In The Boardroom Press Room About Us Research Reports Contact Us

IN THE BOARDROOM:

Fred Nelson AMAG TechnologyFred Nelson

Director of Sales
AMAG Technology

AMAG’s unique value proposition is one of the main reasons I joined the company. There are many companies that offer access control, video or identity management solutions. What makes AMAG unique is that we offer a total solution that is developed in-house. We manufacture our own access control software and hardware, visitor management and identity management systems. Manufacturing our own hardware and software allows us full control over feature enhancing upgrades, ensuring continuity of supply for the long term. Our system is completely scalable, meaning a Symmetry Security Management System can operate in a small business or secure a large company, even with locations around the world.

Another key differentiator is AMAG incorporates an open architecture into its Symmetry solution. Symmetry integrates with ANY technology on the market, including other access control systems. Integrating with other access control systems is important for large enterprise customers who acquire companies and take on the responsibility of managing the new company’s existing access control systems. Integrating with those new systems simplifies the overall security management and lets the company issue one card for all systems. In addition, our support team provides complete support for all third-party products integrated with Symmetry. This is a huge relief for our customers who don’t want to jump around to different manufacturers when they have issues.

> More


Feix Nater, Nater Associates, Ltd.Felix Nater

President and Owner
Nater Associates, Ltd.

Workplace violence is a major problem and, unfortunately, it’s on the rise. “Every year, 2 million people experience some form of workplace violence.” Join Felix Nater “In The Boardroom” regarding strategies to prevent workplace violence and many other risk mitigation topics regarding threats to our health and security: the post-COVID office, cybersecurity, and much more. You will benefit from this conversation with Felix Nader!

> More


Watch Felix's video on Workplace Violence


Kami Dukes AMAG TechnologyKami Dukes

Director of Business Development
AMAG Technology

My business development team at AMAG Technology is 100% dedicated to the security consultant community and architects and engineers. This community is the backbone of the security industry. They have power, much more than meets the eye, to drive some of the most meaningful work in the security space. The industry works collectively as a wheel that keeps churning with the ultimate goals of saving lives and protecting properties and assets. We have security end users that have a business to run and security plans to operate and execute on. We have technology developers, such as ourselves at AMAG, that provide innovative solutions the end user can rely on to optimize their security programs. And we have the systems integrators who bring the systems to life and maintain their health and long-term functionality. But what sets the wheels in motion is the physical security consultant.

> More


Robert Dodge ProsegurRobert Dodge

CEO
Prosegur

Organizations are in various states of assessing their workforce needs as they start to bring employees back to the office. Every company is looking at the situation through a prism of their own needs. From a security perspective, I tell our clients that they need to have a heightened awareness of the mental state of their staff.  The pandemic has increased tensions and stress levels. For example, some employees are stressed about rules around vaccinations and mask-wearing in the office.

If you are in charge of security, it’s now more important than ever that you carefully evaluate your people, process, and technology in this new normal and be prepared for potential disruptions. Some of these situations could escalate into violence. Secondly, we have to consider the security of remote workers.  What security risks are in their home?  Is there the possibility that your workers are leaving sensitive documents in the open? Are they locking their home office? Do they have a shredder? Are they following good cybersecurity hygiene? Or are they creating a massive vulnerability for someone to access sensitive corporate information?

> More


José Daniel Garcia Espinel ProsegurJosé Daniel García Espinel

Global Director of Innovation and Product Development for Security
Prosegur Global Risk

Prosegur’s strategy is focused on two important concepts. We must Perform by offering our customers the very best service in our traditional businesses such as guarding. And we must Transform by offering our customers new and innovative security solutions that are unique to Prosegur and the security industry. Our innovation strategy is focused on new product development. When developing new products we analyze their desirability, feasibility, and scalability. But we don’t just concentrate on the traditional security industry. We look to adjacent industries that we know are equally important to our customers, such as business continuity and safety. And our Security Operations Centers (SOCs) around the world are the hub of innovation for our company.

