home

Breaking News:

Lenovo Watch X was riddled with security bugs, researcher says More

Microsoft and Google expand security tools to political parties in Canada, Europe More

Cyber Security Risk in Retail and How to Handle It More

Android's Real Security Problem is the Manufacturers More

Microsoft: 70 percent of all security bugs are memory safety issues More

How criminals use Uber and Airbnb to launder money stolen from your credit card More

A Hackers Take On Blockchain Security More

Nest Turns Its Security System Into a Google Home Speaker More

February security patch rolling out to Google Pixel, factory images and OTAs live More

How Fintech Companies Are Failing To Help Millennials With Financial Security More

Facebook takes down hundreds of fake pages from Iran More

Cyber Security: Business and government team up in the fight More

This Startup Is Fixing The Biggest Security Hole In Bitcoin Exchanges More

The NFL, not the federal government, should pay for Super Bowl security More

Singtel to develop cyber security solutions for self-driving vehicles with international partner More

LocalBitcoins blames security breach on forum 'third-party software More

To Sell Europe on Cyber Security, IBM Turns to Big Rig Operations Center More

Trump's border-security-inspired shutdown just caused cancellation of a border security conference More

Did Australia Hurt Phone Security Around the World? More

Security researchers take down 100,000 malware sites over the last ten months More

Super Bowl security stepping up inside and outside stadium More

The most dangerous security threats in 2019 More

Facebook let Netflix, Spotify read your private messages More

Major US newspapers crippled by Ryuk ransomware attack More

Apple sees more government requests for user data More

Twitter bug may have been exploited by state-sponsored hackers More

Researchers find over 40,000 stolen logins for government portals More

Finally, a meaningful congressional report on stemming cybersecurity attacks More

House Democrats' first bill has an eye on election security More

Lawmakers propose 7 percent gun fee for added security in schools More

Attacking from inside, cyber crooks rake in millions from banks More

Hackers get into National Republican Congressional Committee's email system More

Huawei CEO defiant on security claims More

Amazon Alexa user asked for his personal recordings, got someone else's More

Hackers Hijack Smart TVs to Promote PewDiePie More

Transport Agency accused of downplaying a "massive" security breach More

These Are the Top 26 National Security Threats Facing America More

10 Cybersecurity Companies To Watch In 2019 More

Hackers hijack thousands of Chromecasts to warn of latest security bug More

China insists detained Canadians 'without a doubt' broke security laws More

Weather app harvests personal data, security experts warn More

Harness the NIST CSF to boost your security and compliance More

EU eyes tougher scrutiny of China cyber security risks More

Computer scientists study security threats to smart homes More

Adobe December 2018 Security Update Fixes Reader, Acrobat More

Marriott breach affects 500 million More

Microsoft's Office 365 MFA security crashes for second time More

Before you buy a gift card, focus on security More

Hackers Breach Dunkin' Donuts Accounts in Credential Stuffing Attack More

Cisco Patches Critical Bug in License Management Tool More

Dell announces security breach More

Amazon 'technical error' exposes undisclosed number of customer names and emails More

Cyber criminals abuse US Postal Service Informed Delivery for ID theft More

Worst malware and threat actors of 2018 so far More

Russian Cozy Bear APT 29 hackers may be impersonating State Department More

What is Transport Layer Security (TLS)? More

Critical Zoom Flaw Lets Hackers Hijack Conference Meetings More

The 'Internet of Things' will cause more security problems in 2019 More

Security on the railway: does collecting personal data have a place? More

Brexit and security: what does the UK stand to lose? More

Iranian hackers charged in the US for SamSam ransomware attacks More

Mexico's Government Will Increase Security at US Border in Tijuana More

Half of all Phishing Sites Now Have the Padlock More

Security Trends Your Company Needs to Embrace in 2019 More

US Postal Service Site Exposed Data on 60 Million Users More

Gmail Glitch Enables Anonymous Messages in Phishing Attacks More

Marc Zuckerberg, Elon Musk and bitcoin top this year's list of Tech Turkeys More

Apple's Tim Cook on tech regulation, former Facebook exec speaks out on security More

