In The Boardroom™ Press Room About Us Research Reports Contact Us

IN THE BOARDROOM™:

Aaron Richman, Chief Executive Officer, TAM-CAaron Richman, Phd

Chief Executive Officer
TAM-C

TAM-C SAs the CEO of TAM-C Solutions, I lead a global team of intelligence and research professionals who provide innovative solutions for homeland security and counter-terror challenges. I have over 10 years of experience in this role, and over 30 years of combined experience in law enforcement, emergency management, and homeland security. I hold a PhD in Public Policy, an MBA in Public Sector, and a BA in Criminal Justice. My core competencies include suicide bombing response, "lone actors" interdiction, and information collection planning. I have conducted various research projects and policy reviews for the United States, European Union, and NATO, and I have developed, instructed, and consulted first responders and the private sector on MCI response, risk management, and suicide bombers. I have also co-developed curriculum for the Department of Homeland Security and Department of State on prevention and response to bombing incidents, suicide attack interdiction, and various intelligence programs. My mission is to enhance the preparedness and resilience of communities and organizations facing complex and evolving threats.

> More


Paul Sarnese, CHPA, MSE,MAS,CAPM Owner/FounderSecured & Prepared ConsultingPaul Sarnese, CHPA, MSE,MAS,CAPM

Owner/Founder
Secured & Prepared Consulting

SecuritySolutionsWatch.com: As past President of the IAHSS (International Association for Healthcare Security and Safety) your consulting firm Secured and Prepared Consulting quite obviously has many clients and success stories in that space. We understand; however, that you also provide services to many other types of facilities such corporate offices, houses of worship, retail, schools, and that you were recently engaged by a Hotel/Resort. It seems to us that there are many similarities regarding the day-to-day security operations of medical facilities and hotels. Care to elaborate?

Paul Sarnese: Yes, over the summer I had the pleasure of conducting a security assessment for several places of worship and a large elementary school. I was able to quickly identify risks and opportunities for improvement. I was able to assist the church and school administrators to prioritize the recommendations, develop a budget, and prepare an RFP for vendors. I also completed a really cool project. I recently completed an engagement conducting a life safety/OSHA compliance assessment for a national property development corporation that owns resorts throughout the country. The client originally had concerns about my lack of experience in the hospitality industry, but I was able to quickly explain that the hospitality industry and healthcare industry are very similar. They both have customers that depend on property owners to provide a safe and secure environment. Both industries provide overnight accommodations, food services, housekeeping, facilities, and maintenance. Both industries must comply with OSHA and state regulations and be prepared for internal and external situations that could impact operations and the safety of their customers. Both industries must educate and train their staff to respond to medical emergencies and other events.

> More


James Corbett, Founder, IMPaCTJames Corbett

Founder
IMPaCT

Healthcare has been trying to figure out how to improve safety reporting at the same level as the Federal Aviation Administration (FAA) for over a decade. The FAA has shown how safety is GREAT, not good, but GREAT for business. Healthcare needs to do the same. Healthcare has tried many times in different ways. Each way seems more complicated than the next, and so safety is put second. Building safety reporting into the actual workflow of healthcare staff is an answer. That is precisely what we did. We then set out to solidify this by partnering with the sole FAA-supported Safety Management System (SMS) Fuzion Safety, powered by WBAT. This is a major win for us and healthcare.

> More


Paul Maria
President - CEO 
Strongbox Security SolutionsPaul Maria

President - CEO
Strongbox Security Services

We have had great feedback from our School Security Division. We currently provide Security Guard services for four area schools including a vocational school, a preschool, and two High Schools as well as an amazing Summer program for student-athlete development. I've been told by client contacts that our presence on campus at each site have put faculty, staff and parents at ease, knowing that there is a professional and capable security presence protecting what matters most to them, the children. In addition to schools, we provide security to various religious institutions and other businesses. Our School Security Division is what I am most proud of.

> More


Andres De Leon, Director of Sales, Latin America and Caribbean, AMAG TechnologyAndres De Leon

Director of Sales, Latin America
and Caribbean
AMAG Technology

Data Centers are a new and critical vertical for us as we have several large customers in this market. We are seeing US/European companies investing in either buying existing data centers or building new ones, and that has expanded into the LatAm region. AMAG’s Symmetry Security Management System offers a single point of entry to all the security software and hardware in each facility, which can be controlled either locally or from a central control center. The objective is to have one screen where you can see all the Cameras, Access Control, Audio, Radars, Visitors and so on, independently of the hardware brands. Our Symmetry system also helps manage compliance requirements, which are different for each country.

AMAG’s Symmetry solutions can operate in nearly all vertical markets. We can help our customers with their security challenges by providing an integrated security solution. We have integrations with over 100 technology partners and are able to provide many options for our customers. We specialize in Finance, Food Plants, Restaurants, Oil & Gas, Healthcare, and Data Centers, but also work in Education, Transportation, commercial/Real Estate, Ports, plus many others.

At this moment we are implementing our Symmetry Security Management platform in one of the top LatAm companies in more than five countries where from a single control center they will manage +150 restaurants, food plants, malls, buildings and other facilities, not only from an access control point of view, but their system will also include audio, video, visitor management along with several technology partner integrations to provide a complete system. Again, our main goal is to be the trusted advisor for our clients who are looking for an open and integrated solution.

> More


Ceng Sagnic, Chief of Analysis (COA), TAM-CCeng Sagnic

Chief of Analysis (COA)
TAM-C

TAM-C Solutions is the leading geopolitical intelligence and security company with a history spanning over two decades. Established in 2003 simultaneously in the United States and Israel, it has evolved into a multinational firm with headquarters in multiple locations across the United States, Israel, the UAE, Bahrain, and Saudi Arabia. Once a boutique company, focused on actionable intelligence and led by several veteran security specialists, TAM-C has since transformed into the fastest-growing security and intelligence organization worldwide, boasting various departments and divisions, ranging from asset security to due diligence operations and on-the-ground intelligence and protection services.

TAM-C is the premier source for custom geopolitical intelligence solutions for many international corporations and governments. Our lens of critical analysis takes into account an array of client-centric factors, ensuring that the intelligence provided is not only accurate and insightful but also perfectly aligned with the recipients’ unique and dynamic requirements. As a result, we enable our partners to make informed decisions that drive success on a global stage.