> More


Brian Ruttenbur Imperial CapitalBrian Ruttenbur

Managing Director
Imperial Capital

The traditional alarm monitoring market operates under a business model where high margin recurring monthly revenue is used to subsidize initial costs (primarily hardware and installation costs). The traditional model has been very successful in landing (typically for no upfront fee or a small fee up-front fee) and keeping long-term customers for years that pay monthly recurring fees. In the last several years, we have seen a surge in the IoT and Home Automation markets. The problem with IoT and Home Automation, while growing rapidly, is that they have lacked an integrated offering with a compelling service model thus, there has been limited recurring revenue.

We believe IoT and Home Automation providers are beginning to move to an Alarm Monitoring business model (with limited upfront fees but with the customers signing long-term contracts). This shift can be observed with recent companies like Latch Inc (LTCH – Not Rated) and Smart Rent (Not Rated) both offering services to multifamily facilities with high recurring fees (we will discuss Latch in further detail later in this report). We are also observing traditional alarm companies moving further into IoT and Home automation like ADT and Monitronics/Brinks Home Security experiencing solid growth and higher retention through a broader offering to its end user. Finally, we see multinational security companies like Prosegur expanding its offerings from guard/alarms/cash management to video monitoring and home automation to increase RMR or recurring monthly revenues.

> More


Jonathan Moore AMAG TechnologyJonathan Moore

Vice President of
Product Management
AMAG Technology

AMAG Technology delivers a powerful, unified and open security platform that empowers businesses to effectively secure their facilities, transform their operations and meet compliance. The Symmetry Security Management system encompasses access control, video, identity management, analytics, mobile, intrusion, visitor management, command and control and incident management. Symmetry’s scalable, resilient and integrated security solutions provide operational insights and intelligence to improve business today and tomorrow.

AMAG is known for providing enterprise access control hardware and software. Over the last 5 years we have added a range of supporting products that integrate directly with the access control platform, providing a complete physical security solution, capable of managing all aspects of a well rounded security program.

> More


Lisa Terry Allied UniversalLisa Terry

Vice President,
Vertical Markets - Healthcare
Allied Universal®

I have served in healthcare security and police management for more than 30 years. For the past four years, I have served as Vice President of Healthcare for Allied Universal®. Just prior to that, I served as Director of Hospital Police, Security and Transportation at the University of North Carolina in Chapel Hill. I have been privileged to hold the position of Chief of Campus Police and Public Safety with WakeMed Health and Hospitals in Raleigh, North Carolina, and Chief of Police and Public Safety with Eastern Virginia Medical School in Norfolk, Virginia.

Currently, I am a Vice Chair of the ASIS Healthcare Community Steering Committee and the Chair of the ASIS GSX Presentation Selection Committee. Because of these amazing affiliations, I have been fortunate to collaborate with some of the world’s greatest minds in healthcare, security, and policing. I have attempted to share some of those strategies and lessons learned for successfully preventing and mitigating violence in two of my books: “Preventing Violence in the Emergency Department” and “The Active Shooter Response Toolkit for Healthcare Workers.”

> More


Ramesh Kesanupalli Digital Trust NetworksRamesh Kesanupalli

CEO & Co-founder
Digital Trust Networks Inc

A Covid credential presentation would be an excellent use case for what we are doing, whether it is a Covid test result or a Covid vaccination proof. A Service Provider like an airline before boarding, a rental car agency before renting a car, or a hotel before checking in, should be able to check the validity of the presented credential, that it belongs to the person who is showing it, that it is the latest data, that it comes from the actual source, and that the source can actually be trusted -- that it is a genuine facility, and not a fake credential provider. Digital Trust Network’s Digital Identity Interchange is a perfect vehicle to achieve this. Further, the issuing sources will be part of the value chain when the credential is verified. This system protects user privacy, invalidates fraudulent certificates and credentials, and provides the latest information.

