home

Breaking News:

How AI Is Transforming the Workplace More

CIA's Hacking Disclosure Highlights Security Challenges More

China poses security threat in power sector More

The 5 Biggest Challenges to the Driverless Car Revolution More

Google tries to beat AWS at cloud security More

IoT DDoS Reaches Critical Mass More

CIA WikiDump re-enforces old security mantras More

Trump Bump for Defense Companies More

AT&T says service restored after brief 'hardware issue' More

Is Uber App a Privacy Nightmare? More

Intruder Arrested After Scaling White House Security Fence More

WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says More

Technology Plays Role in Every Aspect of Crime, Europol Says More

IoT & Liability: How Organizations Can Hold Themselves Accountable More

Frost & Sullivan Recognizes ImageWare Systems with 2017 New Product Innovation Award for Its Innovation in the Biometric Identity Management Market More

Trump Highlights Illegal Immigration as a Security Issue More

Amazon Outage Disrupts ‘Big Part of the Internet’ More

#MWC2017: IoT Adoption Continues to Present Security Challenges More

Boeing Notifies 36,000 Employees Following Breach More

Data from internet-connected teddy bears held ransom More

Extenua has released a new product under the SilverSHielD SFTP for Windows server, SilverSHielD – G with DoD 5220.22-M data wipe feature. More

Defense Contractors Benefit as Trump Pledges "Historic Increase" in Spending More

Amazon's Door Lock API makes Alexa commands even easier More

Google Discloses Another ‘High Severity’ Microsoft Bug More

Want to participate in the NetWatcher beta? More

Popular Android Password Managers Expose Credentials More

It Takes a Village to Manage Cyber Risk More

Cisco Unveils New Mobile Data Security Solution More

Understanding and Combating the Evolving Attack Chain More

Why are 16,000 students in one of Michigan’s largest school districts more secure? More

The Evolution of Ransomware More

Homeland Security unveils sweeping plan to deport undocumented immigrants More

Google Discloses Unpatched Microsoft Vulnerability More

Cyber Dominates Top Business Continuity Threats More

Verizon, Yahoo agree to lowered $4.48 billion deal following cyber attacks More

Iran Intensifies Its Cyberattack Activity More

Stolen Health Record Databases Sell For $500,000 In The Deep Web More

Calls For TSA Changes After 11 Passengers Bypassed Security Screening At JFK More

Banks Show a Woeful Lack of Data Security More

Google ordered to give overseas data to feds | House passes bill requiring warrants for emails More

Ransomware Cripples Ohio County Government for Days More

Big data, IoT, and security are hot IT careers for 2017 More

Fake FBI and Secret Service Badges Continue to Be Sold at Amazon More

InterContinental Confirms Card Breach at 12 Hotels More

Expansion of TSA PreCheck Is Good for US Travelers and Security More

Honeywell SCADA Controllers Exposed Passwords in Clear Text More

The best security solutions of the year More

White Paper, Video Surveillance Storage, "Understanding the Body Camera Video Surveillance Storage Considerations More

Who has Donald Trump banned from entering the US? More

Trump puts Bannon on security council, dropping joint chiefs More

Automotive Data Security More

Printer Vulnerabilities Expose Organizations to Attacks More

Hundreds Of Thousands Of Netgear Routers Vulnerable To Password Bypass More

FBI: Hacking tool info could be of use to 'hostile entities' More

Georgia DOS Deploys TASER X2 for All Troopers More

GTX Corp Announces Launch of Take-Along Tracker 3G Product More

Hacker to Trump: Fix your security settings on Twitter More

Smartphone Ransomware Is a Looming Threat More

Apple Now Helps You Locate Your Little Lost Earphone More

New Hampshire goes live with Gemalto driver's license program More

AG Nominee Backs Law Enforcement’s Ability to ‘Overcome’ Encryption More

Fake Netflix App Relentlessly Spies on All Mobile Activity More

7 Common Reasons Companies Get Hacked More

Sage 2.0 Ransomware Demands $2,000 Ransom More

The Importance of Threat Modeling More

French Security Service Prepares for Election Cyber Threat More

Oracle CEO Hurd Says 80% of Corporate Data Centers Gone by 2025 More

Consumers Hold Businesses, Not Themselves, Responsible for Data Breaches More

IBM CEO: Fears About Artificial Intelligence 'Are Not Positioned Properly' More

Microsoft Warns Windows 7 Has Very Serious Problems More

Vulnerabilities Leave iTunes, App Store Open to Script Injection More

Honeywell, Intel to Jointly Develop Internet of Things Solutions for Retailers and Logistics Providers More

