Trading, Crypto and Blockchain in China Are Alive More

Crypto-Mining Scams Silently Steal Millions More

Exim mail servers, 500,000+, need an urgent update More

Security Breaches in Healthcare: 70 Percent Of Organizations Hit More

Is blockchain overhyped ? More

Alibaba's T-Mall Is Moving Cross-Border E-Commerce to Blockchain More

North Korea...a greater cyber threat to the international community than Russia, says CrowdStrike More

How to avoid security assessment cost overruns More

Secret German Government Network Attacked More

What Enterprises Can Learn from Medical Device Security More

Leading Blockchain-Based Identity Management System, ShoCard Announces ICO More

Porsche Begins Testing Blockchain Integration With Its Vehicles More

Equifax Finds 2.4 Million Additional US Victims of its Data Breach More

Half of Orgs Don't Change Security Strategy, Even After an Attack More

Mobile Security Report: Banking Trojans and Cryptocurrency Malware Grew by at Least 60 Percent in 2017 More

Self-proclaimed bitcoin creator sued for allegedly stealing $5 billion worth of crypto, other assets More

LifeMed ID Enters Partner Agreement With ImageWare Systems More

Crypto Mining Malware Infects Thousands of Websites More

Government websites hijacked by cryptocurrency-mining malware More

Winter Olympics Site Taken Out for 12 Hours More

Winter Olympics...cybersecurity attacks widespread More

U.S. Spies Bilked for $100,000 by Russian Peddling Trump Secrets More

DDoS Extortion and Attack Techniques More

Could This Really Replace Your Social Security Number? More

Cybercriminals Turn the Tables on Encryption to Develop New Cybersecurity Threats More

Lenovo Warns Critical Wifi Vulnerability Impacts Dozens Of Thinkpad Models More

Apple Calms Nerves After GitHub Code Leak More

Microsoft is Giving Away Free Cloud Storage More

Over 19 Million Californian Voter Records Held for Ransom Again More

81% of Cybersecurity Pros See Value in Threat Intelligence More

7 Ways to Maximize Your Security Dollars More

Does it bother you that Alexa's always listening? More

Super Bowl security - NO Philadelphia-style tailgating in Minneapolis More

Fujitsu Extends Global Biometrics-as-a-Service Platform to Australia More

Critical Infrastructure More Vulnerable Than Ever Before More

Drones that zip immediately to gunshot sites More

Criminals Move to Cash in on Cryptocurrency Gold Rush More

Bridging the smart cities security divide More

Oracle MICROS POS Vulnerability Puts 300,000 Systems at Risk More

What the Coincheck hack means for the future of blockchain security More

Microsoft to delete software that scares users into buying upgrades More

12 ways to improve security at your apartment More

Cisco: Crypto-Mining Botnets Could Make $100m Annually More

Salaries Will Increase for Cybersecurity Jobs, Survey Says More

Lenovo Fixes Hardcoded Password Flaw Impacting ThinkPad Fingerprint Scanners More

Major cyber-attack a matter of 'when', not 'if' More

Can Biometrics Solve the Authentication Problem? More

Google pulls kids games containing AdultSwine malware More

Global Levels of Fraud Reached an All-Time High in 2017 More

IoT Devices Fuel Complex DDoS Attacks More

Facebook Offers $100,000 Grants for Improving Internet Security More

VOTI DETECTION™ and SMARTWORLD Announce Strategic Alliance for Security Screening Solutions More

SamSam Ransomware Attacks Hit Healthcare Firms More

A home security camera can go a long way toward securing your peace of mind More

The 10 Most Overlooked Security Tasks More

Half of Norway’s Population May Have Been Breached More

Hacker Infects Gas Pumps with Code to Cheat Customers More

Intel Says Firmware Fixes for Spectre and Meltdown Affecting Newer Chips More

Attackers Use Microsoft Office Vulnerabilities to Spread Zyklon Malware More

White House puts the kibosh on personal phones - personal phones will not be allowed in the West Wing More