Our operations, however, do not end with intelligence collection. Although TAM-C was not initially established to provide on-the-ground intelligence, protection, and crisis management services, our distinctive expertise in these fields required us to assist our clients and the general public during times of emergencies. TAM-C now operates a large-scale division for executive protection and asset security on the ground, supported by intelligence collection operations. We do not hesitate to make these resources available to the general public when they need us, as we consider it the least we can do for populations during times of crises.

> More


Cyber Armed Security™, http://www.cyberarmedsecurity.com/Cyber Armed Security

We sat down with Tim Gilman, CEO, Cyber Armed Security™, who spoke to us about the innovations his company is undertaking in addressing cyber threats and their new partnership with Steve Cocco of Security Strategies Today.

Cyber Armed Security™ is a pioneering force in the realm of cybersecurity, where ethical hackers unite to safeguard the digital landscape. Our journey began when a group of highly skilled hackers, recognizing their exceptional talents on global training platforms, came together to form a formidable cybersecurity enterprise. What started as a passion quickly evolved into a thriving venture that has expanded its horizons into intelligence services, drawing expertise from veterans of intelligence agencies and military regiments, including electronic warfare specialists. 

Today, we proudly stand as a rapidly growing cybersecurity entity, poised to diversify our portfolio with the imminent launch of two to three new brands. Our expansion strategy encompasses ventures into private investigations for businesses (B2B), consumer markets, and even polygraph testing. Additionally, we are strengthening our presence in private security services, executive protection, and global operations, harnessing cutting-edge technologies such as big data analytics, artificial intelligence (AI), and open-source intelligence for enhanced security and advanced threat detection. 

Our penetration testing services gain a distinct edge through teamwork. Recognizing that most real-world cyberattacks are orchestrated by groups, we deploy diverse skill sets by having at least two to three testers on every project.

> More


Chris Grollnek, Managing Principal, Active Shooter Prevention Project, www.aspppro.comChris Grollnek

Managing Principal
Active Shooter Prevention Project www.aspppro.com

My journey into the field of active threat prevention began with my service in the U.S. Marine Corps. The Marine Corps instilled in me discipline, adaptability, and a strong sense of duty. Later, I served in law enforcement, which exposed me to the complexities of public safety.

My real turning point came when I became a SWAT officer and an active shooter expert. I witnessed firsthand the devastating consequences of these incidents and recognized the need for a proactive approach to prevention. This experience motivated me to dedicate my life to making communities safer.

ASPP's mission is crystal clear: to empower communities and organizations with the knowledge, tools, and resources they need to prevent active shooter incidents.Our focus extends beyond reaction and response; we are committed to actively thwarting these threats before they materialize. 

We firmly believe that saving lives requires a multifaceted approach. ASPP is dedicated to fostering a proactive mindset, promoting community engagement, and providing access to cutting-edge technologies and strategies. Our ultimate goal is to create safer environments for everyone.

> More


Paul Sarnese, CHPA, MSE,MAS,CAPM, Owner/Founder, Secured & Prepared ConsultingPaul Sarnese,
CHPA, MSE,MAS,CAPM

Owner/Founder
Secured & Prepared Consulting

Our team of experienced professionals has real life experience in healthcare. We have all worked for very large and complex healthcare organizations that provide pre-hospital, hospital, long term care, outpatient, and homecare/community services. Because of our experience, we know how to navigate the culture of organizations, to build strong relationships, and to create a collaborative approach to solving the challenges that we face. Our team has created very successful departments and programs that included: workplace violence programs, security programs, accreditation readiness programs, Environment of Care programs, drug diversion programs, safe patient handling programs, patient observation program, identification and management of aggressive behavior training, suicide risk prevention programs, and emergency preparedness programs and exercise development.

We created many programs that have been recognized as “best in class” and “leading practices” that have been emulated by other healthcare facilities throughout the world. Some examples include our violence prevention program, K9 program, the design and capabilities of a corporate security operations center, a people and weapons screening process, the deployment of amnesty boxes, the use of public view monitors, providing security escorts for homecare staff and community workers, the deployment of a mobile app to provide emergency management information to all employees, and the deployment of personal duress system for all staff members who work in the community.

> More


Jeff LeBlanc, Vice President Professional Services, AMAG TechnologyJeff LeBlanc

Vice President Professional Services
AMAG Technology

AMAG Technology Professional Services specializes in helping companies maximize their investment in their Symmetry Security Management System, allowing them to stretch their budget. Companies can leverage Symmetry to help solve a business or operational challenge, which can also improve efficiencies.

AMAG’s Symmetry product portfolio works together, offering a total solution. Our team helps demonstrate how Symmetry can be used to address a wide range of organizational needs. By providing a unified suite of products and services, AMAG becomes a single-source provider, ensuring that our customers can obtain all the necessary tools and support. Our dedicated support further reinforces the value we bring to our clients who demand streamlined and efficient operations.

> More


Ryan Howarth
Vice President - Technical Services
AMAG TechnologyRyan Howarth

Vice President - Technical Services
AMAG Technology

SecuritySolutionsWatch.com: We had the pleasure of speaking recently with AMAG's new President, David Sullivan and also with Paul Edwards, AMAG's Executive Vice President of Business Technology. In both discussions, AMAG’s customer-first culture was stressed as a top priority. David Sullivan recently said, “Instilling a customer-first culture is at the forefront of my mission as president, and our entire organization continues to work hard to support all of our channel partners to the greatest extent possible." Please share with us, Ryan, how this guiding philosophy of “customer-first” ties into your current role, and the goals for your team, such as lower call-hold times.

Ryan Howarth: For Technical Services, this means examining our internal processes and using metrics to measure several KPIs to see where we need to improve or change. We are also looking at what we can do to add further value to our services with the goal of continuously improving how we support our customers. One such improvement was utilizing technology to bring the team together, allowing us to increase the hours of service that we provide and improving our average call hold times, which today are 1m15s for the year.

> More


Chris Cavallo, Managing Partner, CSI-Secure SolutionsChris Cavallo

Managing Partner
CSI-Secure Solutions

Surveillance is our primary service offering especially in workers’ compensation and personal injury cases. We also provide skip tracing services of claimants who have committed insurance fraud and once found we conduct comprehensive background investigations inclusive of in-depth social media Research. Often times with social media we can prove that the claimants we are investigating are exceeding their physical capabilities when they are supposedly injured or unable to have physical competency. We also may research during the discovery process documentation showing that the claimant has prior fraud cases associated with him/her. The attorneys and insurance carriers who retain our services may request that we interview neighbors, colleagues, associates and other employees known to the claimant that can give testimony relative to fraud being committed by the claimant.