Security executives on the move and in the news More

Worst malware and threat actors of 2018 so far More

Israel to provide cyber security to G20 meeting in Buenos Aires More

Beware the IoT spy in your office or home via smart furniture, warns NSA More

Face Scans Are Speeding up Airport Security More

Cylance researchers discover powerful new nation-state APT More

Possible BGP hijacking takes Google down More

Home insecurity: Tips to safeguard security devices More

Thousands of critical energy and water systems exposed online for anyone to exploit More

FBI: Call of Duty gamers helped steal $3.3 million in cryptocurrency hacking scheme More

Security firm says identity of renowned hacker is Russian national More

Midterm Elections Proceed With Flawed Security More

Veracode Acquired by Thoma Bravo and Splits from CA After Broadcom Deal More

Cisco Security Appliance Zero-Day Found Actively Exploited in the Wild More

Keep Cyber Threats from Destroying Your Company More

Dozens of Spies Killed Thanks to Flawed CIA Comms More

Over 80,000 Facebook User Accounts Compromised More

Don't miss the AMAG Webinar Series More

Passwords: Here to Stay, Despite Smart Alternatives? More

What is WPA3? And some gotchas to watch out for in this Wi-Fi security upgrade More

Cyberinc - Remote Browser Isolation - Reduce attack surface & raise IT productivity More

Georgia Governor's Race Awash in Election Security Issue More

Wipro partners with Check Point for cyber security solutions More

How to use the Shodan search engine to secure an enterprise's internet presence More

Identiv Completes Acquisition of Thursby Software More

VOTI DETECTION Announces the Launch of a Powerful Compact Table Top 3D Perspective X-ray Security Scanner More

Apple Fixes Multiple macOS, iOS Bugs Including a Quirky FaceTime Vulnerability More

Don't Take the Bait. Phishing is big business. Don't get hooked. More

Radisson Hotel Group Spills Customer Data More

Square, PayPal POS Hardware Open to Multiple Attack Vectors More

What is a firewall? How they work and all about next-generation firewalls More

ImageWare Announces Innovative 2FA and Biometric Security Solution with ForgeRock Identity Platform More

Fujitsu Provides MedClick Medication Adherence Solution to Monitor Complex Patient Medication Regimens in Real-Time More

US Still Hasn't Finalized MidTerm Election Security Plans More

iPhone a Growing Target of Crypto-Mining Attacks More

Google frustrates senators over China, Twitter scrutinized over user tracking More

Many government agencies miss email security deadline More

Up to 35 Million 2018 Voter Records For Sale on Hacking Forum More

Microsoft's Nadella: We want our tech to be used for good More

Preventing the 'Big Hack' More

Major Korean Financial Holding Company Wins Blockchain Patent More

TSA outlines plans to expand facial recognition use on domestic flights More

Stolen Apple IDs used in string of digital payment thefts in China, says report More

PA House panel holds hearing on election security More

Global Payment Companies Test Data Security Readiness More

Tech Support Scams Decline as Consumers Get Savvy More

'Golden passports' threaten European security, warns EU commissioner More

3 teens arrested in security breach at Wisconsin Guard unit More

Endpoint Attacks Increase as Patching Slows More

Feds spending millions to beef up security at Confederate monuments More

The New Shared Responsibility Model For Cloud Security More

6 Security Trends for 2018/2019 More

NotPetya Linked to Industroyer Attack on Ukraine Energy Grid More

Enhancing European security by strengthening transatlantic ties More

Hunt for Red Bugtober: US military's weapon systems riddled with potential flaws More

UK is at risk from a huge cyber security attack More

Google+ Privacy Snafu Leaves a Cloud Over the Tech Landscape More

Google Promises Chrome Updates after Sign In Synchronization Snafu More

Security executives on the move and in the news More

Uber to pay $148 million to settle data breach cover-up with U.S. states More

'Serious Cybersecurity Incident' Hits Port of San Diego More

The Crisis of Election Security More

Businesses in Arkansas Hit with Ransomware More

5 Solutions To The Major Obstacle To Financial Security More

At UN, Pacific Island leaders warn climate change poses dire security threat More