> More


security stock solutionsWill Wise

Group Vice President Security,
Public Safety, Transportation
& Casino Gaming

Reed Exhibitions

There has been positive momentum over the last month which is creating renewed optimism and a clear road map to get back to in person trade shows in Las Vegas by June this year. The COVID case numbers have been decreasing significantly, and US vaccine rollouts have been scaling up rapidly, including all tiers of citizens 18 years+ to be eligible by May 1.

> More


security stock solutionsJohn Becker

Vice President of Global Sales
AMAG Technology

We continued to innovate in 2020 and launched Symmetry Business Intelligence. Our customers had been asking for a way to track behavior abnormalities, and we delivered an analytics solution that helps identify identities that may pose a high risk to an organization. It also tracks facility occupancy and office usage for high-traffic areas, which provides data needed to help meet occupancy guidelines imposed by governing authorities, enforce physical distancing and determine cleaning schedules. 

In 2021, we will continue to listen to our customers and develop and enhance our open and diverse product platform. No one in the industry offers such an innovative and comprehensive solution set. It’s important to AMAG to support our customers with solutions that not only protect employees, assets and buildings but also positively impact business operations. We will continue to innovate with AI, analytics and mobile solutions to help mitigate risk, reduce costs and ensure compliance.

> More


security stock solutionsBradford Rand

CEO & President
TECHEXPO Top Secret Cyber Security Summit

When the entire live in-person conference industry came to an immediate halt, my team and I quickly created a series of Cyber Security Briefings to help maintain its goal in educating executives called the “Power Hour”. Similarly to their live events they featured experts from The FBI, The US Secret Service and Dept. of Homeland Security / CISA. Hosted on one of the most secure and trusted virtual platforms, Cisco WebEx; these complimentary, invitation-only webcasts offered senior level business executives information on the latest cyber threats facing their companies as they worked from home during the peak of this pandemic. In addition they provided insight on best practices and technical solutions from top companies such as IBM, Google, Artic Wolf, Proofpoint, Mimecast, Duo Security, Check Point, Darktrace, KnowBe4 and more.

> More


security stock solutionsRoget Thornton

VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

> More


security stock solutionsRobert R. Ackerman, Jr.

Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

> More


security stock solutionsBruce K. Taragin

Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise.

> More


security stock solutionsDov Yoran

Sr. Director, Strategy &
Business Development

Security Business Group Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers.

> More


security stock solutionsCarl Bradley, U.S. Navy (Ret.)

Information Assurance & IT Security Consulting & Intelligence Strategy
HP Enterprise Services,
U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate.

In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...

> More


security stock solutionsTom Kellermann

Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.

> More


security stock solutionsRobin Harris

Chief Executive Officer
Applied Cyber Strategy Group

Many clients are referred to us for immediate support with onsite impromptu compliance audits from their current customers, prospects or industry compliance authority. Several clients are bidding a federal government or international corporate contract and need assistance responding to the RFP. Yet others are facing a stop work order until they can demonstrate a suitable cyber security posture and compliance with specific regulations. We assist our clients at any stage of their operations and their journey begins with relief upon initial engagement with us. Cyber security can keep you up at night. We take time to care. We listen to understand all the requirements, pain points and urgency clients face. Each client is assigned a strategic risk management team consisting of a privacy lawyer, cyber security expert, business analyst and program manager experienced in the client's industry.