> More


Joseph Paul Manley, Founder, Owner, Principal Security Consultant, Risk Mitigation Technologies, LLCJoseph Paul Manley

Founder, Owner,
Principal Security Consultant
Risk Mitigation Technologies, LLC

Your home is your safe place - your sanctuary. Are you, and your loved ones, as safe as you can be? Would additional peace-of-mind enhance the quality of life and enjoyment in your home? Of course, it would!

Now is the time for your Residential Home Security Checkup!

I am pleased to share with you these testimonials:

Thanks Paul, for visiting me at my home to do your security check up. The security issues you identified were simply eye-opening. I also appreciate you helping me negotiate a better vendor contract. What you did to help me, and my family was amazing. I will be recommending this service to my extended family and friends. In fact, I will be calling you in about six months to have another checkup. To me it makes sense to schedule this like an annual doctor appointment or maintenance on our cars every few months. Thanks again. 

> More


Paul Edwards - AMAG TechnologyPaul Edwards

Executive Vice President 
of Business Technology
AMAG Technology

Previously, security solutions were on isolated networks, but with the convergence of technologies and the cyber threat, IT is now a key stakeholder in all decisions and the ongoing management of a solution. It is important that the security industry is staying as up-to-date as possible (which can be a challenge) with the latest threats. The homograph attack is an example of how vigilant people need to be, as by using the Latin character "a" is replaced with the Cyrillic character "a" but are actually different, so a user could receive an email or click a link that looks valid, but in fact is a completely different site hosted by the threat actor. We are rolling out a new program internally this year to ensure we provide our staff with meaningful, digestible information on a regular basis which will help protect not only AMAG staff at work but our staff in their personal lives as well. Through this knowledge, our staff will be able to discuss cybersecurity with our partners and customers in a relatable manner and bring in internal subject matter experts as required into conversations.

> More


Steve Cocco - Strategic Strategies TodaySteve Cocco

President
Security Strategies Today

We are excited about our new partnership with Cyber Armed Security. This UK-based company is composed of a global team of ethical hackers with over 20 years of experience in cyber security. Its operatives come from ex-military, ex-intelligence, Interpol, and the British army. Their intelligence-gathering activities enable them to conduct cyber-based attacks and test the weaknesses and vulnerabilities of clients, which is not feasible without a robust intelligence element. The company merges cyber security and physical security by utilizing OSINT (open-source intelligence) and leveraging partnerships, such as with Security Strategies Today.

> More


Eric Jackel
Vice President, Shared Services
Prosegur USA:
Prosegur Security MonitoringEric Jackel

Vice President, Shared Services
Prosegur USA :
Prosegur Security Monitoring

It was great to see ISC so well-attended! Everyone there said how they felt it was back to pre-pandemic levels. There was a lot of energy, a lot of excitement, and some really great educational opportunities. We’re still working to follow up on all of the leads and new business partnerships from the show. My presentation was focused on Managed Services, with an emphasis on the integrator point-of-view. The discussion centered around revenue generation and how establishing managed services as its own line-of-business benefits both the service provider and customer. It was a great experience and I was honored to have the opportunity to share some of my own experiences with industry peers.

> More


Chris Cavallo, Managing Partner, CSI-Secure SolutionsDavid Sullivan

President
AMAG Technology

Every aspect of our society seems to be under threat. Things that we once took for granted, including our feeling of security, all seem a distant past. All that you mention has affected our perspective at AMAG, and we consider all threats when we design our business solutions. Certainly, COVID-19 has changed the commercial office environment in how it is safeguarded and managed. Protecting offices has expanded solely from security and people management, to also include additional health and sanitization considerations. Employers, employees, and visitors all desire surroundings that ensure their well-being. As a result, end users are not only seeking systems that protect them by providing physical security, but also solutions that provide tools for health checks, health compliance, and sanitation management. When coupled with the rising numbers of employees who work remotely, building managers and tenants are pursuing systems that maximize their space utilization through reservation solutions that can book meeting rooms, offices, desks, parking spots, catering, and work orders. Our customers inspire our innovation, and we work to meet their ever-changing needs. It is in these customer requests that we find creative solutions to combat the increasing number of threats found in the current environment.

> More


Michael A. Silva, Principal, Silva ConsultantsMichael A. Silva
Principal
Silva Consultants President
International Association of Professional Security Consultants

The IAPSC Annual Conference is the one security industry event that is specifically tailored to the practice of independent security consulting and should not be missed if you are a security consultant or are thinking about becoming one. The conference includes educational sessions that help you to keep up with the latest security practices and technology, opportunities to develop strategic relationships with other consultants, and the ability to exchange ideas with some of the leading practitioners in the consulting profession. This year’s conference includes a risk assessment workshop and sessions on school security and emergency preparedness, the use of Artificial Intelligence (AI) in security, business growth tips for consultants, human trafficking, weapons screening, expert witness testimony in court, and consulting in casino and gaming security. The conference also includes exhibits and presentations from some of the leading providers of security products and services.

> More


Patrick Bertagna, Chief Executive Officer, MetAlert (formerly GTX Corp) OTC: MLRTCharles "Chuck" Andrews

Founder/Chairman of the Board
Friends of Chuck

I always knew what I wanted to do when I started as a Law Enforcement Police Explorer at the young age of 13 in TEXAS! For 6 years before turning 19 years-of-age when I became a Texas Peace Officer, I logged over 4,000 hours on patrol working with police officers on patrol, in the jail, communications, crime prevention and more learning the law enforcement trade. What I really learned was HUMAN BEINGS, the Good, the Bad and the Ugly. In doing so, I learned that people (relationships) were the key to everything.....and this still holds true today in 2022 and beyond! As I worked my way thru the Law Enforcement field, I found myself quickly in the CRIME PREVENTION vertical working closely with citizens and businesses. It was clear to me that preventing crime was more important than reacting to it for all the obvious reasons, and the good-will and cooperation in developing RELATIONSHIPS was key to all of it, both short and long term for the good of the community.

