In The Boardroom Press Room About Us Research Reports Contact Us

IN THE BOARDROOM:

Lisa Terry Allied UniversalLisa Terry

Vice President,
Vertical Markets - Healthcare
Allied Universal®

I have served in healthcare security and police management for more than 30 years. For the past four years, I have served as Vice President of Healthcare for Allied Universal®. Just prior to that, I served as Director of Hospital Police, Security and Transportation at the University of North Carolina in Chapel Hill. I have been privileged to hold the position of Chief of Campus Police and Public Safety with WakeMed Health and Hospitals in Raleigh, North Carolina, and Chief of Police and Public Safety with Eastern Virginia Medical School in Norfolk, Virginia.

Currently, I am a Vice Chair of the ASIS Healthcare Community Steering Committee and the Chair of the ASIS GSX Presentation Selection Committee. Because of these amazing affiliations, I have been fortunate to collaborate with some of the world’s greatest minds in healthcare, security, and policing. I have attempted to share some of those strategies and lessons learned for successfully preventing and mitigating violence in two of my books: “Preventing Violence in the Emergency Department” and “The Active Shooter Response Toolkit for Healthcare Workers.”

> More


Ramesh Kesanupalli Digital Trust NetworksRamesh Kesanupalli

CEO & Co-founder
Digital Trust Networks Inc

A Covid credential presentation would be an excellent use case for what we are doing, whether it is a Covid test result or a Covid vaccination proof. A Service Provider like an airline before boarding, a rental car agency before renting a car, or a hotel before checking in, should be able to check the validity of the presented credential, that it belongs to the person who is showing it, that it is the latest data, that it comes from the actual source, and that the source can actually be trusted -- that it is a genuine facility, and not a fake credential provider. Digital Trust Network’s Digital Identity Interchange is a perfect vehicle to achieve this. Further, the issuing sources will be part of the value chain when the credential is verified. This system protects user privacy, invalidates fraudulent certificates and credentials, and provides the latest information.

> More


security stock solutionsWill Wise

Group Vice President Security,
Public Safety, Transportation
& Casino Gaming

Reed Exhibitions

There has been positive momentum over the last month which is creating renewed optimism and a clear road map to get back to in person trade shows in Las Vegas by June this year. The COVID case numbers have been decreasing significantly, and US vaccine rollouts have been scaling up rapidly, including all tiers of citizens 18 years+ to be eligible by May 1.

> More


security stock solutionsJohn Becker

Vice President of Global Sales
AMAG Technology

We continued to innovate in 2020 and launched Symmetry Business Intelligence. Our customers had been asking for a way to track behavior abnormalities, and we delivered an analytics solution that helps identify identities that may pose a high risk to an organization. It also tracks facility occupancy and office usage for high-traffic areas, which provides data needed to help meet occupancy guidelines imposed by governing authorities, enforce physical distancing and determine cleaning schedules. 

In 2021, we will continue to listen to our customers and develop and enhance our open and diverse product platform. No one in the industry offers such an innovative and comprehensive solution set. It’s important to AMAG to support our customers with solutions that not only protect employees, assets and buildings but also positively impact business operations. We will continue to innovate with AI, analytics and mobile solutions to help mitigate risk, reduce costs and ensure compliance.

> More


security stock solutionsBradford Rand

CEO & President
TECHEXPO Top Secret Cyber Security Summit

When the entire live in-person conference industry came to an immediate halt, my team and I quickly created a series of Cyber Security Briefings to help maintain its goal in educating executives called the “Power Hour”. Similarly to their live events they featured experts from The FBI, The US Secret Service and Dept. of Homeland Security / CISA. Hosted on one of the most secure and trusted virtual platforms, Cisco WebEx; these complimentary, invitation-only webcasts offered senior level business executives information on the latest cyber threats facing their companies as they worked from home during the peak of this pandemic. In addition they provided insight on best practices and technical solutions from top companies such as IBM, Google, Artic Wolf, Proofpoint, Mimecast, Duo Security, Check Point, Darktrace, KnowBe4 and more.

> More


security stock solutionsMatt Barnette

CEO
PSA Security

I plan to continue to grow on the successes that PSA has had under Bill’s leadership. PSA is structurally a very sound organization that, like others, needs to continue to grow and innovate to remain relevant in the future. For PSA that means helping our integrators continue to adopt a recurring revenue model, install cloud-based solutions and be leaders in cybersecurity. Our industry has fared better than most through the pandemic, but PSA must continue to find products and services for our members so they can meet the ever-changing needs of their end users.