SEC fines Voya $1M for cybersecurity failures More

How cybersecurity will evolve in a 5G connected world More

Apple 'Security Loophole' Exposes Business Wi-Fi Passwords More

Publicizing a firm's security levels may strengthen security over time More

ForeScout Named Overall IoT Security Solution Provider of the Year More

10 Tactics For Teaching Cybersecurity Best Practices To Your Whole Company More

Senate Committee Approves Several Cybersecurity Bills More

The Importance of Cybersecurity in Modern Video Surveillance Environments More

Edge computing is the place to address a host of IoT security concerns More

Russian cybersecurity firm drew rare grid warning More

A CTO guide: Cyber security best practice tips More

Cybersecurity Stressed as Key to Robust Energy Sector More

Cyber attacks cost German industry almost $50 billion: study More

Mobile Fraud Soars 24% Year-on-Year More

State Department is failing at basic cybersecurity standards More

What can AMAG's RISK360 do for you? Check out these Resources! More

ImageWare Systems Closes $8.9 Million Preferred Stock Private Placement and Approximately $6.9 Million Debt Conversion into Equity More

7 Ways Blockchain is Being Used for Security More

The Isla Malware Isolation appliance family delivers uncompromising protection in an easy to use, easy to deploy and easy to manage package. Appliances are available in a range of configurations supporting between 90 and 1800 concurrent users enabling you to easily scale the solution to your needs. More

Most US Orgs Had IT Disruption in Last 12 Months More

Flaws Found in Fuji Electric Tool That Links Corporate PCs to ICS More

SAP Patches Critical Vulnerability in Business Client More

Next Generation Cyber Security Market Report 2018-2028 More

China-linked Hackers Use Signed Network Filtering Driver in Recent Attacks More

The front line: Microsoft UK CTO on tackling cyber security More

Trend Micro, HITRUST Launch New Cyber Risk Management Firm Cysiv More

Threatlist: Email Attacks Surge, Targeting Execs More

FINRA takes down an unregistered cryptocurrency security More

Feeling the Pulse of Cyber Security in Healthcare More

Cyber security threats against small businesses on the rise in 2018 More

VOTI Detection XR3D Series 5 security scanners deployed at the ASIAN GAMES 2018 in Jakarta More

New Zero-Day Vulnerability for Windows Tweeted, Immediately Exploited More

Security Think Tank: Four key steps to managing software vulnerabilities More

First IoT security bill reaches governor's desk in California More

Finding the Middle Ground: Securing Smart Cities More

Dangerous New ATM Fraud Scheme Attacks Dual Fronts Simultaneously More

How GDPR is Unintentionally Driving the Next Decade of Technology More

IT Security Pros Lay Bare Election Hacking Fears More

IBM - Malicious Email Payloads Increased in Volume and Diversity in Q2 2018 More

Google Tracks Your Movements, Like It or Not More

10 Threats Lurking on the Dark Web More

Critical Bug Opens Millions of HP OfficeJet Printers to Attack More

Beware the Fax Machine: Some Hackers Target Old Gadgets More

ImageWare Reports 2Q 2018 Results - Revenue Increased 78% More

The Enigma of AI & Cybersecurity More

#DEFCON Government Attacks and Surveillance Continue to Increase More

Ransomware Strikes Computer Servers Of Golfers’ Association More

Election Security Becomes A Political Issue In Georgia Governor's Race More

Smart Irrigation Systems Expose Water Utilities to Attacks More

SURPRISE, THE FCC LIED ABOUT THAT DDOS ATTACK More

Identiv 2Q 2018 Results - 37% Growth, Strength Across all Segments, Market Share Gains More

ImageWare Systems Extends Global Reach into Japanese Market with TwoFive, Inc. Partnership More