> More


Patrick Bertagna, Chief Executive Officer, MetAlert (formerly GTX Corp) OTC: MLRTPatrick Bertagna

Chief Executive Officer
MetAlert (formerly GTX Corp)
OTC: MLRT

We are excited to be moving forward under the MetAlert brand. GTX no longer represented everything that we do and our vision of the future. In the beginning our focus was primarily on tracking and Global Trek Exploration, abbreviated as GTX made sense. In recent years, our Company has been focusing on solutions that transform people’s lives, with this transformation we felt the need for a change. Our vision is that in the near future, the people that use our products and services will live longer, healthier, and higher quality lives. This will happen because our products will collect vital information in real time, send it to the cloud, where that data can be analyzed and through our backend A.I. and notification platform, that data will be sent to doctors, first responders, caregivers, or family members. Imagine a 65-year-old man, that has a mild heart attack, doesn’t really think much of it and the next day goes out and plays tennis or golf and has another heart attack. Our products would be able to detect that, send the information to a first responder including the address of where that person is. This scenario is a life saver for that individual and we believe MetAlert speaks to that vision.

> More


Mark Williams AMAGMark Williams

Director of Sales – EMEA
AMAG Technology

Access control systems have always been great repositories of big data…every time you swipe your card or present your phone at a door, you are creating data. But very little has ever been done to analyze that data…until now. AMAG has developed a machine learning algorithm that learns what normal behavior is for an access control system… it learns when you usually arrive at the office, which door you enter the facility via and where you go next. So if you suddenly start arriving earlier and going to different locations, which you may still be allowed access to, the system will recognize that as “abnormal behavior.” There may be perfectly genuine reasons for the observed behavior, but the AMAG solution provides you with that insight… it gives you an early warning of potentially nefarious activity so you can make a better, more informed decision.

> More


Mike HowardMike Howard

I have spoken on leadership for many years when I was CSO at Microsoft. I always wanted to write a book on leadership and I took advantage of quarantine to write my first book “The Art of Ronin Leadership – Strategy, Execution and Sustained Success.” I wanted to tell a leadership story from my lens. The lens of someone who was not born a leader. From the lens of someone who made mistakes along the way but learned from his mistakes, learned from others and hopefully became a great leader. I saw too many examples of poor leadership both in government and in the private sector and I wanted people to understand what I believe to be great leadership.

> More


Feix Nater, Nater Associates, Ltd.Felix Nater

President and Owner
Nater Associates, Ltd.

Workplace violence is a major problem and, unfortunately, it’s on the rise. “Every year, 2 million people experience some form of workplace violence.” Join Felix Nater “In The Boardroom” regarding strategies to prevent workplace violence and many other risk mitigation topics regarding threats to our health and security: the post-COVID office, cybersecurity, and much more. You will benefit from this conversation with Felix Nader!

> More


Watch Felix's video on Workplace Violence

Robert Dodge ProsegurRobert Dodge

CEO
Prosegur

Organizations are in various states of assessing their workforce needs as they start to bring employees back to the office. Every company is looking at the situation through a prism of their own needs. From a security perspective, I tell our clients that they need to have a heightened awareness of the mental state of their staff.  The pandemic has increased tensions and stress levels. For example, some employees are stressed about rules around vaccinations and mask-wearing in the office.

If you are in charge of security, it’s now more important than ever that you carefully evaluate your people, process, and technology in this new normal and be prepared for potential disruptions. Some of these situations could escalate into violence. Secondly, we have to consider the security of remote workers.  What security risks are in their home?  Is there the possibility that your workers are leaving sensitive documents in the open? Are they locking their home office? Do they have a shredder? Are they following good cybersecurity hygiene? Or are they creating a massive vulnerability for someone to access sensitive corporate information?

> More


Fred Nelson AMAG TechnologyFred Nelson

Director of Sales
AMAG Technology

AMAG’s unique value proposition is one of the main reasons I joined the company. There are many companies that offer access control, video or identity management solutions. What makes AMAG unique is that we offer a total solution that is developed in-house. We manufacture our own access control software and hardware, visitor management and identity management systems. Manufacturing our own hardware and software allows us full control over feature enhancing upgrades, ensuring continuity of supply for the long term. Our system is completely scalable, meaning a Symmetry Security Management System can operate in a small business or secure a large company, even with locations around the world.

Another key differentiator is AMAG incorporates an open architecture into its Symmetry solution. Symmetry integrates with ANY technology on the market, including other access control systems. Integrating with other access control systems is important for large enterprise customers who acquire companies and take on the responsibility of managing the new company’s existing access control systems. Integrating with those new systems simplifies the overall security management and lets the company issue one card for all systems. In addition, our support team provides complete support for all third-party products integrated with Symmetry. This is a huge relief for our customers who don’t want to jump around to different manufacturers when they have issues.

> More


José Daniel Garcia Espinel ProsegurJosé Daniel García Espinel

Global Director of Innovation and Product Development for Security
Prosegur Global Risk

Prosegur’s strategy is focused on two important concepts. We must Perform by offering our customers the very best service in our traditional businesses such as guarding. And we must Transform by offering our customers new and innovative security solutions that are unique to Prosegur and the security industry. Our innovation strategy is focused on new product development. When developing new products we analyze their desirability, feasibility, and scalability. But we don’t just concentrate on the traditional security industry. We look to adjacent industries that we know are equally important to our customers, such as business continuity and safety. And our Security Operations Centers (SOCs) around the world are the hub of innovation for our company.

> More


Kami Dukes AMAG TechnologyKami Dukes

Director of Business Development
AMAG Technology

My business development team at AMAG Technology is 100% dedicated to the security consultant community and architects and engineers. This community is the backbone of the security industry. They have power, much more than meets the eye, to drive some of the most meaningful work in the security space. The industry works collectively as a wheel that keeps churning with the ultimate goals of saving lives and protecting properties and assets. We have security end users that have a business to run and security plans to operate and execute on. We have technology developers, such as ourselves at AMAG, that provide innovative solutions the end user can rely on to optimize their security programs. And we have the systems integrators who bring the systems to life and maintain their health and long-term functionality. But what sets the wheels in motion is the physical security consultant.

> More


Brian Ruttenbur Imperial CapitalBrian Ruttenbur

Managing Director
Imperial Capital

The traditional alarm monitoring market operates under a business model where high margin recurring monthly revenue is used to subsidize initial costs (primarily hardware and installation costs). The traditional model has been very successful in landing (typically for no upfront fee or a small fee up-front fee) and keeping long-term customers for years that pay monthly recurring fees. In the last several years, we have seen a surge in the IoT and Home Automation markets. The problem with IoT and Home Automation, while growing rapidly, is that they have lacked an integrated offering with a compelling service model thus, there has been limited recurring revenue.