Exciting Developments at ImageWare Systems More

DHS Admits Major Leak Affecting 247,000 Employees More

Intel, Amazon, ARM, Microsoft and others have shared patch updates More

Targeted Attacks on Industrial Sector Growing Rapidly More

KPMG to Acquire Global Identity and Access Management business of Cyberinc More

Tech Giants Address Critical CPU Vulnerabilities More

Spectre and Meltdown are massive security flaws that affect almost every PC on Earth More

Android Trojan Targets 200+ Global Financial Apps More

What You Need to Know About 2 Major Computer Flaws That May Be Leaving Your Data at Risk More

Intel Flaw: Performance Degradation Bombshell or Massive Overstatement? More

Smart Speakers Could Expose Corporate Networks More

Security Things We Should Have Learned in 2017, but Probably Didn't More

Top 7 cyber security predictions for 2018 More

Russia calls Trump's national security strategy 'imperialist' More

Hacky Holidays? Increased Cybersecurity Breaches Blast Winter Break More

Bigger Cybersecurity IPOs Possible In 2018 Amid Firewall Doubts More

Thales to Buy Security Tech Firm Gemalto for $5.7 Billion More

Gemalto Says “Oui” to $5.7bn Thales Deal More

Massive Cloud Leak Exposes Alteryx, Experian, US Census Bureau Data More

User ‘Gross Negligence’ Leaves Hundreds of Lexmark Printers Open to Attack More

This New Android Malware Can Physically Damage Your Phone More

Survey Shows Many Americans Are Cyber-Illiterate More

Kaspersky Lab Sues U.S. Government Over Software Ban More

Uber Woes Continue with Surveillance Allegations More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

With data breaches happening every day and causing damage to your brand, tangible economic loss, and termination of employment for executive management charged with oversight, enhancing security without compromising user experience is a priority for today’s organizations. Multi-modal biometrics for user authentication handles this requirement and that’s what ImageWare does. We have invested substantial time and effort into making the implementation of biometric security simple, quick, and cost-efficient.  Being a pioneer in biometrics, with several decades of experience, ImageWare has built its brand through deployments in law enforcement applications, later migrating to secure biometric credentialing, and more recently, to authentication in the cloud using smart mobile devices. At the heart of all of our product offerings is the patented IWS Biometric Engine® (BE), which provides an ultra-scalable, real-time, multi-modal biometric enrollment and matching database specifically built for biometrics. The BE supports a dozen different biometric modalities today and adding new modalities is simple and straight forward. As we say, “we secure your future,” meaning that we not only satisfy your current security requirements, but we also secure your investment as new biometric technology becomes available.  We treat biometrics as “plug and play,” so you can take advantage of new advancements with no loss to your current investment. More


security stock solutionsManfred Mueller
Chief Operating Officer
Identiv

Our transponders are powering the IoT. We're dominating the NFC and mobility space, access and transport, events and leisure, library applications, gaming and vending, loyalty and payments, strong authentication, and health and pharma. Specializing in custom design, our tag portfolio covers anything and everything our customers can dream up. That includes HF and UHF inlays, standard and Tag on Metal labels, tickets for transportation, ski lifts, events, and more, tokens for transit and asset tracking, and library labels for books, CDs, DVDs, and tablets. We build miniaturized labels for cosmetics and pharmaceuticals, giant NFC transponders, NFC stickers for mobile devices, and our uTrust Sense Temperature Tracker tracks the temperature of practically anything. More


security stock solutionsHoward Johnson
Chief Operating Officer
AMAG Technology

We are close to completing the transition from being a product-led business to a solutions-led business. The breadth and sophistication of the product set we have is becoming difficult for the traditional integrator to communicate to their user base. Increasingly, the product manufacturer needs to be involved in selling the solution to ensure the requirements are met and the value proposition is fully explained.

