In The Boardroom Press Room About Us Research Reports Contact Us

IN THE BOARDROOM:

Brian Ruttenbur Imperial CapitalBrian Ruttenbur

Managing Director
Imperial Capital

The traditional alarm monitoring market operates under a business model where high margin recurring monthly revenue is used to subsidize initial costs (primarily hardware and installation costs). The traditional model has been very successful in landing (typically for no upfront fee or a small fee up-front fee) and keeping long-term customers for years that pay monthly recurring fees. In the last several years, we have seen a surge in the IoT and Home Automation markets. The problem with IoT and Home Automation, while growing rapidly, is that they have lacked an integrated offering with a compelling service model thus, there has been limited recurring revenue.

We believe IoT and Home Automation providers are beginning to move to an Alarm Monitoring business model (with limited upfront fees but with the customers signing long-term contracts). This shift can be observed with recent companies like Latch Inc (LTCH – Not Rated) and Smart Rent (Not Rated) both offering services to multifamily facilities with high recurring fees (we will discuss Latch in further detail later in this report). We are also observing traditional alarm companies moving further into IoT and Home automation like ADT and Monitronics/Brinks Home Security experiencing solid growth and higher retention through a broader offering to its end user. Finally, we see multinational security companies like Prosegur expanding its offerings from guard/alarms/cash management to video monitoring and home automation to increase RMR or recurring monthly revenues.

> More


Jonathan Moore AMAG TechnologyJonathan Moore

Vice President of
Product Management
AMAG Technology

AMAG Technology delivers a powerful, unified and open security platform that empowers businesses to effectively secure their facilities, transform their operations and meet compliance. The Symmetry Security Management system encompasses access control, video, identity management, analytics, mobile, intrusion, visitor management, command and control and incident management. Symmetry’s scalable, resilient and integrated security solutions provide operational insights and intelligence to improve business today and tomorrow.

AMAG is known for providing enterprise access control hardware and software. Over the last 5 years we have added a range of supporting products that integrate directly with the access control platform, providing a complete physical security solution, capable of managing all aspects of a well rounded security program.

> More


Lisa Terry Allied UniversalLisa Terry

Vice President,
Vertical Markets - Healthcare
Allied Universal®

I have served in healthcare security and police management for more than 30 years. For the past four years, I have served as Vice President of Healthcare for Allied Universal®. Just prior to that, I served as Director of Hospital Police, Security and Transportation at the University of North Carolina in Chapel Hill. I have been privileged to hold the position of Chief of Campus Police and Public Safety with WakeMed Health and Hospitals in Raleigh, North Carolina, and Chief of Police and Public Safety with Eastern Virginia Medical School in Norfolk, Virginia.

Currently, I am a Vice Chair of the ASIS Healthcare Community Steering Committee and the Chair of the ASIS GSX Presentation Selection Committee. Because of these amazing affiliations, I have been fortunate to collaborate with some of the world’s greatest minds in healthcare, security, and policing. I have attempted to share some of those strategies and lessons learned for successfully preventing and mitigating violence in two of my books: “Preventing Violence in the Emergency Department” and “The Active Shooter Response Toolkit for Healthcare Workers.”

> More


Ramesh Kesanupalli Digital Trust NetworksRamesh Kesanupalli

CEO & Co-founder
Digital Trust Networks Inc

A Covid credential presentation would be an excellent use case for what we are doing, whether it is a Covid test result or a Covid vaccination proof. A Service Provider like an airline before boarding, a rental car agency before renting a car, or a hotel before checking in, should be able to check the validity of the presented credential, that it belongs to the person who is showing it, that it is the latest data, that it comes from the actual source, and that the source can actually be trusted -- that it is a genuine facility, and not a fake credential provider. Digital Trust Network’s Digital Identity Interchange is a perfect vehicle to achieve this. Further, the issuing sources will be part of the value chain when the credential is verified. This system protects user privacy, invalidates fraudulent certificates and credentials, and provides the latest information.

> More


security stock solutionsWill Wise

Group Vice President Security,
Public Safety, Transportation
& Casino Gaming

Reed Exhibitions

There has been positive momentum over the last month which is creating renewed optimism and a clear road map to get back to in person trade shows in Las Vegas by June this year. The COVID case numbers have been decreasing significantly, and US vaccine rollouts have been scaling up rapidly, including all tiers of citizens 18 years+ to be eligible by May 1.