FireEye White Paper - Security Beaches Are Inevitable ! More

19 HOT security stories in August! More

VOTI Inc. completes previously announced private placements for gross proceeds of approximately $11.8 million More

Critical Vulnerability Patched in Oracle Database More

ImageWare sales to Canadian financial institution, Philadelphia-based credit union and a New York-based financial services company. More

Trump Dismisses Russian Interference Indictments in Presser with Putin More

"Red Alert" Warning on US Cyber-Attacks, Now at "Critical Point" More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsRobert R. Ackerman, Jr.
Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed. More


security stock solutionsAndrew Schonzeit
President
Idesco

Implementing a successful ID card program can be overwhelming and there is usually a lot more involved than just buying a card printer. Customers choose Idesco because they can come to us with any ID project and we can spec it in record time and provide them with all the products and services that they need. From ID card printers, printer supplies and badge accessories to any type of technology cards, we got it all. We also have a team of technicians who provide unparalleled support for everything that we sell. Our expertise allows us to assist each customer with their unique needs and we are here to help at all times. For example, we work with many schools, colleges and universities that rely on us to provide them with the best card printers and technology cards to issue student IDs, staff IDs and visitor badges on demand in the most effective and secure way. We also work with healthcare facilities that need to have their ID card system running at all times and rely on us to answer any questions or fix any issues that they may have in a timely manner. Government agencies need the most secure and durable ID card solutions and trust us to deliver them and keep them up-to-date on the latest technology. We always want to bring true value to our clients and that's what we focus on. More


security stock solutionsBruce K. Taragin
Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise. More


security stock solutionsKurt Takahashi
President
AMAG Technology

For the past few years, AMAG Technology has been transforming into a total unified solution provider that provides open solutions. Our history shows we've been known as primarily an access control company with a proprietary system, and our older panels support that statement. But that is no longer correct. About three years ago, we released Symmetry CONNECT. Symmetry CONNECT is a policy-based identity management platform that helps organizations of all sizes to manage the identities of their employees, visitors and contractors and requests, recertification, audits and compliance. This was a turning point product for us, and one that set us on a new course. Today, other access control companies refuse to provide their API to Symmetry CONNECT to interoperate. However, PLAI will allow CONNECT to inter-operate to those companies who want to be open.

This affordable, open platform operates in the cloud and helps companies with onboarding, offboarding, access Our next release was Symmetry GUEST, our web-based visitor management system, which automates how organizations manage visitors. This open platform provides an audit trail to track all visitors, meet compliance and improve a visitor's overall experience. The GUEST API is available to any company that would like their solution to inter-operate. Our brand new Symmetry M4000 panel uses an onboard Linux operating system with an open API. Linux is an open-source software operating system. Any company is able to integrate their access control software solution to the M4000. Our Symmetry CompleteView Video Management System has always been open. It operates with countless camera manufacturers and access control systems, including AMAG's Symmetry Access Control system. More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

With data breaches happening every day and causing damage to your brand, tangible economic loss, and termination of employment for executive management charged with oversight, enhancing security without compromising user experience is a priority for today’s organizations. Multi-modal biometrics for user authentication handles this requirement and that’s what ImageWare does. We have invested substantial time and effort into making the implementation of biometric security simple, quick, and cost-efficient.  Being a pioneer in biometrics, with several decades of experience, ImageWare has built its brand through deployments in law enforcement applications, later migrating to secure biometric credentialing, and more recently, to authentication in the cloud using smart mobile devices. At the heart of all of our product offerings is the patented IWS Biometric Engine® (BE), which provides an ultra-scalable, real-time, multi-modal biometric enrollment and matching database specifically built for biometrics. The BE supports a dozen different biometric modalities today and adding new modalities is simple and straight forward. As we say, “we secure your future,” meaning that we not only satisfy your current security requirements, but we also secure your investment as new biometric technology becomes available.  We treat biometrics as “plug and play,” so you can take advantage of new advancements with no loss to your current investment. More