> More


security stock solutionsRoget Thornton

VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

> More


security stock solutionsJoseph Young

Senior Vice President, Innovation & Product Management
G4S

In response to the disruption to business that COVID-19 caused, many companies had more questions than resolutions. When we spoke with our customers to understand their risks and concerns, we quickly determined that helping customers through this journey should be a holistic, well thought through process.

As a result of the urgent need to slow the spread of the virus and keep employees safe with more stringent protocols than ever before, we saw companies and industry groups push products and solutions to do things they weren't originally designed to do in order to meet immediate needs.

For example, the temperature screening industry became a multi-billion dollar industry overnight. Most of the marketed solutions are not compliant to the guidelines that are coming from the FDA, CDC, OSHA, IOS & IEC, and that creates additional risk for our customers, both short and long-term. We've also seen guidelines rapidly change and evolve in a matter of weeks. As a result, we came to understand that without a comprehensive approach or plan, our customers would end up spending the majority of their time responding to immediate market drivers, and wouldn't be able to dedicate resources towards building a longer-term plan.

While some of our competitors were rushing to meet the immediate needs, we paused and took a moment to consider the bigger picture. We did a lot of research, met with strategic partners, reviewed control documents, ideated with customers via our Academy innovation forum and grounded all of that in a "jobs-to-be-done" framework. The end result is a comprehensive approach to helping customers mitigate risks during this pandemic, and also helping them to put process and technology in place that will meet their future needs.

> More


security stock solutionsRobert R. Ackerman, Jr.

Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

> More


security stock solutionsPeter Ford

Director, Northeast Region
G4S Corporate Risk Services

Plan, plan and plan early. If the C-Suite decides to attend a big event overseas at the last minute, have a basic security plan for large events already organized so all you have to do is fill in the blanks. Use the resources that the U.S. government provides and the resources that professional security firms provide for these types of scenarios. Use your connections that you’ve made through OSAC, DSAC, ISMA, ASIS or LinkedIn to make your job easier.

Additionally, we can help plan your company’s events overseas by utilizing G4S’ Corporate Risk Services large-event security expertise and G4S’ deep reach throughout the different regions of the globe (G4S is one of the largest employers in the world and is represented in around 90 countries).

Finally, I also strongly recommend professionals in our industry join the U.S. Department of State’s Overseas Security Advisory Council (OSAC), which can astronomically increase the safety of your personnel, your facilities and help you protect information. Please check out OSAC.gov or call (571) 345-2223 if you have any questions. 

Thank you for providing me this opportunity to discuss a topic I enjoy talking about. If you wish to discuss this topic further or if you need assistance in your company’s security program, I can be reached at: peter.ford@usa.g4s.com, or LinkedIn:  https://www.linkedin.com/in/ peter-ford-8b841710/

> More


security stock solutionsRobert Dodge

Executive Vice President
G4S Corporate Risk Services

G4S has a long legacy in the security industry that actually stretches back more than 100 years. During that time, the company has evolved with the industry, growing from a guarding company to the diversified and modern operation that it is today. We are security risk advisors, security software developers, installers and technicians, security officers and personnel who serve clients with deep expertise across most vertical markets.

The goal and mission of the ROC is to deliver cost-effective, risk mitigation solutions to our clients. What we've done with the ROC is combine our suite of Corporate Risk Services intelligence/travel risk management offerings, security command and control function with our formerly separate remote video monitoring services into a single location. This streamlines our operations and creates more value for our clients. It also puts us into a leading position in the industry because we have paired elite analysts with the latest AI-driven algorithms and technologies. The result is the early detection and timely response to a wide spectrum of threats the two hallmarks of competent risk management.

Today's threat landscape is persistent, complex and I would add that it is constantly evolving. We live in an age where we are flooded with information and clarity means power. Getting our customers what they need to know and when is a critical component of the modern global risk management landscape. That's where our AI platform comes into play by allowing us to separate the noise from the clear indications of risk, to get pertinent information and place it into context quickly so the best possible response can be initiated.

> More


security stock solutionsBruce K. Taragin

Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise.

> More


security stock solutionsDov Yoran

Sr. Director, Strategy &
Business Development

Security Business Group Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers.

> More


security stock solutionsCarl Bradley, U.S. Navy (Ret.)

Information Assurance & IT Security Consulting & Intelligence Strategy
HP Enterprise Services,
U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate.

In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...

> More


security stock solutionsTom Kellermann

Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.