> More


security stock solutionsJohn Becker

Vice President of Global Sales
AMAG Technology

We continued to innovate in 2020 and launched Symmetry Business Intelligence. Our customers had been asking for a way to track behavior abnormalities, and we delivered an analytics solution that helps identify identities that may pose a high risk to an organization. It also tracks facility occupancy and office usage for high-traffic areas, which provides data needed to help meet occupancy guidelines imposed by governing authorities, enforce physical distancing and determine cleaning schedules. 

In 2021, we will continue to listen to our customers and develop and enhance our open and diverse product platform. No one in the industry offers such an innovative and comprehensive solution set. It’s important to AMAG to support our customers with solutions that not only protect employees, assets and buildings but also positively impact business operations. We will continue to innovate with AI, analytics and mobile solutions to help mitigate risk, reduce costs and ensure compliance.

> More


security stock solutionsBradford Rand

CEO & President
TECHEXPO Top Secret Cyber Security Summit

When the entire live in-person conference industry came to an immediate halt, my team and I quickly created a series of Cyber Security Briefings to help maintain its goal in educating executives called the “Power Hour”. Similarly to their live events they featured experts from The FBI, The US Secret Service and Dept. of Homeland Security / CISA. Hosted on one of the most secure and trusted virtual platforms, Cisco WebEx; these complimentary, invitation-only webcasts offered senior level business executives information on the latest cyber threats facing their companies as they worked from home during the peak of this pandemic. In addition they provided insight on best practices and technical solutions from top companies such as IBM, Google, Artic Wolf, Proofpoint, Mimecast, Duo Security, Check Point, Darktrace, KnowBe4 and more.

> More


security stock solutionsMatt Barnette

CEO
PSA Security

I plan to continue to grow on the successes that PSA has had under Bill’s leadership. PSA is structurally a very sound organization that, like others, needs to continue to grow and innovate to remain relevant in the future. For PSA that means helping our integrators continue to adopt a recurring revenue model, install cloud-based solutions and be leaders in cybersecurity. Our industry has fared better than most through the pandemic, but PSA must continue to find products and services for our members so they can meet the ever-changing needs of their end users.

> More


security stock solutionsRoget Thornton

VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

> More


security stock solutionsJoseph Young

Senior Vice President, Innovation & Product Management
G4S

In response to the disruption to business that COVID-19 caused, many companies had more questions than resolutions. When we spoke with our customers to understand their risks and concerns, we quickly determined that helping customers through this journey should be a holistic, well thought through process.

As a result of the urgent need to slow the spread of the virus and keep employees safe with more stringent protocols than ever before, we saw companies and industry groups push products and solutions to do things they weren't originally designed to do in order to meet immediate needs.

For example, the temperature screening industry became a multi-billion dollar industry overnight. Most of the marketed solutions are not compliant to the guidelines that are coming from the FDA, CDC, OSHA, IOS & IEC, and that creates additional risk for our customers, both short and long-term. We've also seen guidelines rapidly change and evolve in a matter of weeks. As a result, we came to understand that without a comprehensive approach or plan, our customers would end up spending the majority of their time responding to immediate market drivers, and wouldn't be able to dedicate resources towards building a longer-term plan.

While some of our competitors were rushing to meet the immediate needs, we paused and took a moment to consider the bigger picture. We did a lot of research, met with strategic partners, reviewed control documents, ideated with customers via our Academy innovation forum and grounded all of that in a "jobs-to-be-done" framework. The end result is a comprehensive approach to helping customers mitigate risks during this pandemic, and also helping them to put process and technology in place that will meet their future needs.

> More


security stock solutionsRobert R. Ackerman, Jr.

Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

> More


security stock solutionsBruce K. Taragin

Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise.

> More


security stock solutionsDov Yoran

Sr. Director, Strategy &
Business Development

Security Business Group Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers.

> More


security stock solutionsCarl Bradley, U.S. Navy (Ret.)

Information Assurance & IT Security Consulting & Intelligence Strategy
HP Enterprise Services,
U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate.

In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...

> More


security stock solutionsTom Kellermann

Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.

> More


security stock solutionsRobin Harris

Chief Executive Officer
Applied Cyber Strategy Group

Many clients are referred to us for immediate support with onsite impromptu compliance audits from their current customers, prospects or industry compliance authority. Several clients are bidding a federal government or international corporate contract and need assistance responding to the RFP. Yet others are facing a stop work order until they can demonstrate a suitable cyber security posture and compliance with specific regulations. We assist our clients at any stage of their operations and their journey begins with relief upon initial engagement with us. Cyber security can keep you up at night. We take time to care. We listen to understand all the requirements, pain points and urgency clients face. Each client is assigned a strategic risk management team consisting of a privacy lawyer, cyber security expert, business analyst and program manager experienced in the client's industry.