security stock solutionsCristina Gillaspie
Founder
CloudShyft

I can't stress enough the importance of securing your data in the Cloud. In DoD and the Federal Government, cloud solutions must comply with minimum cybersecurity standards that are described in NIST Guidelines. The advantage and disadvantage of this guidance is its flexibility. The guidance lists goals, however demonstrably achieving those goals is up to the individual system owner. This gets even more complicated with the type of data stored. For instance, health institutions have HIPAA; there is a multitude of rules for protecting personally identifiable information(PII)and, of course, different levels of data classification. If leveraged properly Commercial Cloud solutions can flexibly and cost-effectively enhance the security posture of the organization by taking advantage of technologies that would be excessively prohibitive to deploy for any but the largest groups, taking advantage of Commercial Cloud provides additional means to protect data, enhance your access control, accountability, identification and authentication, system and communications and more. The problem with the flexibility is that there are many ways to solve for security controls and matching the solution to the organization's mission is CloudShyft's primary focus. More


security stock solutionsSteve Visconti
President & Chief Executive Officer
Xiid

Xiid.IM Identity Access Management is based on Xiid's unique and patent-pending SealedChannel, which greatly minimizes the attack surface in comparison to any other identity management solution available today. Unlike all competitors, our technology cannot be broken into, simply because there is no way for attackers outside your network to reach the authentication agent, nor any way to even try to directly attack your Active Directory / LDAP servers. In SealedChannel's reverse approach, the authentication agent is the active component that connects outbound, creates a twice-encrypted and twice-signed channel, and retains full authority over which authentication requests are pulled in and handled. We also developed an identity masking feature which allows you to log into your web app with an anonymous name utilizing your real identity against your on-premise directory without compromising that directory. If a SaaS or cloud service provider really wants to protect the clients identitiy, they will use our One-time-ID solution (OTID). OTID sends only a one-time-code which replaces both the User ID and the Password thus giving the ultimate identity protection. More


security stock solutionsKevin Neal
President & Chief Executive Officer
P3iD Technologies

The very nature of the document imaging business these days, is almost always hybrid environments. Simply because there is a physical document scanner, which is on-premise, connected to a chosen cloud service. And since scanning documents often involves confidential company data or even regulated data, P3iD chose to partner with a company that offered the highest levels of security for hybrid environments, and Xiid fit this requirement perfectly. The first integrated solution we have developed with Xiid is P3iD DoxaScan using the Xiid Identity Management (Xiid.IM) technology which our customers absolutely love.

P3iD feels this is merely the starting point in working with Xiid to take many of our proven traditional imaging technologies and deliver them as secure cloud services with the realization of perfect forward secrecy networks. We are engaged in many areas where Xiid's current, as well as future technologies, can be of high interest including encryption, blockchain, secure API and, of course, secure-channel communication protocols. It's imperative to have a go-to partner such as Xiid that is so knowledgeable in so many areas regarding cybersecurity. More


security stock solutionsManfred Mueller
Chief Operating Officer
Identiv

Our transponders are powering the IoT. We're dominating the NFC and mobility space, access and transport, events and leisure, library applications, gaming and vending, loyalty and payments, strong authentication, and health and pharma. Specializing in custom design, our tag portfolio covers anything and everything our customers can dream up. That includes HF and UHF inlays, standard and Tag on Metal labels, tickets for transportation, ski lifts, events, and more, tokens for transit and asset tracking, and library labels for books, CDs, DVDs, and tablets. We build miniaturized labels for cosmetics and pharmaceuticals, giant NFC transponders, NFC stickers for mobile devices, and our uTrust Sense Temperature Tracker tracks the temperature of practically anything. More


security stock solutionsHoward Johnson
Chief Operating Officer
AMAG Technology

We are close to completing the transition from being a product-led business to a solutions-led business. The breadth and sophistication of the product set we have is becoming difficult for the traditional integrator to communicate to their user base. Increasingly, the product manufacturer needs to be involved in selling the solution to ensure the requirements are met and the value proposition is fully explained.