Critical Infrastructure Security: Risks Posed by IT Network Breaches More

New RCE Flaws Found in Samsung Smartcam More

McDonald's Website Flaws Allow Phishing Attacks More

Zebra Technologies Delivers "Visibility That's Visionary" at NRF 2017 More

Russian Hackers Find Ready Bullhorns in the Media More

Alphabet Says its Autonomous Cars Needed Less Human Help in 2016 More

Apple's Accidental iPhone 'Leak' Delivers Bad News More

Experts Warn of Novel PDF-Based Phishing Scam More

Pope Will Not Increase Security on Travels Despite Risks More

Even with increased airport security vulnerabilities remain More

TIA increases already-tight security after shooting More

FTC: D-Link Failed to Secure Routers, IP Cameras More

Here Comes a Wave of the Smartest Home Appliances Ever Made More

ImageWare Systems and American Biometric Solutions, Inc. Enter Into Five-Year Agreement for pillphone Product Offering More

SECURITY: FOUR NEW NORMALS FOR 2017 ! More

Five New Year's Resolutions for the InfoSec Community More

IBM Reports Significant Increase in ICS Attacks More

New iPhone 7S Leak Will Anger Everyone More

Trend Micro and ASUS Team Up Again to Protect Home Users against IoT Security Threats More

Microsoft Admits Serious Windows 10 Upgrade Error More

Verizon Likely to Complete Yahoo Buy Despite Hacks More

Sony Deletes Tweets on Britney Spears's Death, Blames Hackers More

Trump’s tweets are ‘a new type of risk’ to Wall Street More

Your eyes will unlock tighter security for your phone More

Uber accused of tracking celebs, politicians More

What's Naughty & Nice About The Internet ... More

5 Things Security Pros Need To Know About ... More

CEOS’ Overconfidence In Security Could Be Their Undoing More

Threat Index Shows Ransomware Attacks Spike More

UK Joins Russia And China In Legalizing Bulk Surveillance More

Alibaba Seeks to Conquer Amazon and Microsoft With Cloud Services More

IT Systems Connected to Pagers Leak Valuable Data More

Serious Vulnerabilities Found in McAfee Enterprise Product More

Route1 Launches DerivID - A New Standard in Secure Mobile User Identity Validation More

A Guide to White House North - Trump Tower In New York City More

C.I.A. Chief Warns Donald Trump Against Tearing Up Iran Nuclear Deal More

ICYMI - GTX Q3 2016 Results: revenue up 99%, delivered first military test order, expanded distribution into Mexico More

IBM's Cloud Platform Selected by American Airlines More

ImageWare Systems and Avatier Enter Into Five-Year GoVerifyID(R) OEM Agreement More

NetWatcher - Award-Winning Solutions That Simplify Cyber Threat Intelligence More

BlackBerry Is Testing Driverless Cars More

Skip the Phish on the Menu More

Amazon Is Gearing Up for a Crackdown on Counterfeits More

Europol Red-faced as Terror Data Appears Online More

CA Technologies Delivers Privileged User Governance to Better Protect Against Insider Threats More

Honeywell To Provide Advanced Navigation System To New British Armored Fighting Vehicles More

New Mirai Variant Targets Routers, Knocks 900,000 Offline More

San Francisco Transit Ransomware Attack - next transit hack could be train wreck More

How Retailers Can Stay Safe Over the Holidays More

Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers More

Cisco has deployed a new cloud for smart cities More

Secret Backdoor in Some U.S. Phones Sent Data to China, Analysts Say More

Verizon...Challenges Of The IOT More

Security Metrics Checklist More

ImageWare Systems Releases Newsletter on Enterprise-Ready Biometric Authentication for the Microsoft Ecosystem Featuring Insights from Gartner More

NHS Email Blunder Spams Health Service More

Mobile Workers Still Using Insecure Free Wi-Fi More

Learning To Trust Cloud Security More

GTX 3Q 2016 Results: revenue up 99%, delivered first military test order, expanded distribution into Mexico. More