The core team leads the strategy for compliance and risk management solution. They also engage additional resources as necessary to support success. We help clients win business. A cyber-attack can cost an organization a fortune in fines, reputation and prison time for executives. Without cyber security companies lose revenue opportunities. We support their targeted growth strategy. The investment in cyber security not only meets compliance but yields a return on that investment

> More


 

 

BREAKING NEWS:

Top US, Chinese national security figures hold 'candid' discussions > More

Philadelphia to install 100 security cameras near schools > More

New cybersecurity bill to require mandatory reporting of ransomware, other attacks > More

The biggest crypto scams of 2022 (so far) > More

RECENT HEADLINES:

Texas Democrats host town halls on school security after deadly Uvalde shooting > More

Chicago Launches Program That Will Reimburse Residents for Security Camera Purchases > More

Google May Owe You a Chunk of $100 Million Over Privacy > More

Procter & Gamble offices closed due to former employee making threats. > More

Apple Issues Emergency Fixes For Security Flaws In Millions Of Devices, Patch ASAP > More

USB-based Wormable Malware Targets Windows Installer > More

EU Blames Russia for Satellite Hack Ahead of Ukraine Invasion > More

Microsoft Flexes Security Vendor Muscles With Managed Services > More

NFTs Emerge as the Next Enterprise Attack Vector > More

Jocker, Other Fleeceware Surges Back Into Google Play > More

China-linked APT Caught Pilfering Treasure Trove of IP > More

Twitter's New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal > More

Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia > More

Microsoft Documents Over 200 Cyberattacks by Russia Against Ukraine > More

Google Offering Up to $1.5 Million for Android 13 Beta Exploits > More

Millions of Java Apps Remain Vulnerable to Log4Shell > More

U.S. national security officials sound the alarm about potential cyberattacks by Russia > More

North Korea's $625 million crypto hack presents a new national security threat — and why it marks a shift in the global 'digital battlefield' > More

New Hacking Campaign Targeting Ukrainian Government with IcedID Malware > More

Feds Shut Down RaidForums Hacking Marketplace > More

Google Patches Third Actively Exploited Chrome Zero-Day of 2022 > More

Microsoft Leads Operation to Disrupt Zloader Botnet > More

CISA Alert on ICS, SCADA Devices Highlights Growing Enterprise IoT Security Risks > More

Subway security cameras malfunctioned, Adams says after Brooklyn attack > More

Google Sues Scammer for Running 'Puppy Fraud Scheme' Website > More

Microsoft Takes Down Domains Used in Cyberattack Against Ukraine > More

Former DHS Acting IT Chief Convicted in Software, Database Theft Scheme > More

Menswear Brand Zegna Reveals Ransomware Attack > More

Where is the security?’ Zelenskiy tells home truths to UN security council > More

Apple Rushes Out Patches for 0-Days in MacOS, iOS > More

U.S. Treasury Department Sanctions Russia-based Hydra Darknet Marketplace > More

Researchers Trace Widespread Espionage Attacks Back to Chinese 'Cicada' Hackers > More

FIN7 Cybercrime Operation Continues to Evolve Despite Arrests > More

What We Can Learn From Lapsus$ Techniques > More

Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware > More

Critical Sophos Security Bug Allows RCE on Firewalls > More

Okta Says It Goofed in Handling the Lapsus$ Attack > More

Checkmarx Finds Threat Actor 'Fully Automating' NPM Supply Chain Attacks > More

SonicWall Patches Critical Vulnerability in Firewall Appliances > More

New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable > More

Cryptocurrency Services Hit by Data Breach at CRM Company HubSpot > More

6 Reasons Not to Pay Ransomware Attackers > More

DarkHotel APT Targets Wynn, Macao Hotels to Rip Off Guest Data > More

Italy Investigates Russia's Kaspersky Antivirus Software > More

Massive DDoS Attack Knocked Israeli Government Websites Offline > More

Mobile Threats Skyrocket > More

How to Combat the No. 1 Cause of Security Breaches: Complexity > More

CaddyWiper: Another Destructive Wiper Malware Targeting Ukraine > More

Apple Patch Day: Gaping Security Holes in iOS, macOS, iPadOS > More

Samsung Source Codes Stolen > More

Critical Bugs in TerraMaster TOS Could Open NAS Devices to Remote Hacking > More

Nvidia’s Stolen Code-Signing Certs Used to Sign Malware > More

U.S. Security Vendors Launch Critical Infrastructure Defense Project > More

Russia-Ukraine: Threat of Local Cyber Operations Escalating Into Global Cyberwar > More