> More


security stock solutionsRobin Harris

Chief Executive Officer
Applied Cyber Strategy Group

Many clients are referred to us for immediate support with onsite impromptu compliance audits from their current customers, prospects or industry compliance authority. Several clients are bidding a federal government or international corporate contract and need assistance responding to the RFP. Yet others are facing a stop work order until they can demonstrate a suitable cyber security posture and compliance with specific regulations. We assist our clients at any stage of their operations and their journey begins with relief upon initial engagement with us. Cyber security can keep you up at night. We take time to care. We listen to understand all the requirements, pain points and urgency clients face. Each client is assigned a strategic risk management team consisting of a privacy lawyer, cyber security expert, business analyst and program manager experienced in the client's industry.

The core team leads the strategy for compliance and risk management solution. They also engage additional resources as necessary to support success. We help clients win business. A cyber-attack can cost an organization a fortune in fines, reputation and prison time for executives. Without cyber security companies lose revenue opportunities. We support their targeted growth strategy. The investment in cyber security not only meets compliance but yields a return on that investment

> More


 

 

BREAKING NEWS:

Biden's Texas border security 'crisis' > More

Dealing with a new normal in our digital reality > More

Why cybersecurity can no longer be just a hygiene factor > More

Ongoing Phishing Campaign Targets APAC, EMEA Governments > More

Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters > More

IoT 'Nutrition' Labels Aim to Put Security on Display > More

EventBuilder Exposed Information of Over 100,000 Event Registrants > More

New Trends In Residential Security During COVID? > More


RECENT HEADLINES:

Malware uses Covid-19 scam to steal financial credentials > More

Critical Bug Reported With Millions of Downloads Weekly > More

A Third of Industrial Control Systems Attacked in H1 2021 > More

Tens of Thousands of Unpatched Fortinet VPNs Hacked via Old Security Flaw > More

How to Find the Hidden Files on Your Phone or Computer > More

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex > More

Understanding the Cryptocurrency-Ransomware Connection > More

US Cyber Command: Patch Critical Atlassian Bug Now > More

FBI Warns Ransomware Attack Could Disrupt Food Supply Chain > More

Russia responsible for cyber attacks on German parliament -German foreign ministry > More

Security lessons learned from 9/11 > More

BrakTooth Flaws Affect Billions of Bluetooth Devices > More

Brute-Force Attacks Target Inboxes for Gift Card Data > More

What It'll Take to Get Power Back in New Orleans After Hurricane Ida > More

President Joe Biden met with Big Tech executives at IBM, Google, and Amazon, about cyberattacks > More

Contactless Security Scanners Arrive at Disneyland Resort Parking Structures > More

Researchers, cybersecurity agency urge action by Microsoft cloud database users > More

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years > More

Afghan situation raises new security questions > More

T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’ > More

New Taliban head of security for Kabul is wanted by U.S. as terrorist > More

JPMorgan Chase Bank Notifies Customers of Data Exposure > More

Biden’s national security adviser Jake Sullivan warned about threats to the U.S. evacuations efforts in Kabul > More

U.S. and Singapore discuss cybersecurity, climate change and COVID as Vice President Harris visits region > More

Hackers Stole Over $90M From Japan's Liquid Crypto Exchange > More

Cybersecurity creators have a TikTok problem > More

Organizations around the world experience a jump in cyberattacks > More

The most important cybersecurity measures for HR > More

WARNING: Microsoft Exchange Under Attack With ProxyShell Flaws > More

Data of three million elderly citizens exposed in cloud security oversight > More

Facebook’s former security chief weighs in on Apple child protection controversy > More

US ports receive nearly $30m in security grants > More

74% believe threat detection is the biggest security challenge for digital transformation > More

DHS’ Rigid Security Protocols Contributed to Inadequate Jan. 6 Response, GAO Says > More

Church leaders gather for security training > More

Global response needed to counter rising security threats at sea > More

Biden's border problem: A perfect storm for national security and local communities > More

Tokyo Olympics see 1st cluster of COVID-19 infections > More

SEC Chair Gensler says crypto ‘rife with fraud, scams and abuses,’ threatens national security > More

AWS’ Amazon Simple Storage Service (S3) can be a security risk for your business > More

Managing Your Way to Hybrid Cloud Security > More

Security concerns over chip shortage are pushing governments to act, Moody’s says > More

Health IT Security Challenges Persist for Hospital Systems > More

What in-house counsel need to know about “reasonable” data security measures > More

The security risks lurking for banks still using mainframes > More

36% of organizations suffered a serious cloud security data leak or a breach in the past year > More

Microsoft acquires security start-up CloudKnox > More

U.S. and E.U. security officials wary of NSO links to Israeli intelligence > More

Tencent's WeChat suspends new user registration for security compliance > More

APi Group to acquire Chubb Fire and Security Business from Carrier for $3.1 billion > More