We believe IoT and Home Automation providers are beginning to move to an Alarm Monitoring business model (with limited upfront fees but with the customers signing long-term contracts). This shift can be observed with recent companies like Latch Inc (LTCH – Not Rated) and Smart Rent (Not Rated) both offering services to multifamily facilities with high recurring fees (we will discuss Latch in further detail later in this report). We are also observing traditional alarm companies moving further into IoT and Home automation like ADT and Monitronics/Brinks Home Security experiencing solid growth and higher retention through a broader offering to its end user. Finally, we see multinational security companies like Prosegur expanding its offerings from guard/alarms/cash management to video monitoring and home automation to increase RMR or recurring monthly revenues.

> More


Ramesh Kesanupalli Digital Trust NetworksRamesh Kesanupalli

CEO & Co-founder
Digital Trust Networks Inc

A Covid credential presentation would be an excellent use case for what we are doing, whether it is a Covid test result or a Covid vaccination proof. A Service Provider like an airline before boarding, a rental car agency before renting a car, or a hotel before checking in, should be able to check the validity of the presented credential, that it belongs to the person who is showing it, that it is the latest data, that it comes from the actual source, and that the source can actually be trusted -- that it is a genuine facility, and not a fake credential provider. Digital Trust Network’s Digital Identity Interchange is a perfect vehicle to achieve this. Further, the issuing sources will be part of the value chain when the credential is verified. This system protects user privacy, invalidates fraudulent certificates and credentials, and provides the latest information.

> More


security stock solutionsBradford Rand

CEO & President
TECHEXPO Top Secret Cyber Security Summit

When the entire live in-person conference industry came to an immediate halt, my team and I quickly created a series of Cyber Security Briefings to help maintain its goal in educating executives called the “Power Hour”. Similarly to their live events they featured experts from The FBI, The US Secret Service and Dept. of Homeland Security / CISA. Hosted on one of the most secure and trusted virtual platforms, Cisco WebEx; these complimentary, invitation-only webcasts offered senior level business executives information on the latest cyber threats facing their companies as they worked from home during the peak of this pandemic. In addition they provided insight on best practices and technical solutions from top companies such as IBM, Google, Artic Wolf, Proofpoint, Mimecast, Duo Security, Check Point, Darktrace, KnowBe4 and more.

> More


security stock solutionsRoget Thornton

VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

> More


security stock solutionsRobert R. Ackerman, Jr.

Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

> More


security stock solutionsBruce K. Taragin

Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise.

> More


security stock solutionsCarl Bradley, U.S. Navy (Ret.)

Information Assurance & IT Security Consulting & Intelligence Strategy
HP Enterprise Services,
U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate.

In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...

> More


security stock solutionsTom Kellermann

Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.

> More


 

 

BREAKING NEWS:

Hackers Hijack Industrial Control System at US Water Utility > More

Cybersecurity Incident Hits Fidelity National Financial > More

General Electric Investigates Alleged DARPA Breach > More

KyberSwap Says Hackers Stole $55m > More

North Korean Software Supply Chain Attack Hits North America, Asia > More

Idaho National Nuclear Lab Targeted in Major Data Breach > More

Do not make these "5 dumb tech security mistakes" ! > More

UK and US develop new global guidelines for AI security > More

RECENT HEADLINES:

Hackers Hijack Industrial Control System at US Water Utility > More

Cybersecurity Incident Hits Fidelity National Financial > More

General Electric Investigates Alleged DARPA Breach > More

KyberSwap Says Hackers Stole $55m > More

North Korean Software Supply Chain Attack Hits North America, Asia > More

Idaho National Nuclear Lab Targeted in Major Data Breach > More

Do not make these "5 dumb tech security mistakes" ! > More

UK and US develop new global guidelines for AI security > More

Famed hacker and Twitter whistleblower Peiter 'Mudge' Zatko is joining the Biden administration > More

More Schools Hit By Cyber-Attacks Before Term Begins > More

Artificial Intelligence: Transforming Healthcare, Cybersecurity, and Communications > More

Key Cybersecurity Tools That Can Mitigate the Cost of a Breach > More

Russian cyber-attacks ‘relentless’ as threat of WW3 grows, expert warns > More

Tens of thousands of Connecticut residents have personal information scooped up in massive cybersecurity breach > More

A New AI-Based Honeypot to Engage Attackers as a Real System > More

Top security for 'jailbreak king' > More

The biggest cyber security incidents in August 2023 > More

A Ukrainian-made missile that could hit targets 930 miles inside Russia is nearly ready, says top security official > More

Electoral Commission failed basic security test before hack > More

TSA Updates Pipeline Cybersecurity Requirements > More

Security Breaches Are on the Rise and Your Identity Isn't Safe. Here's How Verified Identities Can Help > More

New SEC rule requires public companies to disclose cybersecurity breaches in 4 days > More

Multiple Security Issues Identified in Peloton Fitness Equipment > More

Laptops will need to support growing AI and security priorities, says Lenovo > More

U.S. House Republicans from Texas target federal funding unless Homeland Security chief is removed > More

The REAL reasons behind the strict rules at airport security, from removing laptops from bags to separating liquids (and how to get through the checkpoint faster) > More

UFOs – What the Government Calls UAPs – Present a Clear Threat to U.S. National Security, Former Military Pilots, Intelligence Officials Say > More

Biden nominates veteran national security official as top cyber adviser > More

The top 10 technologies defining the future of cybersecurity > More

Top cybersecurity tools aimed at protecting executives > More

A Cybersecurity Wish List Ahead of NATO Summit > More

Hackers have stolen $3 billion in crypto > More

ChatGPT’s Trust and Security Dilemmas > More

5 ways to prepare your cybersecurity team for a crisis > More

Global Retailers Face Cyber Risk > More

Here's How To Protect Your Google Account > More

Senate to receive classified brief on AI threats and national security > More

Raging border crisis is a matter of national security > More

Automotive Cyber Security Market Size to Reach USD 30 Billion by 2032 > More

Massive cybersecurity breach hits biggest US law firms > More

Best Home Security System of 2023 > More

Apple Patches Security Glitches in iPhones and iPads > More

Concerns for national security grow in Biden administration > More

How to protect your family from AI scams > More

TSA introduces new cutting-edge security technology > More

Google backs creation of cybersecurity clinics > More

The Importance of Multi-Factor Authentication in Healthcare > More

Here's How To Minimize Email Threats > More

Interested in investing in cybersecurity stocks? > More

DOJ launches cyber unit with national security focus as China, Russia threats mount > More

