home

Breaking News:

California to require anti-theft 'kill switches' on smartphones. More

Radware's DDoS Protection and Attack Mitigation Service Selected by Colombia National Police to Help Mitigate Cyber Attacks to Its Network. More

General Dynamics Awarded Contract to Implement Massachusetts Statewide Next-Generation 9-1-1 System. More

Lockheed Martin seeks to clean up space junk. More

UPS Stores Hit by Cyber Attack, Customer Data Compromised. More

HP Delivers Services to Help Enterprises Accelerate the Benefits of Big Data and Analytics. More

Taser Could Be In-Class Leader Following Lethal Shooting In Ferguson. More

Nuance PowerShare Network Achieves Industry-First Milestone, Sharing 3 Billion Medical Images via the Cloud. More

Smart Business Cards Transform Into USB Drives. More

NICE is Once Again the Leader in Speech Analytics. More

How to Quit Facebook, and Other Questions About Fighting Tracking. More

Financial Institutions Are Moving To The Cloud. More

Fresno Police Department Expands Body-Worn Camera Program With Purchase of 100 Cameras From TASER. More

Diebold Global Software Strategy. More

Foreign security vendors can no longer bid for Chinese government contracts. More

An Upcoming iPhone Feature From Apple Will Completely Transform How You Use Apps. More

ManTech Awarded Order for Worldwide U.S. Army Command. More

Leading North American Financial Institution Selects Sapiens DECISION. More

Why Microsoft is becoming a cloud computing competitor. More

Apple-Visa May Partner for Mobile Payments. More

Raytheon to Showcase Broad Cyber Product Portfolio. More

The Boston Globe Selects LoJack. More

HP's Luxury Smartwatch. More

Intellicheck Mobilisa Wins Contract To Provide ID Card Readers to Washington State Ferries More

Oracle Customers Plug Into the Cloud With Oracle Database 12c. More

New Infrared iPhone 5 Case Lets You See Through Walls. More

Gemalto bundles secure file sharing and access management to offer all-in-one Identity cloud solution. More

Unisys Wins Applications Managed Services Contract from Aena Navegacion Aerea. More

Microsoft and Akamai join forces in first cybersecurity-focused accelerator in Israel. More

Facebook Plan to Monitor User Web Browsing Rouses Alarm. More

U.S Department of Treasury Awards Accenture $48 Million Contract for IT. More

Garmin Enhances Connext with Wireless Cockpit Connectivity to Mobile Devices. More

BIO-key and Experian Collaborate to Offer Enhanced ID Verification. More

Nuance Unveils Dragon NaturallySpeaking 13. More

RSA Web Threat Detection Adds Enhanced Visibility & Analytics; Takes on Mobile Fraud. More

Raytheon Builds a Fleet of Decoy Robots for the U.S. Air Force. More

Versar Awarded Iraq Personal Services II Contract From U.S. Army Corps of Engineers. More

Largest New York Real Estate Development Selects AMAG Technology’s Symmetry™ Enterprise Security Management System. More

Apple and IBM Forge Global Partnership to Transform Enterprise Mobility. More

Will Home Depot, Amazon, Or Dell, Launch The 3D Printer Revolution? More

Oracle Marketing Cloud Expands the Industry's Most Comprehensive Marketing Technology Ecosystem. More

StrikeForce Adds Logical Source, Inc. as a New Distributor of Its Products. More

Trend Micro Announces Comprehensive Security Capabilities for Microsoft Office 365 Customers. More

Honeywell's Spectra Shield® Ballistic Material To Provide Ballistic Protection For Next-Generation Law Enforcement And Military Body Armor. More

Novartis Joins With Google to Develop Contact Lens to Monitor Blood Sugar. More

CVS Caremark and IBM Announce the "Technology Solutions for Smarter Health" Program. More

10 Things In Tech You Need To Know Today. More

Radware's Attack Mitigation Device Extends Common Criteria Certification Through Laboratory Testing. More

Here's A Great Explanation Of The 'Big Data' Phenom In 8 Words. More

Apple loses Siri voice recognition case in China. More

Oracle Helps dunnhumby Transform Its Global Processes via the Cloud. More

Google Cloud Storage offering 2 TB of free storage through Panzura to compete with Amazon, Microsoft. More

Oshkosh Defense’s JLTV Solution Completes “Net-Ready” Testing. More

Unisys Cited as a Leader in Independent Research Firm's Report on ITSM Implementation Services Provider. More

Security Firm Described Simulation as Real Hack. More

H-P Printers Selected by US Air Force. More

Kratos Receives $32 Million in National Security Program Awards. More

Unisys Delivers New Basic Provision Biometrics Solution to Dutch Custodial Institutions Service. More

HP Wins $147M Medicaid Contract in Delaware. More

Veterans Affairs Selects ASM Research to Modernize Electronic Health Records. More