Why Cyber Security Stocks Have Rallied In Recent Weeks > More

Facebook spent $23.4 million on Mark Zuckerberg's personal security > More

Cloud security in 2021: A business guide to essential tools and best practices > More

Cybersecurity Failures Left Travelers' Personal Info at Risk > More

New security technology at the airport > More

House Advances Homeland Security Bills to Enhance Cybersecurity & U.S. Economic Security > More

Boosting Security with Robotic Process Automation > More

What did we learn about food safety and food security from the pandemic? > More

Slain Haitian President’s Security Was Lax > More

Windows 11's best security features > More

New Report Details Unidentified Aerial Phenomena Threat to National Security > More

Top 5 Physical Security Threats > More

IT Security Leaders Face Continued Vulnerabilities When Safeguarding Digital Communications > More

China drafts new cyber-security industry plan > More

Trouble for Biden – from crime to border security, here's why White House has reasons to worry > More

The biggest post-pandemic cyber security trends > More

A closer look at Google Workspace privacy and data security > More

Funding is flowing into a new era of cyber-security start-ups > More

Car security: How to stop car break ins before they happen > More

Ransomware is not out of control; security teams are > More

Department of Energy asks Congress for $201 million to bolster cybersecurity in wake of attacks > More

$500 Million in Ransomware Payments Laundered By Cybercrime Ring > More

The Challenge Of Educating The Military On Cyber Strategy > More

John McAfee found dead in Spanish prison > More

Microsoft's security tool can now spot rogue devices on your network > More

Microsoft's new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices> More

Apple’s Cook says proposed EU tech rules threaten security of iPhones > More

Mandatory Homeland Security Cybersecurity Directive > More

73% of enterprises suffer security and compliance issues due to internal misalignment > More

A security bug in Google’s Android app put users’ data at risk > More

Study Reveals Bring Your Own Device Security Gaps as Remote and Hybrid Work Increases > More

Is This The Next Frontier In Building Access Control And Security? > More

Upcoming SpaceX mission a reusability milestone for national security launch > More

Cotton warns Beijing Olympics will pose challenges for the 'safety, security and privacy' of American athletes > More

Here’s how Jewish institutions should be thinking about security > More

Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects > More

Why the Hybrid Workplace Is a Cybersecurity Nightmare > More

Cybersecurity attack hits world's largest meat supplier JBS' IT systems in the US and Australia > More

Proactive Security Key to Combatting Supply Chain Attacks > More

Printer risks go deep into IT history > More

Where Security And Privacy Regulations Meet Cyber Insurance > More

Wanted: Millions of cybersecurity pros. Salary: Whatever you want > More

Venmo will let users hide friends list after Biden security blunder > More

Ransomware attacks saddle Biden with grave national security crisis > More

Ransomware has thrust cybersecurity into the spotlight > More

Cybersecurity experts say more can be done to prevent ransomware attacks > More

Hackers Breached Colonial Pipeline Using Compromised VPN Password > More

The Best Cyber Security News Websites Of 2021 > More

DHS to announce cybersecurity regulations for pipelines after Colonial hack > More

The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms > More

Cyber security chief fears hackers could target hospitals > More

The Makings of a Better Cybersecurity Hire > More

Timeline: How the Wuhan lab-leak theory suddenly became credible > More

Businesses Are at Risk of Cybersecurity Breaches Due to Worker Error > More

10 Emerging Cybersecurity Trends To Watch In 2021 > More

Amid threats to members, House to vote on new security > More

Parks Associates: DIY Installation of Security Systems has Increased Nearly 40% Since 2018 > More

New research reveals today's biggest application security challenges > More

Aid agency security is a disaster waiting to happen > More

Pandemic Pressures Reveal Significant Mobile Application Security Issues; Thousands of the Most Popular Apps Contain Common Vulnerabilities > More

Lockheed Martin removes contractors from Iraq base over security fears > More

Colonial Pipeline Cyber Attack Points To Larger Security Concerns > More

Researchers design a graphene-based encrypted key for novel hardware security > More

What CISOs really want from security vendors > More

Security Vs. Convenience: Navigating the Mobile World > More

Microsoft and Darktrace Partner on Azure and AI Security Solutions > More

Biden on cyber security after 100 days: A good start, but now comes the hard part > More

Phishers Delivering Increasingly Convincing Lures > More

What Cybersecurity Can Learn From Video Games > More

Dell patches vulnerable driver > More

Security camera in Florida captures mysterious flying orbs of light > More

The Cybersecurity 202: Nearly two-thirds of cybersecurity experts think Biden's response to Russian hack is sufficient > More