The core team leads the strategy for compliance and risk management solution. They also engage additional resources as necessary to support success. We help clients win business. A cyber-attack can cost an organization a fortune in fines, reputation and prison time for executives. Without cyber security companies lose revenue opportunities. We support their targeted growth strategy. The investment in cyber security not only meets compliance but yields a return on that investment

> More


 

 

BREAKING NEWS:

Covid’s omicron variant poses a ‘very high’ risk — here’s what you need to know right now > More

Critical Wormable Security Flaw Found in Several HP Printer Models > More

Panasonic Suffers Data Breach After Hackers Hack Into Its Network > More

Google warns crypto miners are using compromised cloud accounts > More

Wind Turbine Giant Vestas Confirms Ransomware Involved in Cyberattack > More

Yanluowang Ransomware Tied to Thieflock Threat Actor > More

Cybersecurity initiatives need cooperation from the board > More

IKEA Hit by Email Reply-Chain Cyberattack > More


RECENT HEADLINES:

GoDaddy Breach Exposes 1.2 Million Managed WordPress Customer Accounts > More

Astroworld Security guards injured during Travis Scott concert file lawsuits > More

Cybersecurity expert on how to avoid online shopping scams this holiday season > More

The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back > More

Top national security officials stress need for collaboration in cyberspace > More

Microsoft Identifies Six Iranian State Actor Groups Deploying Ransomware > More

Biden, Trump Administrations in Rare Agreement on Lawsuits Which Threaten National Security > More

Police confirm Astroworld security guard was likely injected with drugs when stabbed in neck with needle > More

Cybersecurity M&A Roundup for First Week of November 2021 > More

McAfee to be Taken Private in $14 Billion Private Equity Deal > More

BlackBerry Uncovers Initial Access Broker Linked to 3 Distinct Hacker Groups > More

Insurers Tap Cyber “Opportunity” as Rates Continue to Rise > More

Proofpoint Phish Harvests Microsoft O365, Google Logins > More

What's being done about election security > More

Google Triples Bounty for Linux Kernel Exploitation > More

FBI Publishes IOCs for Hello Kitty Ransomware > More

How to Use iCloud+'s New Security Features > More

Kaspersky Patches Vulnerability That Can Lead to Unbootable System > More

The SolarWinds Hackers Are Looking for Their Next Big Score > More

An Apple macOS Flaw You Should Know About > More

New 'Trojan Source' Technique Lets Hackers Hide Vulnerabilities in Source Code > More

Countries Ranked According to Online Risks > More

Russia-Linked SolarWinds Hackers Continue Launching Supply Chain Attacks > More

BlackMatter Bug Saved Victims Millions in Ransom Payments > More

The Best VPNs to Protect Yourself Online > More

Facebook Sues Ukrainian for Scraping, Selling Data of 178 Million Users > More

Families hire private security amid crime spree > More

Hackers Exploited Popular BillQuick Billing Software to Deploy Ransomware > More

White House unveils landmark reports on climate links to security, migration > More

FBI warns of fake govt sites used to steal financial, personal data > More

Microsoft, Intel and Goldman Sachs Lead New Supply Chain Security Group > More

Consumer Financial Protection Bureau discussion on improving the nation’s cybersecurity > More

Google CEO Sundar Pichai Calls for Government Action on Cybersecurity > More

Ransomware attack hits owner of dozens of local TV stations > More

Biden grid security plans for renewables may hit state wall > More

Is Your Data Safe? Check Out Some Cybersecurity Master Classes > More

World leaders recognize ransomware attacks as 'global security threat' > More

Biden Signs School Cybersecurity Bill > More

Record number of firearms discovered at airport security checkpoints > More

Everything you need to know about NIST > More

The Best Outdoor Security Cameras For YOUR Home > More

Inside the next big cybersecurity threat: Killware > More

Google unveils cybersecurity programs and action team > More

Pentagon Official Says He Resigned Because US Cybersecurity Is No Match for China > More

Facebook, Instagram, WhatsApp go down > More

Cybersecurity experts notice rising trend in hospital cyberattacks > More

Five Cybersecurity Misconceptions Putting Organizations At Risk > More

Cybersecurity awareness starts at home > More

Cybersecurity experts have mixed reviews of TSA's new energy pipeline rules > More