Black & Decker recalls 108,000 routers because of shock risk. More

Three Serious Takeover Candidates in Data Security. More

CAE wins defense contracts valued at approximately $110 million. More

Security Concerns Put IBM / Lenovo x86 Server Deal In Limbo. More

Raytheon Secures a Flurry of DoD Deals. More

ImageWare Systems Awarded $1.0 Million Contract to Implement Multi-Modal Biometric Driver License System for State of Baja California. More

Google is Taking on AT&T and Preparing to Take Over Your Home. More

Glucose-Monitoring iWatch May Give Apple a Sweet Lead in Wearables. More

Oracle Agrees to Buy Micros Systems for $5.3 Billion. More

I.D. Systems Receives $500,000 Order From Railroad to Track Intermodal Containers. More

Hackers Find New Ways to Breach Computer Security More

Cyberattack on Hong Kong Vote Was Among Largest Ever More

Hackers Take Down World Cup Site in Brazil More

iHeartRadio crosses 50 million users in 3 years. More

March Networks Announces High-Performance 6700 Series Hybrid NVR Platform and Edge 4e Encoder More

IBM Builds a Cloud Ecosystem in Egypt with New Technology and Skills. More

OSI Systems announced $10 mln order from international customer to provide multiple units of its Rapiscan Eagle M60 mobile high energy X-ray cargo and vehicle inspection system. More

CA Technologies Redefines SaaS-based IT Service Management. More

StrikeForce Technologies is Awarded a Second Patent for its Keystroke Encryption Technology. More

Pentagon Awards $145 Million in Defense Contracts. More

NICE Actimize Anti-Money Laundering Poll Finds Only 48 Percent of Financial Institution Respondents Believe They Have a Strong Culture of Compliance. More

TRC Awarded Storm Hardening Contract by Public Service of New Hampshire. More

Microsoft Partners With Chinese Internet Security Company Qihoo 360. More

Fidelis XPS Extends YARA-powered Capabilities to Enhance Real-time Malware Command and Control Prevention. More

Diebold's Self-Service Solutions Drive The Family Credit Union's New 'Smart Branch'. More

ACI Worldwide Powers Online and Mobile Banking for Pearl Harbor Federal Credit Union. More

NICE Introduces New Text-to-911 Logging Solution for Next Gen Emergency Communications Worldwide. More

Honeywell Challenges Google's Nest With A New Smart Thermostat That Responds To Your Phone's Location. More

Mace Security International Reports Pepper Spray Saves Lives in Seattle School Shooting. More

Apple's New Plan for iPhones. More

Flaircomm selects Gemalto to provide secure M2M solution for car manufacturers in China. More

Facebook Buying Mobile-Data Company Pryte. More

Bitcoin: Coming Soon to an iPhone Near You. More

Intel’s thin tablet shows off smaller new chip: Look Ma, no fans! More

Lockheed Martin Defeats Raytheon to Win $915 Million Air Force Space Fence Contract. More

Northrop Grumman Wins Three Defense Contracts. More

SEC not to recommend action against IBM on cloud revenue. More

Zix CEO Breaks Down The Email Encryption Business. More

Is Facebook Getting a Little Too “Big Brother?” More

Apple Knows That Home Is Where the Smart Is. More

Zurich Insurance PLC Expands Use of Accenture’s Software to Rapidly Deploy Products and Improve Customer Service. More

SanDisk introduces storage solution for tablet, smartphone market in China. More

Law enforcement and the use of body cameras. More

LoJack names its 10 most stolen cars. More

Security Industry Fights Surveillance State with Words. More

VASCO to expand portfolio with Risk IDS acquisition. More

Apple Point-of-Sale Upgrade Signals Better Security. More

China Bans Windows 8 From Government PCs. More

Why the cloud needs to clean up its act. More

Alcatel Creates Israel Bell Labs Center to Bolster Cloud Effort. More

T-Mobile taps Walmart to sell low-cost 4G tablets with limited free service. More

IBM Shows Robust Growth In Cloud. More

Compliance Software Helps Meet Regulatory Demands. More

Relationships with IBM, Fujitsu, T-Systems and others representing just the tip of the iceberg for ImageWare. More