We are finding complementary markets for our products where integration opportunities are helping companies with different aspects of their businesses. For example, intrusion integration, fire integration, BMS, space management and heat and light are all part of security. Our Symmetry products can integrate with these solutions and help users meet compliance, mitigate risk and save money. Our long-term strategy remains the same: to be a long-term valued partner and provide continuous value to our customers. More


security stock solutionsDov Yoran
Sr. Director, Strategy & Business Development
Security Business Group
Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers. More


security stock solutionsSteven Humphreys
Chief Executive Officer
Identiv

SecuritySolutionsWatch.com: Thank you for joining us today, Steve. One will read at Identiv.com, that “ Identiv’s mission is to secure access to the connected physical world: from perimeter to desktop access, and from the world of physical things to the Internet of Everything.“ Seems to us that significant traction has been achieved with one (1) billion transponders deployed, 5,000 customers, $500 million of equipment in the field, 400 hundred partners. Impressive metrics, indeed! Care to elaborate? Steve Humphreys: Absolutely… and thanks so much for inviting me to tell Identiv’s story. I think we’re all familiar with the convenience of the digital world — the world where Netflix knows what you want to watch next and Amazon knows what you're going to buy next. Identiv’s vision is to bring the benefits of the digital world to the physical world. We have a variety of products and go-to-market strategies that are putting us in a leading position to deliver those benefits. We see a major market opportunity as the physical world goes online, and we want to be the leading platform to get there. That's a big statement to make for a small company, but as you pointed out with those metrics, we’re in a great position to do just that. More


security stock solutionsJason Bradlee
Head Of Security
Fujitsu Americas

Our co-creation approach is strategic and ensures we develop the right partnerships and expertise that will enable us to deliver transformational outcomes. We select our partners carefully using this methodology. Organizations are adopting various types of authentication to achieve the right mix of security, privacy and a differentiated user experience. Our partnership with ImageWare allows us to expand our Identity and Access Management offerings to provide our customers with more multi-factor authentication technologies. Jim Miller, Chairman and CEO of ImageWare Systems, said, "Biometrics are not only the most secure form of authentication, but are also the easiest to use - as each user is his or her own password. By taking advantage of our powerful biometrics solutions delivered via Fujitsu's cloud-based security as a service, many more businesses can easily enhance their security. This agreement further extends our marketing and sales activities with Fujitsu to new regions en route to a truly global offering. Fujitsu's global capability extends the reach of ImageWare's patented, multimodal biometric technology as a core element of Fujitsu's cyber security portfolio across the globe." More


security stock solutionsGraham Porter
Business Development Director EMEA
Dell EMC
Surveillance and Security

The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. More


security stock solutionsMr. Tom Kellermann
Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.More


security stock solutionsMr. Joseph Grillo
Founder and CEO
ACRE

The access control and intrusion market is still a fragmented landscape, so yes, I think consolidation will continue to make its impact on the industry. Mobile credentialing seems to be a hot topic for the industry, along with the continued focus on cloud-based technologies. The demand for these solutions comes from customers wanting new levels of security and convenience while protecting critical data. With regards to mobile credentials, however, there's still a lot that needs to be done to develop this technology further, and as a result, many companies are choosing to implement hybrid solutions that offer mobile as an option. Another trend we will continue to see is a greater focus on integrated solutions; more video tied into access control, for example. We'll also see the increased use and installation of wireless locks to more doors as a means to reduce cost.More


security stock solutionsMr. John S. Shegerian
Executive Chairman
ERI

Be it a government official’s laptop, a family smartphone or a business tablet, technology today is far too vulnerable to criminal attacks. Our personal privacy, businesses’ proprietary information and even data pertinent to our national security are at stake. The key is for everyone to remember to safely recycle all old and unwanted items at the end of their lifecycles with a trusted recycling company. This final step in the life of an electronic device is now more important than ever.More


security stock solutionsMr. Ken Mills
General Manager
DELL EMC
IoT and Surveillance


Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe... More


security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More