Google Fights Phishing With Updated Workspace Notifications > More

UN Security Council votes to convene rare emergency session over Ukraine > More

Moscow Exchange Downed by Cyber-Attack > More

100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption Feature > More

Toyota to Close Japan Plants After Suspected Cyberattack > More

Anonymous Hacker Group Targets Russian State Media > More

Social Media Hijacking Malware Spreading Through Gaming Apps on Microsoft Store > More

7 Steps to Take Right Now to Prepare for Cyberattacks by Russia > More

Biden instructs State Department to release up to $350 million in security assistance to Ukraine > More

The latest on the Ukraine-Russia border crisis > More

CISA Again Warns U.S. Organizations of Potential Russian Cyberattacks > More

Over 28,000 Vulnerabilities Disclosed in 2021: Report > More

Google Paid Record $8.7 Million to Bug Hunters in 2021 > More

Data Breach at Morley Companies Affects 521,000 > More

Water companies must step up on cybersecurity > More

Could Biology Hold the Clue to Better Cybersecurity? > More

Ransomware Gang Says it Has Hacked 49ers Football Team > More

Olympics security breach. Hackers Backdoored Systems at China's National Games Just Before Competition > More

Google Exploring Blockchain Products — CEO Shares Web3 Strategies > More

UN Experts: North Korea Stealing Millions in Cyber Attacks > More

Biden security advisor Sullivan says Russian invasion could come ‘any day now’ > More

Breach of Washington State Database May Expose Personal Information > More

A quarter of Canadian companies have been victims of a cyber attack in 2021 > More

What’s your ‘security score?’ There’s an online tool for that > More

Attackers Target Intuit Users by Threatening to Cancel Tax Accounts > More

Out-of-Control Cybercrime Will Cause More Real-World Harm > More

The Omicron Variant Has New Versions Already. What Comes Next? > More

Walmart Dissects New 'Sugar' Ransomware > More

FBI Warns of Potential Cyberattacks Targeting 2022 Winter Olympics > More

New Malware Used by SolarWinds Attackers Went Undetected for Years > More

Apple Pays $100.5K Bug Bounty for Mac Webcam Hack > More

2 Oil Storage and Supply Firms Hit by Cyberattack > More

Mind blowing’ fraud plagues NFT market > More

Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers > More

Red Cross: Supply Chain Data Breach Hit 500K People > More

SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack > More

Cybersecurity Trends To Watch Out For In 2022 > More

White House orders federal agencies to raise cybersecurity bar for national security systems > More

Here Comes The NFT Fraud Boom > More

IRS Will Soon Require Selfies for Online Access > More

Cyber world is starting 2022 in crisis mode with the log4j bug > More

Unpatched HomeKit Vulnerability Exposes Apple iPhones, iPads to DoS Attacks > More

Stay safe online this year with these cyber security tips > More

Ape Theft Is an Expensive Way to Learn About Crypto’s Security Philosophy. People are losing their valuable NFTs to scams. Should platforms be held responsible? > More

Google buys Israeli security startup Siemplify for $500 mln > More

Predictions: SecurityWeek's 2022 Cybersecurity Outlook > More

Portugal Media Giant Impresa Crippled by Ransomware Attack > More

Top 5 trends for endpoint security In 2022 > More

Christmas Payroll Fears After Ransomware Hits Software Provider > More

Virginia IT Agency Hit With Ransomware Attack > More

A flaw in widely used computer code is prompting 100 new hacking attempts every minute > More