Cloud Growth Is a Game Changer for SanDisk. More

OSI Systems receives $15M order for cargo, vehicle inspection systems. More

Hope For Military Spending Growth Boosts Boeing and United Technologies. More

HP Launches HP Helion Portfolio of Cloud Products and Services. More

AT&T and Verizon received one government data request per minute last year. More

Gemalto's Olivier Piou on Secure Credit Card Technology. More

Microsoft Holds Business Software Market Share Lead. More

EMC buys secret chip maker DSSD. More

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal. More

Target CEO resigns as fallout from data breach continues. More

ImageWare(R) Systems Brings IDaaS to the IBM Cloud Platform. More

AT&T, Honeywell to challenge Gogo's airborne Web business. More

General Dynamics secures $17.65 billion contract. More

Why Are IBM and Microsoft Soaring? More

Homeland Security struggles to tempt, retain cyber talent. More

Why 'Smart' Guns Won't Transform the U.S. Firearm Industry. More

Europe’s Antitrust Chief Censures Google’s Motorola Mobility. More

AOL confirms security breach; users' passwords, address books exposed. More

Aol Mail Hacked With Spoofed Accounts Sending Spam. More

Apple vs. Samsung: Smartphone rivals billions apart in value of patent feud. More

Feds consider long-term HealthCare.gov contractor. More

AT&T Goes After Google With Plans to Bring Gigabit Broadband to 21 New Cities. More

Cloud Storage Wars Could Favor the Little Guys. More

Comtech Telecom receives $3.1 mln satellite modem order from government systems integrator. More

Australia's GE Money warns customers of 'Heartbleed' bug. More

Cloud infrastructure business seen as three-horse race. More





Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Matt Barnette
President
AMAG Technology
www.amag.com

We are thrilled to be a part of the Hudson Yards project so early on in the process.  This project when finished will be the largest real estate development in Manhattan since Rockefeller Center.  Five office towers, 5,000 residences, 100 shops, 20 restaurants, and 14 acres of public space will reside over Hudson Yards, taking up six city blocks.  Symmetry will be installed in the first tower, which is being built now.   Bank of America will be installing AMAG’s Symmetry OneFacility cloud solution, SymmetryCONNECT that will tie the banks disparate security systems together.  The overlay delivers one dashboard so security personnel only have to learn one security system and use one set of data.  As the bank upgrades, it will install AMAG’s Symmetry SR Retrofit solution, saving the bank thousands of dollars on hardware. Yale University has also chosen the Symmetry SR Retrofit solution.  The three to five year project will include new installations, as well as retrofit upgrades to replace its legacy Casi Rusco security system.  Evans Hall, home to the School of Management, was the first building integrated into Yale’s new security system. The new Symmetry system will manage 120 proximity card readers and 100 cameras to serve 16 classrooms, 22 breakout rooms, three library spaces, 13 interview rooms and office space for roughly 120 faculty and 195 staff. Approximately 7,000 doors will be converted to Symmetry when the project is completed. More


security stock solutionsMs. Diana Zavala
Director, Analytics and Data Management
HP Enterprise Services, U.S. Public Sector

Today, information is complex, available in real time and mostly unstructured. An enterprise must have the ability to analyze unstructured and structured information in order to gain deeper insights. Modernizing traditional business intelligence platforms by adding the ability to process unstructured or “human” information—social media, email, voice, video, documents, archives, etc.—provides an added layer of intelligence. In addition, an enterprise needs to consider its ability to embed analytics into business processes to streamline actions. This might entail pairing together social media information with identity access information in order to form conceptual analytics around possible insider threats or to help form a decision on maintaining security clearances. HAVEn is an acronym for our industry-leading Big Data platform.–A compilation of the Hadoop, Autonomy, Vertica and Enterprise security engines, which enable “n” (number) of applications, HP HAVEn is an open, scalable solution that provides the ability to manage, transform and analyze the full spectrum of structured, semi-structured and unstructured data  More


security stock solutionsMr. Martin Heisig
Senior Vice President
Cloud and Infrastructure Delivery
SAP SE
www.SAP.com

The mega trends real-time platforms, big data, cloud, enterprise mobility as well as social media continue to enable completely new business scenarios. In a tectonic shift, we witness how our most innovative customers reinvent their business models and processes by using in-memory technology, like SAP HANA. The world goes real-time across entire industries and in the private space. As head of the HANA Enterprise Cloud delivery function, I foresee that more and more companies will move to the cloud, and that we will see a leap in software, infrastructure and platform as services. Customers have existing environments and want to add Cloud solutions to that. So, the reality for most of these companies is a hybrid Cloud environment. Or they move their enterprise systems into private Clouds, for example the HANA Enterprise Cloud. Security and process integration will continue to be big issues, and this is something at which SAP excels. Whatever the strategy, CIOs have to address both agility for the business and cost. The Cloud is a major factor in this equation. More


security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
www.noknok.com

Founding Member
Fido Alliance
www.fidoalliance.org

Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We’re at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.  More


security stock solutionsMr. George Romas
Technical Director
Cybersecurity Solutions Group
HP Enterprise Services U.S. Public Sector

IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house.   More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