Artificial Intelligence And Cybersecurity: For Good Or Evil? > More

ChatGPT is about to revolutionize > More

TSA tests new facial recognition technology to boost airport security > More

Industrial Cellular Routers at Risk: 11 New Vulnerabilities Expose OT Networks > More

Cybersecurity-as-a-Service Market to Be Worth $46.6 Billion by 2030. > More

Inside the cybersecurity labs protecting U.S. critical infrastructure > More

The White House National Cybersecurity Strategy Has a Fatal Flaw > More

Chinese and Russian hackers are making moves. Here’s how the National Security Agency is trying to counter them > More

Google Gets Court Order to Take Down CryptBot That Infected Over 670,000 Computers > More

5 Big Statements From Cybersecurity Leaders At RSAC 2023 > More

Cybersecurity Director Says ‘Buckle Up’ for Generative AI > More

Suppliers are weak link in cybersecurity > More

Biden: Military, intelligence community taking new steps > More

The staggering Pentagon document leak has caused untold damage, including the exposure of long-worked assets and intelligence operatives > More

Microsoft released software updates to plug 100 security holes in its Windows operating systems and other software, including a zero-day vulnerability that is already being used in active attacks. Not to be outdone, Apple has released a set of important updates addressing two zero-day vulnerabilities that are being used to attack iPhones, iPads and Macs. > More

Looking for a New Security Technology? Choose a Partner, not a Vendor > More

Western Digital Hackers Demand 8-Figure Ransom Payment for Data > More

Russia-Linked Hackers Launches Espionage Attacks on Foreign Diplomatic Entities > More

Microsoft Warns Accounting, Tax Return Preparation Firms of Remcos RAT Attacks > More

One of China’s most popular apps has the ability to spy on its users....it's not TikTok! > More

Do this quick Google account security check now! > More

US Defense Department Launches ‘Hack the Pentagon’ Website > More

Cyberattack disrupted access to its Microsoft Office 365 apps > More

Watchdog Bans OpenAI's ChatGPT Over Data Protection Concerns > More

New Money Message ransomware demands million dollar ransoms > More

Biden-Harris Administration Announces National Cybersecurity Strategy > More

Join Prosegur at ISC West, booth #14099, find out more about exciting plans for 2023 and beyond! Click here and enjoy a complimentary exhibit hall registration as our guest (saving you up to $150!). > More

Google has stepped in to remove a bogus Chrome browser extension from the official Web Store that masqueraded as OpenAI's ChatGPT > More

AMAG Technology Announces Integration with RealNetworks > More

Join AMAG at ISC West March 29-31 in Las Vegas, Booth # 14089. Enjoy complimentary exhibit hall registration as our guest (saving you up to $150!). > More

TikTok to be blocked > More

Charles Chuck Andrews Discusses His Amazing Journey from Police to Security In Texas > More

2023 Cybersecurity Maturity Report Reveals Organizational Unpreparedness for Cyberattacks > More

Cybercrime Losses Exceeded $10 Billion in 2022: FBI > More

How A Satellite Hack Became a Cybersecurity Wakeup Call > More

Experts discuss water, food security > More

Top 10 Growth Stocks in Cybersecurity > More

China flexes muscles in Latin America in latest security challenge to US > More

Is a World War by miscalculation or by mistake inevitable? > More

Cybersecurity in the Connected Medical Future > More

White House Allocates $3.1bn to Cybersecurity in New Budget > More

Google Reveals Alarming Surge in Russian Cyber Attacks > More

MyloBot Botnet Spreading Rapidly Worldwide: Infecting Over 50,000 Devices Daily > More

Five Cybersecurity Tips For Small- And Medium-Sized Enterprise > More

Clock ticking on food-security. > More

Homeland Security Committee to hold first field hearing on border crisis > More

Here’s What 10 Cybersecurity CEOs Are Prioritizing In 2023 > More

Cybersecurity - Outlook for the Main Threat in the Digital Economy: Challenges, Stakes and Solutions > More

TikTok: It’s hip, it’s fun and it’s a security risk > More

Google Reveals Alarming Surge in Russian Cyber Attacks > More

MyloBot Botnet Spreading Rapidly Worldwide: Infecting Over 50,000 Devices Daily > More

Five Cybersecurity Tips For Small- And Medium-Sized Enterprise > More

Clock ticking on food-security. > More

Homeland Security Committee to hold first field hearing on border crisis > More

Here’s What 10 Cybersecurity CEOs Are Prioritizing In 2023 > More

Cybersecurity - Outlook for the Main Threat in the Digital Economy: Challenges, Stakes and Solutions > More

TikTok: It’s hip, it’s fun and it’s a security risk > More

U.S. Federal Agencies Fall Victim to Cyber Attack Utilizing Legitimate RMM Software > More

Microsoft’s security arm is now a $20 billion per year business > More

Hive, one of the most prolific hacker gangs in the world, had received about $100 million in extortion payments, according to government officials. > More

Zacks Investment Research Hack Exposes Data for 820K Customers > More

Biden - three steps toward a ‘whole of nation’ approach for national security > More

U.S., Japan to Extend Security Cooperation to Space > More

10 most unusual finds at airport security in the USA > More

Cybercrime and Security Predictions for 2023 > More

Top 10 Data Center Security Stories of 2022 > More

Russian Smuggling Ring Was Uncovered in New Hampshire > More

Is TikTok safe to use? > More

Guns discovery prompts stepped-up security at Paterson's John F. Kennedy High School > More

2 Cybersecurity Stocks You Can Buy and Hold for the Next Decade > More

How Reveton Ransomware-as-a-Service Changed Cybersecurity > More

Apple Security Research > More

Top security news of 2022 > More

TSA breaks record for number of firearms at security checkpoints, announces new measures to mitigate threat > More

NATO holds roundtable on climate change and security > More

MetAlert Announces Partnership with Sensio Group to Distribute RoomMate - a Groundbreaking 3D Infrared Supervision and Fall Detection Automated Monitoring System > More