Tips for cybersecurity from State Police > More

Biden official says protecting US steel a national security issue > More

NIST to begin publishing Cybersecurity Practice Guide in 2022 > More

Cyber attacks on schools > More

Study Finds Link Between Cybersecurity Attacks and Remote Work Technology > More

Companies are more worried about cybersecurity now than they were pre-pandemic > More

Cybersecurity Insurer Coalition Gets New Funding at $3.5 Billion Valuation > More

Biden's Texas border security 'crisis' > More

Dealing with a new normal in our digital reality > More

Why cybersecurity can no longer be just a hygiene factor > More

Ongoing Phishing Campaign Targets APAC, EMEA Governments > More

Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters > More

IoT 'Nutrition' Labels Aim to Put Security on Display > More

EventBuilder Exposed Information of Over 100,000 Event Registrants > More

New Trends In Residential Security During COVID? > More

Malware uses Covid-19 scam to steal financial credentials > More

Critical Bug Reported With Millions of Downloads Weekly > More

A Third of Industrial Control Systems Attacked in H1 2021 > More

Tens of Thousands of Unpatched Fortinet VPNs Hacked via Old Security Flaw > More

How to Find the Hidden Files on Your Phone or Computer > More

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex > More

Understanding the Cryptocurrency-Ransomware Connection > More

US Cyber Command: Patch Critical Atlassian Bug Now > More

FBI Warns Ransomware Attack Could Disrupt Food Supply Chain > More

Russia responsible for cyber attacks on German parliament -German foreign ministry > More

Security lessons learned from 9/11 > More

BrakTooth Flaws Affect Billions of Bluetooth Devices > More

Brute-Force Attacks Target Inboxes for Gift Card Data > More

What It'll Take to Get Power Back in New Orleans After Hurricane Ida > More

President Joe Biden met with Big Tech executives at IBM, Google, and Amazon, about cyberattacks > More

Contactless Security Scanners Arrive at Disneyland Resort Parking Structures > More

Researchers, cybersecurity agency urge action by Microsoft cloud database users > More

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years > More

Afghan situation raises new security questions > More

T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’ > More

New Taliban head of security for Kabul is wanted by U.S. as terrorist > More

JPMorgan Chase Bank Notifies Customers of Data Exposure > More

Biden’s national security adviser Jake Sullivan warned about threats to the U.S. evacuations efforts in Kabul > More

U.S. and Singapore discuss cybersecurity, climate change and COVID as Vice President Harris visits region > More

Hackers Stole Over $90M From Japan's Liquid Crypto Exchange > More

Cybersecurity creators have a TikTok problem > More

Organizations around the world experience a jump in cyberattacks > More

The most important cybersecurity measures for HR > More

WARNING: Microsoft Exchange Under Attack With ProxyShell Flaws > More

Data of three million elderly citizens exposed in cloud security oversight > More

Facebook’s former security chief weighs in on Apple child protection controversy > More

US ports receive nearly $30m in security grants > More

74% believe threat detection is the biggest security challenge for digital transformation > More

DHS’ Rigid Security Protocols Contributed to Inadequate Jan. 6 Response, GAO Says > More

Church leaders gather for security training > More

Global response needed to counter rising security threats at sea > More

Biden's border problem: A perfect storm for national security and local communities > More

Tokyo Olympics see 1st cluster of COVID-19 infections > More

SEC Chair Gensler says crypto ‘rife with fraud, scams and abuses,’ threatens national security > More

AWS’ Amazon Simple Storage Service (S3) can be a security risk for your business > More

Managing Your Way to Hybrid Cloud Security > More

Security concerns over chip shortage are pushing governments to act, Moody’s says > More

Health IT Security Challenges Persist for Hospital Systems > More

What in-house counsel need to know about “reasonable” data security measures > More

The security risks lurking for banks still using mainframes > More

36% of organizations suffered a serious cloud security data leak or a breach in the past year > More

Microsoft acquires security start-up CloudKnox > More

U.S. and E.U. security officials wary of NSO links to Israeli intelligence > More

Tencent's WeChat suspends new user registration for security compliance > More

APi Group to acquire Chubb Fire and Security Business from Carrier for $3.1 billion > More

Why Cyber Security Stocks Have Rallied In Recent Weeks > More

Facebook spent $23.4 million on Mark Zuckerberg's personal security > More

Cloud security in 2021: A business guide to essential tools and best practices > More

Cybersecurity Failures Left Travelers' Personal Info at Risk > More

New security technology at the airport > More

House Advances Homeland Security Bills to Enhance Cybersecurity & U.S. Economic Security > More

