home

Breaking News:

Manchester suicide attack lays bare limits of security measures More

Trump's Cybersecurity Boss Rob Joyce Talks About Mirai and WannaCry. More

AT&T Adds Security Apps For Networks More

Security Expert: Manchester Bomb Designed to Maximize Casualties More

Warning after WannaCry sets off fake BT phishing attack. More

Boston cops reviewing music fest security More

Police in NYC Ramp Up Security After Manchester Blast Kills More than a dozen More

Sophisticated weapon used in Manchester terror attack is 'disturbing' More

DHS monitors Manchester bombing, increases US security More

Apple sees jump in security requests More

We need Israeli-type security to guard against lone wolf terrorists More

Coffee shop Wi-Fi 'most dangerous' of all, warns security report More

What Can be Expected in Trump's Cybersecurity Executive Order? More

Debunking the Deep & Dark Web More

IBM's Watson Taking on Cybersecurity and Health More

Insiders say Trump keeps clashing with his national security adviser More

Fidget Spinners - A Tale Of An Expired Patent More

FBI: Whaling and BEC Scams Rack Up $5bn in Ill-Gotten Gains More

Hackers Beat Two-Factor Authentication to Rob Bank Accounts More

Yahoo Paid Out $2 Million in Bug Bounty Program More

1 Million Gmail Users Impacted by Google Docs Phishing Attack More

Exploitable Details of Intel's 'Apocalyptic' AMT Firmware Vulnerability Disclosed More

Age and Gender Balance Essential in Security Culture More

"Fatboy" Ransomware-as-a-Service Sets Ransom Based on Victim Location More

Many Commercial Drones ‘Insecure by Design’ More

Software Security Stocks That Beat And Guide Higher More

Two-Thirds of Consumers Worry Brands Put Private Data at Risk More

Symantec: Cyber Criminals Demanding Higher Ransoms For Virus Removal More

Chipotle Reports Suspicious Actvity on POS System More

SAP NetWeaver Flaws Allow Attackers Access to Enterprise Websites More

Organizations Fail to Maintain Principle of Least Privilege More

IBM Opens 4 New Cloud Data Centers To Support Demand for Cognitive Capabilities More

Safety in Numbers: Afghanistan Turns to Russia for Security Assistance More

So You Want to Be a Security Rock Star? More

North Korea loses world judo event because of security risk More

Man assaults Silicon Valley security robot More

One in Eight English Adults Have Had Medical Data Stolen More

Unsecured printers a security weak point for many organizations More

ImageWare to Supply Biometric Software for Alaskan Airports More

Symantec’s SSL Certificate May Get Cut Off by Chrome More

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure More

U.S. defense stocks easily outperform the broader market More

One in Five UK Firms Hit by Cyber-Attacks Last Year More

Intercontinental Hotels Suffer Major Card Breach More

Kaspersky Lab Extends Bug Bounty Program More

Critical VMware Flaw Opens Virtual Infrastructures to Attack More

Facebook Live Killer Shot and Killed Himself More

Trump signs repeal of U.S. broadband privacy rules More

Abode's DIY security system has an option for every home More

Kaspersky Links Global Cyber Attacks to North Korea More

Samsung security stumble? S8 reviewer unlocks phone with selfie More

Chinese Hackers Targeted Global Firms Via Supply Chain More

New Disney security changes go into effect More

Honeywell SMX Protects Industrial Sites From USB Threats More

Singapore Airlines Selects ViaSat's Document Management Software for Improved In-flight Safety and Compliance More

Most Users Haven't Changed Social Media Passwords in a Year More

Millions of Stolen US University Email Credentials for Sale on the Dark Web More

Cyberinc partners with OvationData to launch Isla Cloud Malware Isolation to defeat advanced cyber attacks in UK More

There's a Robot Delivery at Your Door More

Cybercriminals Are Building an Army of Things Creating a Tipping Point for Cybersecurity More