We see our relationships with IBM, Fujitsu, T-Systems and others
representing just the tip of the iceberg in terms of our opportunities in the commercial and consumer marketplaces. All of these partnerships are progressing well, and although they have not yet produced revenue, there is every indication that the steps we have been taking are building shareholder value and will ultimately provide a steady stream of recurring revenue. More


security stock solutionsMr. Michael D. Day
IBM Distinguished Engineer
Virtualization and Linux

www.ibm.com

None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades.. More


security stock solutionsMr. John Felker
Director, Cyber and Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don’t simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.  More



security stock solutionsMs. Jody Ross
Vice President of Business Development
AMAG Technology, Inc
www.AMAG.com

AMAG’s Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for.  The GUI is similar to Microsoft’s so it’s familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options.  Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team’s response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications. . More


security stock solutionsMr. Rob Wigley
Director, Cybersecurity Consulting Services
HP Enterprise Services, U.S. Public Sector

Without question, adversaries have become smarter, better organized, and more persistent as they seek to cause disruptions and access intellectual property and other sensitive information. The number of cyber threats is proliferating faster than many organizations can defend. Many companies and global governments have been subjected to some very sophisticated and targeted attacks, which have had a significant impact on their mission. This includes some recent extremely high-profile breaches conducted by insiders. In order to address these threats, first and foremost an organization needs to have an effective risk management program supported by senior management, with a strong governance structure, and integrated across all business processes. As businesses look for new growth opportunities and consequently adopt new technologies, the tradeoff becomes uncertainty and risk that could affect their mission and goals. A continuous process of risk management activities should be applied to identify new risks, reassess previously identified risks, and monitor and track the effectiveness of risk mitigation plans. . More




security stock solutionsMr. Net Payne
Chief Marketing Officer
March Networks
An Infinova Company
www.MarchNetworks.com

March Networks is ranked the #1 provider of enterprise digital video recorders (DVRs) in the Americas, as well as the #1 supplier of video surveillance equipment to the Americas’ banking market (IHS Inc., formerly IMS Research).  While our video surveillance solutions can be used in a variety of industries and applications, we focus in particular on providing the financial and retail markets with integrated solutions that help them increase profits and realize faster returns on their technology investments. We are also a leader in providing mobile video surveillance solutions to bus and light rail transit authorities. . More


security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.
www.strikeforcetech.com

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More


security stock solutionsMr. Danish Thanvi
CEO & President
Xcluesiv Cloud Technology Pte Ltd
www.xcluesiv.com

Xcluesiv is the Alliance partner of Zoho.com and Google Apps in Singapore. Both of them are world leaders in Cloud-Based Solutions, so Xcluesiv provides a perfect combination of 360 degree solution for small and midsize businesses to quickly adopt integrated cloud based ERP tools (CRM, HRM, recruitment, accounting, collaboration etc) and thus save a lot of money and time.  These solutions are secure and redundant, accessible from anywhere and from any device; this enhances the business potential tremendously. Interestingly, the Singapore government is aggressively pushing for the adoption and deployment of cloud services in the country." More


security stock solutions Mr. Ryan Skipp
T-Systems International GMBH
Portfolio & Solution Design - IT

Applications & Portfolio Architecture

www.t-systems.com

T-Systems as an Outsourcing & Service Provider has to provide base infrastructure services which meet the cost and quality expectations that a company transitioning to outsourced services would expect – better than they as an end-user could produce, with better quality, and lower cost!  In order to achieve that, T-Systems was one of the first Outsourcers to produce a “Cloud” platform, based on highly shared leveraged infrastructure, and with a number of pre-defined applications on top of that.  Today we have enhanced that infrastructure, and wrapped the Cloud functionality into it, all the way up to self-service (to application level) for our Private Cloud clients. . More



security stock solutions

Mr. Mark Wood
Product Manager
Cloud Security
Dell SecureWorks
www.secureworks.com

Our purpose-built security platform enables us to filter, correlate and analyze more than 29 billion events across our global customer base every day. We’re also well known for our Counter Threat Unit research team, which includes some of the most experienced security experts in the industry. We use our correlation algorithms and our skilled staff to identify threat activity on customer networks as benign or hostile and to assign a level of severity to the hostile activity. The net is that if we call you, you know it’s worth your immediate attention and if we don’t, you know you can sleep easier. More



security stock solutions

Mr. Jason Waxman
General Manager
Cloud Infrastructure Group
Intel

With cloud infrastructure, servers are typically virtualized and shared across multiple lines of business or even among multiple organizations rather than dedicated to specific lines of business. When IT wants to link multiple cloud data centers together to gain efficiencies—the tools to secure this far-reaching infrastructure are still evolving. This lack of visibility – even in private clouds that are behind a company’s firewall - have people concerned because they no longer have dedicated equipment for their line of business and instead are using shared, multi-tenant resources. This is why 61% of IT that were surveyed are concerned about having less control and visibility over these shared resources, even in a private cloud. Intel and McAfee are working to address these challenges and advance security solutions for cloud services. More