Boosting Security with Robotic Process Automation > More

What did we learn about food safety and food security from the pandemic? > More

Slain Haitian President’s Security Was Lax > More

Windows 11's best security features > More

New Report Details Unidentified Aerial Phenomena Threat to National Security > More

Top 5 Physical Security Threats > More

IT Security Leaders Face Continued Vulnerabilities When Safeguarding Digital Communications > More

China drafts new cyber-security industry plan > More

Trouble for Biden – from crime to border security, here's why White House has reasons to worry > More

The biggest post-pandemic cyber security trends > More

A closer look at Google Workspace privacy and data security > More

Funding is flowing into a new era of cyber-security start-ups > More

Car security: How to stop car break ins before they happen > More

Ransomware is not out of control; security teams are > More

Department of Energy asks Congress for $201 million to bolster cybersecurity in wake of attacks > More

$500 Million in Ransomware Payments Laundered By Cybercrime Ring > More

The Challenge Of Educating The Military On Cyber Strategy > More

John McAfee found dead in Spanish prison > More

Microsoft's security tool can now spot rogue devices on your network > More

Microsoft's new security tool will discover firmware vulnerabilities, and more, in PCs and IoT devices> More

Apple’s Cook says proposed EU tech rules threaten security of iPhones > More

Mandatory Homeland Security Cybersecurity Directive > More

73% of enterprises suffer security and compliance issues due to internal misalignment > More

A security bug in Google’s Android app put users’ data at risk > More

Study Reveals Bring Your Own Device Security Gaps as Remote and Hybrid Work Increases > More

Is This The Next Frontier In Building Access Control And Security? > More

Upcoming SpaceX mission a reusability milestone for national security launch > More

Cotton warns Beijing Olympics will pose challenges for the 'safety, security and privacy' of American athletes > More

Here’s how Jewish institutions should be thinking about security > More

Surge of New Digital Accounts During the Pandemic Leads to Lingering Security Side Effects > More

Why the Hybrid Workplace Is a Cybersecurity Nightmare > More

Cybersecurity attack hits world's largest meat supplier JBS' IT systems in the US and Australia > More

Proactive Security Key to Combatting Supply Chain Attacks > More

Printer risks go deep into IT history > More

Where Security And Privacy Regulations Meet Cyber Insurance > More

Wanted: Millions of cybersecurity pros. Salary: Whatever you want > More

Venmo will let users hide friends list after Biden security blunder > More

Ransomware attacks saddle Biden with grave national security crisis > More

Ransomware has thrust cybersecurity into the spotlight > More

Cybersecurity experts say more can be done to prevent ransomware attacks > More

Hackers Breached Colonial Pipeline Using Compromised VPN Password > More

The Best Cyber Security News Websites Of 2021 > More

DHS to announce cybersecurity regulations for pipelines after Colonial hack > More

The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms > More

Cyber security chief fears hackers could target hospitals > More

The Makings of a Better Cybersecurity Hire > More

Timeline: How the Wuhan lab-leak theory suddenly became credible > More

Businesses Are at Risk of Cybersecurity Breaches Due to Worker Error > More

10 Emerging Cybersecurity Trends To Watch In 2021 > More

Amid threats to members, House to vote on new security > More

Parks Associates: DIY Installation of Security Systems has Increased Nearly 40% Since 2018 > More

New research reveals today's biggest application security challenges > More

Aid agency security is a disaster waiting to happen > More

Pandemic Pressures Reveal Significant Mobile Application Security Issues; Thousands of the Most Popular Apps Contain Common Vulnerabilities > More

Lockheed Martin removes contractors from Iraq base over security fears > More

Colonial Pipeline Cyber Attack Points To Larger Security Concerns > More

Researchers design a graphene-based encrypted key for novel hardware security > More

What CISOs really want from security vendors > More

Security Vs. Convenience: Navigating the Mobile World > More

Microsoft and Darktrace Partner on Azure and AI Security Solutions > More

Biden on cyber security after 100 days: A good start, but now comes the hard part > More

Phishers Delivering Increasingly Convincing Lures > More

What Cybersecurity Can Learn From Video Games > More

Dell patches vulnerable driver > More

Security camera in Florida captures mysterious flying orbs of light > More

The Cybersecurity 202: Nearly two-thirds of cybersecurity experts think Biden's response to Russian hack is sufficient > More

Rethinking mobile security in a post-COVID workplace > More



Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.