AMAG Technology and Identity One Announce GSA FICAM Approval > More

Apple Releases Another Rapid Security Response > More

Twitter Data Breach Bigger Than Initially Reported > More

Virginia County Confirms Personal Information Stolen in Ransomware Attack > More

U.S. Bans Chinese Telecom Equipment and Surveillance Cameras Over National Security Risk > More

7 free cybersecurity resources you need to bookmark > More

Elon Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages > More

Iran threatened families of national soccer team, according to security source > More

The biggest security risks of using fitness trackers and apps to monitor your health > More

6 election security threats to watch for on Election Day > More

TikTok Can Access Your Data > More

This Hidden Facebook Tool Lets Users Remove Their Email or Phone Number Shared by Others > More

Cybersecurity Experts Tell Us How To Protect Your Social Media > More

Albany City School cybersecurity threat > More

What Musk might mean for cybersecurity at Twitter > More

SolarWinds Agrees to Pay $26 Million to Settle Shareholder Lawsuit Over Data Breach > More

Apple Security Research > More

Biden’s New National Security Strate > More

MyDeal Hacked – Over 2.2M Users Data Advertised For Sell on a Hacker Forum > More

Cars face cyber threats too! > More

Apple Security. Built right in. > More

German cybersecurity chief sacked following reports of Russia ties > More

Keystone Health Data Breach Impacts 235,000 Patients > More

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. > More

Cybersecurity expert talks simple tips to keep your info safe at home and school > More

Amazon Customers Receive Smishing Warning After Receiving Fake Texts > More

The big data problem underlying cybersecurity > More

MetAlert Reports Update on Recent Corporate Actions and New Strategic Partnerships > More

Twitter Password Reset Bug Exposed User Accounts > More

Oracle Cloud Infrastructure Vulnerability Exposed Sensitive Data > More

Hawley demands Mayorkas' resignation over 'intentional disregard' for border security > More

What we know about the Optus cyber attack, and how to strengthen your online security > More

Ukrainian President outlines peace formula that punishes aggression, restores security > More

15-Year-Old Python Flaw Slithers into Software Worldwide > More

Spell-Checking in Google Chrome, Microsoft Edge Browsers Leaks Passwords > More

TikTok Security-Deal Talks Pose Liability for Biden > More

It was a warzone.’ Iranian security forces beat, shot and detained students of elite Tehran university. > More

How COVID-19 has made small businesses more vulnerable to cyberattacks > More

Hackers Exploiting Dell Vulnerability > More

Commercial chat provider hijacked to spread malware in supply chain attack > More

Student Loan Breach Exposes 2.5M Records > More

Why YOU should buy a home security system > More

Kim Kardashian Charged by SEC for “Unlawfully Touting Crypto Security,” Agrees to $1.26M Settlement > More

Email Security News Round-Up > More

American Airlines Jetliner evacuated in Albuquerque after security threat > More

Apple Releases iOS and macOS Updates to Patch Actively Exploited Zero-Day Flaw > More

Google Releases Pixel Patches for Critical Bugs > More

US Treasury Sanctions Iranian Minister Over Hacking of Govt and Allies > More

Queen’s funeral poses biggest security test, says Olympics police chief > More

Ransomware Group Leaks Files Stolen From Cisco > More

Investigators Seize $30m in Stolen Crypto > More

High Severity Vulnerabilities Found in HP Enterprise Devices > More

Twitter whistleblower bringing security warnings to Congress > More

Hackers Target Los Angeles School District With Ransomware > More

Security News Round-Up > More

Google Uncovers Tool Used by Iranian Hackers to Steal Data from Email Accounts > More

Alarming nuclear threat in Russia-Ukraine War… U.N. Security Council Meeting to Focus on Threat to Nuclear Plant > More

Ex-Security Chief Accuses Twitter of Hiding Major Flaws > More

The Rise of Data Exfiltration and Why It Is a Greater Risk Than Ransomware > More

FBI: Beware Residential IPs Hiding Credential Stuffing > More

Firewall Bug Under Active Attack Triggers CISA Warning > More

Rise in shoplifting cases places security guards, loss prevention officers at an increased risk > More

Fake Reservation Links Prey on Weary Travelers > More

Apple warns of security flaw for iPhones, iPads and Macs that allows hackers to access devices > More

Data Breach Costs Reach New Record High > More

Investing in crypto-assets like bitcoin, NFT: Here is how to avoid being exposed to fraud > More

US Offers $10M Double-Reward for North Korea Cyberattacker Info > More

Hackers Sold Over 5 Million users’ Twitter Account Data on a Popular Hacking Forum > More

These 28+ Android Apps with 10 Million Downloads from the Play Store Contain Malware > More

Messaging Apps Tapped as Platform for Cybercriminal Activity > More

Biden to speak with Xi amid warnings that China poses greatest threat to US national security > More

Phishing Attacks Skyrocket with Microsoft and Facebook as Most Abused Brands > More

Can Artificial Intelligence Be Trusted? > More

Lockbit 3.0 Ransomware Group Target Multiple Sectors and Organizations Worldwide > More

Human Error Blamed for Leak of 1 Billion Citizens Records > More

Police departments evaluating security improvements following mass shootings > More

High-Severity Google Chrome Zero-Day Bug Exploited in The Wild – Update Now!! > More

Map of the 15 most recent attacks cyber attacks - July 2022 > More

Top US, Chinese national security figures hold 'candid' discussions > More

Philadelphia to install 100 security cameras near schools > More

New cybersecurity bill to require mandatory reporting of ransomware, other attacks > More

The biggest crypto scams of 2022 (so far) > More

Texas Democrats host town halls on school security after deadly Uvalde shooting > More

Chicago Launches Program That Will Reimburse Residents for Security Camera Purchases > More

Google May Owe You a Chunk of $100 Million Over Privacy > More

Procter & Gamble offices closed due to former employee making threats. > More

Apple Issues Emergency Fixes For Security Flaws In Millions Of Devices, Patch ASAP > More