We are finding complementary markets for our products where integration opportunities are helping companies with different aspects of their businesses. For example, intrusion integration, fire integration, BMS, space management and heat and light are all part of security. Our Symmetry products can integrate with these solutions and help users meet compliance, mitigate risk and save money. Our long-term strategy remains the same: to be a long-term valued partner and provide continuous value to our customers. More


security stock solutionsDov Yoran
Sr. Director, Strategy & Business Development
Security Business Group
Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers. More


security stock solutionsSteven Humphreys
Chief Executive Officer
Identiv

SecuritySolutionsWatch.com: Thank you for joining us today, Steve. One will read at Identiv.com, that “ Identiv’s mission is to secure access to the connected physical world: from perimeter to desktop access, and from the world of physical things to the Internet of Everything.“ Seems to us that significant traction has been achieved with one (1) billion transponders deployed, 5,000 customers, $500 million of equipment in the field, 400 hundred partners. Impressive metrics, indeed! Care to elaborate? Steve Humphreys: Absolutely… and thanks so much for inviting me to tell Identiv’s story. I think we’re all familiar with the convenience of the digital world — the world where Netflix knows what you want to watch next and Amazon knows what you're going to buy next. Identiv’s vision is to bring the benefits of the digital world to the physical world. We have a variety of products and go-to-market strategies that are putting us in a leading position to deliver those benefits. We see a major market opportunity as the physical world goes online, and we want to be the leading platform to get there. That's a big statement to make for a small company, but as you pointed out with those metrics, we’re in a great position to do just that. More


security stock solutionsJason Bradlee
Head Of Security
Fujitsu Americas

Our co-creation approach is strategic and ensures we develop the right partnerships and expertise that will enable us to deliver transformational outcomes. We select our partners carefully using this methodology. Organizations are adopting various types of authentication to achieve the right mix of security, privacy and a differentiated user experience. Our partnership with ImageWare allows us to expand our Identity and Access Management offerings to provide our customers with more multi-factor authentication technologies. Jim Miller, Chairman and CEO of ImageWare Systems, said, "Biometrics are not only the most secure form of authentication, but are also the easiest to use - as each user is his or her own password. By taking advantage of our powerful biometrics solutions delivered via Fujitsu's cloud-based security as a service, many more businesses can easily enhance their security. This agreement further extends our marketing and sales activities with Fujitsu to new regions en route to a truly global offering. Fujitsu's global capability extends the reach of ImageWare's patented, multimodal biometric technology as a core element of Fujitsu's cyber security portfolio across the globe." More


security stock solutionsGraham Porter
Business Development Director EMEA
Dell EMC
Surveillance and Security

The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. More


security stock solutionsMr. Tom Kellermann
Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.More


security stock solutionsMr. Joseph Grillo
Founder and CEO
ACRE

The access control and intrusion market is still a fragmented landscape, so yes, I think consolidation will continue to make its impact on the industry. Mobile credentialing seems to be a hot topic for the industry, along with the continued focus on cloud-based technologies. The demand for these solutions comes from customers wanting new levels of security and convenience while protecting critical data. With regards to mobile credentials, however, there's still a lot that needs to be done to develop this technology further, and as a result, many companies are choosing to implement hybrid solutions that offer mobile as an option. Another trend we will continue to see is a greater focus on integrated solutions; more video tied into access control, for example. We'll also see the increased use and installation of wireless locks to more doors as a means to reduce cost.More


security stock solutionsMr. John S. Shegerian
Executive Chairman
ERI

Be it a government official’s laptop, a family smartphone or a business tablet, technology today is far too vulnerable to criminal attacks. Our personal privacy, businesses’ proprietary information and even data pertinent to our national security are at stake. The key is for everyone to remember to safely recycle all old and unwanted items at the end of their lifecycles with a trusted recycling company. This final step in the life of an electronic device is now more important than ever.More


security stock solutionsMr. Ken Mills
General Manager
DELL EMC
IoT and Surveillance


Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe... More


security stock solutionsMr. Steve Visconti
President and CEO
Extenua

Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.  Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.  More


security stock solutionsMr. Samir Shah
CEO
Cyberinc

Isla represents an entirely new approach to cyber security.  Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files”, Web Filters try to detect “bad websites”, the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network.  Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customers’ needs. Isla can be deployed as an appliance directly at a customers’ office, it can be deployed in a customers’ existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner. More


security stock solutionsRory Olson
President & Chief Executive Officer
VOTI DETECTION™