Rethinking mobile security in a post-COVID workplace > More

Industrial Security: Not Just IT and OT, but Old OT and New OT > More

SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security > More

The cyber security mesh: how security paradigms are shifting > More

Personal Security IS Enterprise Security > More

Allied Universal Acquires G4S plc; Creating A Global Integrated Security Services Leader > More

U.S. sanctions on Russia: Will they stop cybersecurity attacks? > More

Google Trumpets New Mobile App Security Standard > More

Growing reliance on third-party suppliers signals increasing security risks > More

Re-imagining The Cybersecurity Workforce > More

‘Consequences’ for Russia if Alexei Navalny dies, Joe Biden’s national security official warns > More

Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses > More

Convergint Technologies buys electronic security business > More

Nearly all security professionals are struggling to secure IoT devices > More

Three vital security measures to protect your corporate network > More

Ex-national security officials call for commission to investigate Capitol attack > More

533 million Facebook users' phone numbers and personal data have been leaked online > More

Suspected Russian hackers gained access to US homeland security emails > More

Security breach: 8.2TB data up for sale on dark web > More

Blockstream Issues Security Token Tied to Bitcoin Hashrate, Payable in BTC > More

Pelosi picks DC National Guard chief to lead security in US House > More

AdaptiveMobile Security finds ‘fundamental vulnerability’ in 5G network slicing architecture > More

The pandemic-driven rush to cloud is compromising security > More

Microsoft Exchange Server attacks: 'They're being hacked faster than we can count', says security company > More

Swiss Cyber Security Firm Says It Accessed Servers of a SolarWinds Hacking Group > More

6 Cloud Security Resources that You Should Be Using > More

Security and Cyber Resilience for IoT: Let’s Get Started > More

DoT directs all state procurements to be of local cyber security products > More

Industrial Cyber Security Market Size to Reach USD 19220 Million by 2026 at a CAGR 6.9% | Valuates Reports > More

How to reduce remote working cyber security attacks > More

Oldsmar, Florida Breach Sheds Light on Need for Industrial Cybersecurity > More

The cybersecurity risks associated with 5G networks and how to manage them > More

Why Data Privacy Should Be on President Biden's Agenda for His First 100 Days > More

Fake Google reCAPTCHA Phishing Attack Swipes Office 365 Passwords > More

FINRA Warns of Ongoing Phishing Attacks Targeting Brokerage Firms > More

McAfee Faces Decades Behind Bars After Fraud Indictment > More

Iranian Hackers Using Remote Utilities Software to Spy On Its Targets > More

FTC Busts $110m Charity Fraud Operation > More

DHS announces new measures to boost nation's cybersecurity > More

Capitol security officials blame poor intelligence — and each other — for the Jan. 6 riot > More

Security camera captures insanely close falling meteor > More

5 Security Lessons for the Post COVID19 Era > More

Emmanuel Macron pledges €1bn for cybersecurity after hospital ransomware attacks > More

The future of cybersecurity will be about ‘fighting fire with fire’ > More

Senate will hold a public inquiry into the security breaches in the Capitol riot > More

How Businesses Can Look To Prepare For The Long-term Cyber Security Impacts Of COVID-19 > More

This cybersecurity threat costs business millions. And it's the one they often forget about > More

The Adoption of Cybersecurity Insurance and its Role in the Modern World > More

Cyber Security Isn’t Expensive - It’s Priceless > More

The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity > More

In Biden World, Economic Policy Is National Security Policy > More

Biden officials believe China to be 'greatest long-term national security threat' to the US > More

Top security technologies to protect remote workers > More

Google steps up its game on open-source security. "Our new tool makes open-source security bugs easier to spot" > More

3 Critical Data Security Strategies for 2021 > More

The IoT Security Risks and Benefits of IT Convergence > More

China Arrests Australian TV Anchor on National Security Charge > More

Security Experts on Anticipated Pandemic Impacts in 2021 > More

What will Biden's immigration overhaul mean for national security? > More

COVID-19 and the International Security Environment > More

Google says North Korean state hackers are targeting security researchers on social media > More

Hundreds of Industrial Organizations Received Sunburst Malware in SolarWinds Attack > More

Apple says iOS 14.4 fixes three security bugs ‘actively exploited’ by hackers > More

The Biden-Harris Administration Immediate Priorities > More

Better than the best password: How to use 2FA to improve your security > More

Biden Has a Peloton Bike. That Raises Security Issues at the White House > More

State of Residential Security 2021: Reasons for Optimism, New Opportunities & More > More



Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.