CrySis Ransomware Master Decryption Keys Released More

Avoiding the Insider Threat: How Not to Star in Snowden Part II More

Cybersecurity: A New Factor in the Electoral Process More

UK Spy Agencies on the Hunt for Recruits More

National Security Under President Donald Trump More

U.S. defense shares hit record highs, boosted by Trump win More

For Techs, Trump May Mean Pain Now -- Paid Later More

Here's what a Trump presidency means for mobile apps and platforms More

Here's what a Trump presidency means for the Internet of Things More

Cyberspies Ramped Up Attacks After Exposure of Zero-Days More

Heavy Patch Tuesday on US Election Day More

Google to Red Flag ‘Repeat Offender’ Websites More

Fully Operational TrickBot Banking Trojan Targets UK, Australia More

Tesco Bank 'Hack' Still a Mystery More

KORE Position Logic Powers GPS SmartSole Solution for Patients and Cargivers More

UK in $2.3 Billion Plan to 'Strike Back' at Hackers More

CISOs Must Step Beyond Their Comfort Zones More

Symantec's New Security Solution Powered by A.I. More

IoT Security Cameras Under the Security Spotlight Aga More

FireEye’s Value Proposition in the Cybersecurity Space More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Wayne Arvidson
Vice President
Surveillance and Security Solutions
Quantum

Quantum has a broad range of storage solutions for surveillance infrastructures ranging from 10’s to 10’s of thousands of cameras. For smaller scale environments, the products in our Xcellis Application Director product line offer storage servers that provide a simple-to-manage foundation. End users can scale into enterprise level storage requirements with the addition of our StorNext file system, which is a multi-tier storage platform that automatically migrates video to the most cost-efficient tiers of storage based on various policy requirements defined by the user. Security environments can utilize high-performance disk storage with QXS, file-based tape with our Scalar Libraries, or FlexTier for cloud. More


security stock solutionsMr. Ken Mills
Chief Technology Officer Surveillance and Security
Dell Technologies

I am very excited about the value Dell EMC will bring to the surveillance and security market. Mr. Dell has discussed on a number of occasions that Dell EMC is a 1 + 1 = 3 opportunity for our customers and partners. This is especially true in the surveillance market. Dell EMC brings together the industry- leading server portfolio from Dell, the industry leading virtualization platform from VMware, and the 5-time surveillance market leader in surveillance storage from EMC. The surveillance industry is rapidly moving to the datacenter and we are hearing more and more that our customers want open, scalable and reliable enterprise infrastructure for their surveillance compute and storage. Adding Dell’s server, networking and OEM portfolio to EMC’s edge to core to cloud storage architectures provides customers a validated end-to-end solution for surveillance infrastructure. Combining Dell with EMC will provide our joint customers more choice and more value than on our own. Dell EMC will reduce the complexity of deploying large scale surveillance solutions. More


security stock solutionsMr. Kurt Takahashi
President
AMAG Technology

 AMAG Technology has a rich history of 40+ years in the access control industry. Our goal is to extend the value of our access control platform by adding new solutions such as  Symmetry GUEST and soon to be released Symmetry CONNECT, our policy-based identity management system. AMAG Technology provides access control, video management, intrusion alarm, visitor management, identity management and incident management all by a single provider. Our policy-based platform and automation engine helps companies operationalize their electronic security ecosystem.  Our highly flexible open platform enables us to add new innovative technology built by our business partners easily and timely. This helps companies simplify their operations by allowing them to utilize AMAG’s user interface to manage their complex environments.. More


security stock solutionsMr. Guy Caspi
Chief Executive Officer
Deep Instinct

Deep Instinct’s core technology is deep learning, which is an advanced branch of artificial intelligence (AI). Deep learning is inspired by the brain's ability to learn: once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. Deep learning has exhibited groundbreaking results when applied to computer vision, speech, and text understanding and we are the first company to apply it to the cybersecurity domain. In cybersecurity, there a big need for solutions that can protect against brand new (zero-day) threats in real-time – a critical issue that causes great vulnerabilities to almost every business.  More


security stock solutionsMr. Steve Visconti
President and CEO
Extenua

Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.  Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.  More


security stock solutionsMr. Rick Juarez
Managing Director, Corporate Finance
Imperial Capital, LLC  


Given the complexity of deploying cloud solutions and the challenges around doing so securely, it is not surprising that a number of end users are turning to third parties for support.  By 2018, the demand for Managed Services will grow to more than $256 billion, according to estimates by Forbes and Statista. We believe that Managed Security Services will be in high demand. The need for greater security and advances in technology will likely drive the demand for more specialized “XaaS” type services.  We expect to see stronger demand for existing and emerging XaaS services such as Video as a Service, Identity as a Service, Access Management as a Service, etc. More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