Targeted Attacks on Industrial Sector Increasingly Common More

3.7 million Hong Kong voters' personal data stolen More

Tech ban on flights reportedly tied to iPad bomb plot More

1.4 Billion Records Compromised in 2016: Report More

FBI Warns on FTP Attacks to Access Medical, Dental Info More

Apple Patches Hundreds of Vulnerabilities Across Product Lines More

Royal Mint new coin has 'hidden' security feature More

Samir Shah, CEO – Aurionpro in conversation with Bloomberg TV More

Security heightened after deadly London attack More

Cisco Finds Critical Flaw in Industrial Routers More

Arrest In $100 Million Email Scam More

Google Offers Free Security to Election Sites More

Cybersecurity Excellence Award to Gemalto for Best Encryption Product More

SAP Vulnerability Puts Business Data at Risk for Thousands of Companies More

Latest Tax Scams Include Phishing Lures, Malware More

5 Ways CISOs Could Work Better with Their Cyber Insurers More

North Korea Said to Be Target of Inquiry Over $81 Million Cyberheist More

Trump's Russian Connection - Real or Fake News? More

How AI Is Transforming the Workplace More

CIA's Hacking Disclosure Highlights Security Challenges More

China poses security threat in power sector More

The 5 Biggest Challenges to the Driverless Car Revolution More

Google tries to beat AWS at cloud security More

IoT DDoS Reaches Critical Mass More

CIA WikiDump re-enforces old security mantras More

Trump Bump for Defense Companies More

AT&T says service restored after brief 'hardware issue' More

Is Uber App a Privacy Nightmare? More

Intruder Arrested After Scaling White House Security Fence More

WikiLeaks Will Help Tech Companies Fix Security Flaws, Assange Says More

Technology Plays Role in Every Aspect of Crime, Europol Says More

IoT & Liability: How Organizations Can Hold Themselves Accountable More

Frost & Sullivan Recognizes ImageWare Systems with 2017 New Product Innovation Award for Its Innovation in the Biometric Identity Management Market More

Trump Highlights Illegal Immigration as a Security Issue More

Amazon Outage Disrupts ‘Big Part of the Internet’ More

#MWC2017: IoT Adoption Continues to Present Security Challenges More

Boeing Notifies 36,000 Employees Following Breach More

Data from internet-connected teddy bears held ransom More

Extenua has released a new product under the SilverSHielD SFTP for Windows server, SilverSHielD – G with DoD 5220.22-M data wipe feature. More

Defense Contractors Benefit as Trump Pledges "Historic Increase" in Spending More

Amazon's Door Lock API makes Alexa commands even easier More

Google Discloses Another ‘High Severity’ Microsoft Bug More

Want to participate in the NetWatcher beta? More

Popular Android Password Managers Expose Credentials More

It Takes a Village to Manage Cyber Risk More

Cisco Unveils New Mobile Data Security Solution More

Understanding and Combating the Evolving Attack Chain More

Why are 16,000 students in one of Michigan’s largest school districts more secure? More

The Evolution of Ransomware More

Homeland Security unveils sweeping plan to deport undocumented immigrants More

Google Discloses Unpatched Microsoft Vulnerability More

Cyber Dominates Top Business Continuity Threats More

Verizon, Yahoo agree to lowered $4.48 billion deal following cyber attacks More

Iran Intensifies Its Cyberattack Activity More

Stolen Health Record Databases Sell For $500,000 In The Deep Web More

Calls For TSA Changes After 11 Passengers Bypassed Security Screening At JFK More

Banks Show a Woeful Lack of Data Security More

Google ordered to give overseas data to feds | House passes bill requiring warrants for emails More

Ransomware Cripples Ohio County Government for Days More

Big data, IoT, and security are hot IT careers for 2017 More

Fake FBI and Secret Service Badges Continue to Be Sold at Amazon More

InterContinental Confirms Card Breach at 12 Hotels More

Expansion of TSA PreCheck Is Good for US Travelers and Security More

Honeywell SCADA Controllers Exposed Passwords in Clear Text More

The best security solutions of the year More

White Paper, Video Surveillance Storage, "Understanding the Body Camera Video Surveillance Storage Considerations More

Who has Donald Trump banned from entering the US? More

Trump puts Bannon on security council, dropping joint chiefs More

Automotive Data Security More

Printer Vulnerabilities Expose Organizations to Attacks More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Samir Shah
CEO
Cyberinc

Isla represents an entirely new approach to cyber security.  Until now security solutions have always been based on detecting “bad things” and blocking them from running. Anti-Virus tries to detect “bad files”, Web Filters try to detect “bad websites”, the list goes on and on. Isla takes a different approach to the problem. Instead of detecting “bad” things, Isla simply isolates ALL web content in a specialized environment located outside of an organizations sensitive network.  Since ALL content is isolated no attacks can ever “slip through the cracks” and compromise the user. This is a simple, yet powerful approach. Since organizations vary so widely, Isla is offered in a number of ways to suit each potential customers’ needs. Isla can be deployed as an appliance directly at a customers’ office, it can be deployed in a customers’ existing cloud data centers or it can be delivered as a pure Cloud service by a Cyberinc Isla Cloud Service partner. More


security stock solutionsMr. Ken Mills
General Manager
DELL EMC
Surveillance and Security


Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe... More


security stock solutionsMr. Wayne Arvidson
Vice President
Surveillance and Security Solutions
Quantum

Quantum has a broad range of storage solutions for surveillance infrastructures ranging from 10’s to 10’s of thousands of cameras. For smaller scale environments, the products in our Xcellis Application Director product line offer storage servers that provide a simple-to-manage foundation. End users can scale into enterprise level storage requirements with the addition of our StorNext file system, which is a multi-tier storage platform that automatically migrates video to the most cost-efficient tiers of storage based on various policy requirements defined by the user. Security environments can utilize high-performance disk storage with QXS, file-based tape with our Scalar Libraries, or FlexTier for cloud. More


security stock solutionsMr. Kurt Takahashi
President
AMAG Technology

 AMAG Technology has a rich history of 40+ years in the access control industry. Our goal is to extend the value of our access control platform by adding new solutions such as  Symmetry GUEST and soon to be released Symmetry CONNECT, our policy-based identity management system. AMAG Technology provides access control, video management, intrusion alarm, visitor management, identity management and incident management all by a single provider. Our policy-based platform and automation engine helps companies operationalize their electronic security ecosystem.  Our highly flexible open platform enables us to add new innovative technology built by our business partners easily and timely. This helps companies simplify their operations by allowing them to utilize AMAG’s user interface to manage their complex environments.. More


security stock solutionsMr. Guy Caspi
Chief Executive Officer
Deep Instinct

Deep Instinct’s core technology is deep learning, which is an advanced branch of artificial intelligence (AI). Deep learning is inspired by the brain's ability to learn: once a brain learns to identify an object, its identification becomes second nature. Similarly, as Deep Instinct’s artificial brain learns to detect any type of cyber threat, its prediction capabilities become instinctive. Deep learning has exhibited groundbreaking results when applied to computer vision, speech, and text understanding and we are the first company to apply it to the cybersecurity domain. In cybersecurity, there a big need for solutions that can protect against brand new (zero-day) threats in real-time – a critical issue that causes great vulnerabilities to almost every business.  More


security stock solutionsMr. Steve Visconti
President and CEO
Extenua

Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.  Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.  More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

“In addition to strong market demand, in March, Frost & Sullivan recognized ImageWare with the 2017 New Product Innovation Award for our GoVerifyID enterprise suite. Each year, Frost & Sullivan identifies companies that have successfully introduced new and innovative products into their markets, with emphasis on product quality and customer value. We believe this award further validates our technology and our strategy to bring our solution to market.

“Subsequent to the end of the quarter, ImageWare was selected to provide biometric identity management and credentialing software to five Alaskan airports with delivery expected to commence in the second quarter of this year. This represents the third agreement in which an airport has entrusted our multi-modal biometric authentication software to confirm the identity and background of their employees.. More


security stock solutionsMr. Marc Blackmer
Product Marketing Manager, Industry Solutions
Security Business Group
Cisco

We estimate that there will be 50 billion – with a “b” – connected things by 2020, and that includes critical infrastructure, mining, manufacturing, energy production, and so on. Accordingly, malicious hacking is becoming more lucrative and impactful as this connectivity increases. We’ve already seen how malware can be used to help take down a power grid. Therefore, if we are to reap the benefits of greater connectivity, then we need to be sure we are connecting security to protect human health and safety, as well as environment safety.. More


security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities
Cisco

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More


security stock solutionsMr. Scott B. Suhy
Chief Executive Officer
NETWATCHER


The Unintentional Insider Threat (UIT) is the biggest security issue corporations face today. Users, sometimes knowingly but more often than not unknowingly, are putting their organization at risk through a variety of actions such as clicking on phishing messages, going to nefarious websites, running risky software (TOR/BitTorrent), running outdated software (Java, Flash), using HTTP” versus HTTPS”, connecting to unsafe WIFI’s, connecting personal assets like phones/tablets to the corporate WIFI, allowing children to play games like Minecraft on corporate assets (laptops), etc. NetWatcher helps organizations detect all of these hygiene issues that open an organization up for exploit.. More


security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
www.noknok.com
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More


security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More


security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services
www.Discover.com

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More