USB-based Wormable Malware Targets Windows Installer > More

EU Blames Russia for Satellite Hack Ahead of Ukraine Invasion > More

Microsoft Flexes Security Vendor Muscles With Managed Services > More

NFTs Emerge as the Next Enterprise Attack Vector > More

Jocker, Other Fleeceware Surges Back Into Google Play > More

China-linked APT Caught Pilfering Treasure Trove of IP > More

Twitter's New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal > More

Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia > More

Microsoft Documents Over 200 Cyberattacks by Russia Against Ukraine > More

Google Offering Up to $1.5 Million for Android 13 Beta Exploits > More

Millions of Java Apps Remain Vulnerable to Log4Shell > More

U.S. national security officials sound the alarm about potential cyberattacks by Russia > More

North Korea's $625 million crypto hack presents a new national security threat — and why it marks a shift in the global 'digital battlefield' > More

New Hacking Campaign Targeting Ukrainian Government with IcedID Malware > More

Feds Shut Down RaidForums Hacking Marketplace > More

Google Patches Third Actively Exploited Chrome Zero-Day of 2022 > More

Microsoft Leads Operation to Disrupt Zloader Botnet > More

CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks > More

Subway security cameras malfunctioned, Adams says after Brooklyn attack > More

Google Sues Scammer for Running 'Puppy Fraud Scheme' Website > More

Microsoft Takes Down Domains Used in Cyberattack Against Ukraine > More

Former DHS Acting IT Chief Convicted in Software, Database Theft Scheme > More

Menswear Brand Zegna Reveals Ransomware Attack > More

Where is the security?’ Zelenskiy tells home truths to UN security council > More

Apple Rushes Out Patches for 0-Days in MacOS, iOS > More

U.S. Treasury Department Sanctions Russia-based Hydra Darknet Marketplace > More

Researchers Trace Widespread Espionage Attacks Back to Chinese 'Cicada' Hackers > More

FIN7 Cybercrime Operation Continues to Evolve Despite Arrests > More

What We Can Learn From Lapsus$ Techniques > More

Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware > More

Critical Sophos Security Bug Allows RCE on Firewalls > More

Okta Says It Goofed in Handling the Lapsus$ Attack > More

Checkmarx Finds Threat Actor 'Fully Automating' NPM Supply Chain Attacks > More

SonicWall Patches Critical Vulnerability in Firewall Appliances > More

New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable > More

Cryptocurrency Services Hit by Data Breach at CRM Company HubSpot > More

6 Reasons Not to Pay Ransomware Attackers > More

DarkHotel APT Targets Wynn, Macao Hotels to Rip Off Guest Data > More

Italy Investigates Russia's Kaspersky Antivirus Software > More

Massive DDoS Attack Knocked Israeli Government Websites Offline > More

Mobile Threats Skyrocket > More

How to Combat the No. 1 Cause of Security Breaches: Complexity > More

CaddyWiper: Another Destructive Wiper Malware Targeting Ukraine > More

Apple Patch Day: Gaping Security Holes in iOS, macOS, iPadOS > More

Samsung Source Codes Stolen > More

Critical Bugs in TerraMaster TOS Could Open NAS Devices to Remote Hacking > More

Nvidia’s Stolen Code-Signing Certs Used to Sign Malware > More

U.S. Security Vendors Launch Critical Infrastructure Defense Project > More

Russia-Ukraine: Threat of Local Cyber Operations Escalating Into Global Cyberwar > More

Google Fights Phishing With Updated Workspace Notifications > More

UN Security Council votes to convene rare emergency session over Ukraine > More

Moscow Exchange Downed by Cyber-Attack > More

100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption Feature > More

Toyota to Close Japan Plants After Suspected Cyberattack > More

Anonymous Hacker Group Targets Russian State Media > More

Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store > More

7 Steps to Take Right Now to Prepare for Cyberattacks by Russia > More

Biden instructs State Department to release up to $350 million in security assistance to Ukraine > More

The latest on the Ukraine-Russia border crisis > More

CISA Again Warns U.S. Organizations of Potential Russian Cyberattacks > More

Over 28,000 Vulnerabilities Disclosed in 2021: Report > More

Google Paid Record $8.7 Million to Bug Hunters in 2021 > More

Data Breach at Morley Companies Affects 521,000 > More

Water companies must step up on cybersecurity > More

Could Biology Hold the Clue to Better Cybersecurity? > More

Ransomware Gang Says it Has Hacked 49ers Football Team > More

Olympics security breach. Hackers Backdoored Systems at China's National Games Just Before Competition > More

Google Exploring Blockchain Products — CEO Shares Web3 Strategies > More

UN Experts: North Korea Stealing Millions in Cyber Attacks > More

Biden security advisor Sullivan says Russian invasion could come ‘any day now’ > More

Breach of Washington State Database May Expose Personal Information > More

A quarter of Canadian companies have been victims of a cyber attack in 2021 > More

What’s your ‘security score?’ There’s an online tool for that > More

Attackers Target Intuit Users by Threatening to Cancel Tax Accounts > More

Out-of-Control Cybercrime Will Cause More Real-World Harm > More

The Omicron Variant Has New Versions Already. What Comes Next? > More

Walmart Dissects New 'Sugar' Ransomware > More

FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics > More

New Malware Used by SolarWinds Attackers Went Undetected for Years > More

Apple Pays $100.5K Bug Bounty for Mac Webcam Hack > More

2 Oil Storage and Supply Firms Hit by Cyberattack > More

Mind blowing’ fraud plagues NFT market > More

Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers > More

Red Cross: Supply Chain Data Breach Hit 500K People > More

SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack > More

Cybersecurity Trends To Watch Out For In 2022 > More

White House orders federal agencies to raise cybersecurity bar for national security systems > More

Here Comes The NFT Fraud Boom > More

IRS Will Soon Require Selfies for Online Access > More

Cyber world is starting 2022 in crisis mode with the log4j bug > More

Unpatched HomeKit Vulnerability Exposes Apple iPhones, iPads to DoS Attacks > More

Stay safe online this year with these cyber security tips > More

Ape Theft Is an Expensive Way to Learn About Crypto’s Security Philosophy. People are losing their valuable NFTs to scams. Should platforms be held responsible? > More

Google buys Israeli security startup Siemplify for $500 mln > More

Predictions: SecurityWeek's 2022 Cybersecurity Outlook > More

Portugal Media Giant Impresa Crippled by Ransomware Attack > More

Top 5 trends for endpoint security In 2022 > More

Christmas Payroll Fears After Ransomware Hits Software Provider > More

Virginia IT Agency Hit With Ransomware Attack > More

A flaw in widely used computer code is prompting 100 new hacking attempts every minute > More


Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.