ImageWare Systems a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has licensed its GoVerifyID® product to Telos Corporation for use with HPE Aruba ClearPass. Telos, a leading provider of continuous security solutions and services for the world’s most security-conscious enterprises, is a leading ClearPass reseller to both the U.S. federal government and commercial organizations. ImageWare’s GoVerifyID is a mobile biometric user authentication service that verifies a user’s identity prior to granting them access to applications, systems or networks. IWS has been offering this solution on the Amazon Web Services (AWS) on-demand cloud platform. Recently, ImageWare and Hewlett Packard Enterprise (HPE) jointly developed an integration of GoVerifyID with ClearPass, a leading network access management solution that manages over 65 million end-points. The product is an enterprise-ready, turnkey, biometric authentication Software-as-a-Service (SaaS) solution. As a result of the partnership announced today, Telos will become a reseller of GoVerifyID, offer HPE Aruba ClearPass integrated with GoVerifyID, and provide and manage an instance of a multi-tenant GoVerifyID system on AWS for their customers.. More


security stock solutionsMr. Marc Blackmer
Product Marketing Manager, Industry Solutions
Security Business Group
Cisco

We estimate that there will be 50 billion – with a “b” – connected things by 2020, and that includes critical infrastructure, mining, manufacturing, energy production, and so on. Accordingly, malicious hacking is becoming more lucrative and impactful as this connectivity increases. We’ve already seen how malware can be used to help take down a power grid. Therefore, if we are to reap the benefits of greater connectivity, then we need to be sure we are connecting security to protect human health and safety, as well as environment safety.. More


security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities
Cisco

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More


security stock solutionsMr. Patrick Bertagna
CEO, Founder, Chairman
GTX Corp

The SmartSole is our flagship product, think Dr. Scholl’s meets LoJack. We make a miniaturized GPS and Cellular module and embed it inside an orthotic insole. The application is for people who have a memory disorder and have a tendency to wander, anyone with Alzheimer’s, dementia, autism, traumatic brain injury, etc. Currently there are over 100 million people worldwide who are afflicted with one of these debilitating aliments. Being that our module is small and robust we also imbed it inside other form factors and we are starting to look at OEM deals. And then we have our tracking App, which basically turns a smartphone into a tracking device, the application there is for mobile work force, sales people, delivery people, service business like electricians and plumbers, police officers, just about anyone that works in the field and benefits their superiors to know where they are at any time at the touch of a button. More


security stock solutionsMs. Monique Merhige
President
Infusion Direct Marketing

The prominent players in the wearable medical device market include Apple, Garmin, Lenovo.....The impact that the GPS SmartSole® wearable solution has had on the global market is monumental. From daughters and sons trying to protect their parents, to caregivers watching over patients, to protecting a spouse or an autistic child; this solution has given peace of mind to so many people throughout the world thanks to GTX. More


security stock solutionsMr. Mark L. Kay
Chairman & CEO
StrikeForce Technologies, Inc


ProtectID® stops hackers from being you and signing into their site or application as you through our 2-factor authentication (especially Out-of-Band Processing), GuardedID® preventing the hacker groups from stealing your keystrokes typed on your computer which happens as the most common type viruses out there that the anti-virus don’t stop, and MobileTrust® which simply doesn’t allow the keystrokes entered by you on your iPad and Android devices to be stolen or seen through the Operating Systems and your Password Vault, which are also encrypted through our specially designed keyboard... More


security stock solutionsMr. Scott B. Suhy
Chief Executive Officer
NETWATCHER


The Unintentional Insider Threat (UIT) is the biggest security issue corporations face today. Users, sometimes knowingly but more often than not unknowingly, are putting their organization at risk through a variety of actions such as clicking on phishing messages, going to nefarious websites, running risky software (TOR/BitTorrent), running outdated software (Java, Flash), using HTTP” versus HTTPS”, connecting to unsafe WIFI’s, connecting personal assets like phones/tablets to the corporate WIFI, allowing children to play games like Minecraft on corporate assets (laptops), etc. NetWatcher helps organizations detect all of these hygiene issues that open an organization up for exploit.. More


security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
www.noknok.com
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More


security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More


security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services
www.Discover.com

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More