Apple Patches 42 Security Flaws in Latest iOS Refresh > More

Karakurt: A New Emerging Data Theft and Cyber Extortion Hacking Group > More

The Log4J Vulnerability Will Haunt the Internet for Years > More

Log4Shell Is Spawning Even Nastier Mutations > More

Extremely Critical Log4J Vulnerability Leaves Much of the Internet at Risk > More

Covid’s omicron variant poses a ‘very high’ risk — here’s what you need to know right now > More

Critical Wormable Security Flaw Found in Several HP Printer Models > More

Panasonic Suffers Data Breach After Hackers Hack Into Its Network > More

Google warns crypto miners are using compromised cloud accounts > More

Wind Turbine Giant Vestas Confirms Ransomware Involved in Cyberattack > More

Yanluowang Ransomware Tied to Thieflock Threat Actor > More

Cybersecurity initiatives need cooperation from the board > More

IKEA Hit by Email Reply-Chain Cyberattack > More

GoDaddy Breach Exposes 1.2 Million Managed WordPress Customer Accounts > More

Astroworld Security guards injured during Travis Scott concert file lawsuits > More

Cybersecurity expert on how to avoid online shopping scams this holiday season > More

The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back > More

Top national security officials stress need for collaboration in cyberspace > More

Microsoft Identifies Six Iranian State Actor Groups Deploying Ransomware > More

Biden, Trump Administrations in Rare Agreement on Lawsuits Which Threaten National Security > More

Police confirm Astroworld security guard was likely injected with drugs when stabbed in neck with needle > More

Cybersecurity M&A Roundup for First Week of November 2021 > More

McAfee to be Taken Private in $14 Billion Private Equity Deal > More

BlackBerry Uncovers Initial Access Broker Linked to 3 Distinct Hacker Groups > More

Insurers Tap Cyber “Opportunity” as Rates Continue to Rise > More

Proofpoint Phish Harvests Microsoft O365, Google Logins > More

What's being done about election security > More

Google Triples Bounty for Linux Kernel Exploitation > More

FBI Publishes IOCs for Hello Kitty Ransomware > More

How to Use iCloud+'s New Security Features > More

Kaspersky Patches Vulnerability That Can Lead to Unbootable System > More

The SolarWinds Hackers Are Looking for Their Next Big Score > More

An Apple macOS Flaw You Should Know About > More

New 'Trojan Source' Technique Lets Hackers Hide Vulnerabilities in Source Code > More

Countries Ranked According to Online Risks > More

Russia-Linked SolarWinds Hackers Continue Launching Supply Chain Attacks > More

BlackMatter Bug Saved Victims Millions in Ransom Payments > More

The Best VPNs to Protect Yourself Online > More

Facebook Sues Ukrainian for Scraping, Selling Data of 178 Million Users > More

Families hire private security amid crime spree > More

Hackers Exploited Popular BillQuick Billing Software to Deploy Ransomware > More

White House unveils landmark reports on climate links to security, migration > More

FBI warns of fake govt sites used to steal financial, personal data > More

Microsoft, Intel and Goldman Sachs Lead New Supply Chain Security Group > More

Consumer Financial Protection Bureau discussion on improving the nation’s cybersecurity > More

Google CEO Sundar Pichai Calls for Government Action on Cybersecurity > More

Ransomware attack hits owner of dozens of local TV stations > More

Biden grid security plans for renewables may hit state wall > More

Is Your Data Safe? Check Out Some Cybersecurity Master Classes > More

World leaders recognize ransomware attacks as 'global security threat' > More

Biden Signs School Cybersecurity Bill > More

Record number of firearms discovered at airport security checkpoints > More

Everything you need to know about NIST > More

The Best Outdoor Security Cameras For YOUR Home > More

Inside the next big cybersecurity threat: Killware > More

Google unveils cybersecurity programs and action team > More

Pentagon Official Says He Resigned Because US Cybersecurity Is No Match for China > More