Las Vegas was a terrible tragedy and does trigger additional discussion on security, especially for protection of people and saving lives. There is no doubt in my mind more screening in public and private physical entrances and exits will be required and mandated. Other countries, enterprises and communities outside North America are already taking the step to enhance their security. In many regions of Europe, Africa and the Middle East, hotels, public facilities such as shopping malls, museums, sports venues, concert halls, etc., have x-ray scanners deployed. Asia is following and I expect North America will not be too far behind. As more awareness is given to the role of x-ray scanners in these domains, AI and analytics will be play a key role in the automation and predictive detection of threats to all. More


security stock solutionsAndrew Hubble
Sales Director Asia Pacific and Japan
Dell EMC
Surveillance and Security

Terrorism in certain countries in Asia has certainly focused governments and enterprise to review their own safety and security methods to protect the public, staff and critical infrastructure and how to improve current practice. Convergence and collaboration of multiple Safety and Security technology combined with “Big Data” analytics are needed to leverage technology in the battle against terrorism in APJ. This provides both challenges and opportunities for Dell EMC as we can provide both thought leadership in the technology challenges while being the catalyst for all of the different technology partners that operate in this space. More


security stock solutionsNicholas Thermenos
Director Sales & Marketing Americas
Dell EMC
Surveillance and Security

Video Surveillance is going through a fast-paced digital transformation from low cost, decentralized data repositories to true Enterprise Class, centralized infrastructure requirements.  The increase in IP cameras, retention times, and the assurance that data will be available when needed, is moving customers to find new way to retain, store and access video surveillance data. Business leaders are beginning to recognize that there are valuable insights to be gained from the vast amount of data that is being collected. Customers, particular business leaders, are looking to capitalize on the data contained in these video images.  Both of these trends are changing the landscape of storing and accessing video. More


security stock solutionsMr. Marc Blackmer
Product Marketing Manager, Industry Solutions
Security Business Group
Cisco

We at Cisco are fully committed to the IoT, and we believe the IoT must be secured for its promise to be realized. Securing the IoT is easier said than done, though. The first complication is that most IoT devices can’t protect themselves. To be fair, there are a number of reasons why they can’t, but from a cybersecurity perspective, those reasons don’t matter. A vulnerability is a vulnerability is a vulnerability. And these vulnerabilities create ample opportunities for an attacker to exploit those devices and gain access to your network.“  More


security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities
Cisco

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More


security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More


security stock solutionsMark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc

These three products are our basic products for which GuardedID and MobileTrust are often bundled into one license for ease of purchase. GuardedID is our keystroke encryption product that works on PC’s and MAC’s and MobileTrust, which is also keystroke encryption with its own keyboard, works on iPhones and Androids. Both provide keystroke encryption as well as other critical security capabilities. MobileTrust also works with our authentication platform, ProtectID, from a mobile device in terms of ProtectID’s One Time Password. The ProtectID® mobile product, our 4th product provided on Google Play and iPhone Store, works with our ProtectID Authentication Platform and is our Out-of-Band Authentication product that is sold to enterprises for their clients and employees. It also provides tokens, PUSH (TBD), phone, OTP, Email, and SMS and other authentications that provide Out-of-Band and In-Band solutions.. More


security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services
www.Discover.com

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More


security stock solutionsMr. Wayne Arvidson
Vice President
Surveillance and Security Solutions
Quantum

Quantum has a broad range of storage solutions for surveillance infrastructures ranging from 10’s to 10’s of thousands of cameras. For smaller scale environments, the products in our Xcellis Application Director product line offer storage servers that provide a simple-to-manage foundation. End users can scale into enterprise level storage requirements with the addition of our StorNext file system, which is a multi-tier storage platform that automatically migrates video to the most cost-efficient tiers of storage based on various policy requirements defined by the user. Security environments can utilize high-performance disk storage with QXS, file-based tape with our Scalar Libraries, or FlexTier for cloud. More