Facebook, Instagram, WhatsApp go down > More

Cybersecurity experts notice rising trend in hospital cyberattacks > More

Five Cybersecurity Misconceptions Putting Organizations At Risk > More

Cybersecurity awareness starts at home > More

Cybersecurity experts have mixed reviews of TSA's new energy pipeline rules > More

Tips for cybersecurity from State Police > More

Biden official says protecting US steel a national security issue > More

NIST to begin publishing Cybersecurity Practice Guide in 2022 > More

Cyber attacks on schools > More

Study Finds Link Between Cybersecurity Attacks and Remote Work Technology > More

Companies are more worried about cybersecurity now than they were pre-pandemic > More

Cybersecurity Insurer Coalition Gets New Funding at $3.5 Billion Valuation > More

Biden's Texas border security 'crisis' > More

Dealing with a new normal in our digital reality > More

Why cybersecurity can no longer be just a hygiene factor > More

Ongoing Phishing Campaign Targets APAC, EMEA Governments > More

Europol Busts Major Crime Ring, Arrests Over 100 Online Fraudsters > More

IoT 'Nutrition' Labels Aim to Put Security on Display > More

EventBuilder Exposed Information of Over 100,000 Event Registrants > More

New Trends In Residential Security During COVID? > More

Malware uses Covid-19 scam to steal financial credentials > More

Critical Bug Reported With Millions of Downloads Weekly > More

A Third of Industrial Control Systems Attacked in H1 2021 > More

Tens of Thousands of Unpatched Fortinet VPNs Hacked via Old Security Flaw > More

How to Find the Hidden Files on Your Phone or Computer > More

The Biggest DDoS Attack in History Hit Russian Tech Giant Yandex > More

Understanding the Cryptocurrency-Ransomware Connection > More

US Cyber Command: Patch Critical Atlassian Bug Now > More

FBI Warns Ransomware Attack Could Disrupt Food Supply Chain > More

Russia responsible for cyber attacks on German parliament -German foreign ministry > More

Security lessons learned from 9/11 > More

BrakTooth Flaws Affect Billions of Bluetooth Devices > More

Brute-Force Attacks Target Inboxes for Gift Card Data > More

What It'll Take to Get Power Back in New Orleans After Hurricane Ida > More

President Joe Biden met with Big Tech executives at IBM, Google, and Amazon, about cyberattacks > More

Contactless Security Scanners Arrive at Disneyland Resort Parking Structures > More

Researchers, cybersecurity agency urge action by Microsoft cloud database users > More

Microsoft, Google to Invest $30 Billion in Cybersecurity Over Next 5 Years > More

Afghan situation raises new security questions > More

T-Mobile Hacker Who Stole Data on 50 Million Customers: ‘Their Security Is Awful’ > More

New Taliban head of security for Kabul is wanted by U.S. as terrorist > More

JPMorgan Chase Bank Notifies Customers of Data Exposure > More

Biden’s national security adviser Jake Sullivan warned about threats to the U.S. evacuations efforts in Kabul > More

U.S. and Singapore discuss cybersecurity, climate change and COVID as Vice President Harris visits region > More

Hackers Stole Over $90M From Japan's Liquid Crypto Exchange > More

Cybersecurity creators have a TikTok problem > More

Organizations around the world experience a jump in cyberattacks > More

The most important cybersecurity measures for HR > More

WARNING: Microsoft Exchange Under Attack With ProxyShell Flaws > More

Data of three million elderly citizens exposed in cloud security oversight > More

Facebook’s former security chief weighs in on Apple child protection controversy > More

US ports receive nearly $30m in security grants > More

74% believe threat detection is the biggest security challenge for digital transformation > More

DHS’ Rigid Security Protocols Contributed to Inadequate Jan. 6 Response, GAO Says > More

Church leaders gather for security training > More

Global response needed to counter rising security threats at sea > More

Biden's border problem: A perfect storm for national security and local communities > More

Tokyo Olympics see 1st cluster of COVID-19 infections > More



Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.