Breaking News:

Samsung connected home fridge becomes weapon in MITM attacks More

WD And Milestone Partner To Provide Video Surveillance Solutions For Businesses And Consumers More

Oracle Service Cloud Granted U.S. Department of Defense Authority to Operate More

US Army Common Infrared Countermeasure (CIRCM) Contract to Northrop Grumman Land & Self Protection Systems More

Gemalto boosts connectivity for IoT More

TSA Deploys AtHoc Across 200 Airports Nationwide for Emergency Alerting More

Akamai eyes growth in security and startups More

Elbit Systems Cyber unit receives new contracts from European and African Customers More

Majority of Children in the U.S. Have Their Own Connected Device Before Seventh Grade More

Verizon Is Turning Any Car Into A Connected Car With Hum More

Brocade Analytics Monitoring Platform Enables Organizations to Achieve Greater ROI for Mission-Critical Applications More

Raytheon to provide training services to U.S. Air Force More

Microsoft's MobileFusion app turns an iPhone into a portable 3D scanner More

Security researcher who hacked moving Jeep leaves Twitter More

Wichita Police Department Deploys 429 Axon Flex Cameras with Evidence.com from TASER More

It's A Verizon World, We Just Live In It More

Digital Ally Receives Body Camera, In-Car Video and VuLink Order From Ferguson, Missouri Police Department More

?Biometrics: The password you cannot change More

Gemalto: Marquis ID Systems technology to safeguard U.S. driver licenses More

Identiv Partners With Chronicled, Inc. in Rapidly Growing Wearables IoT Market More

CGI wins Army Intelligence contract More

Intralinks and Premiership Rugby tackle document protection More

Identiv Enters Distribution Partnership With PSA Security Network More

AT&T making it even harder for you to protect your privacy More

5 Reasons Not To Buy An iPhone As Your Business Phone More

Pump-and-dump frauds are turning to Twitter, and these companies are out to spot them More

Fortinet Unveils Mid-Range Security Solution More

Applied DNA Sciences Signs Contract With Fifth Federal Agency More

CA Technologies Completes Acquisition of Xceedium More

Digital Ally Awarded Statewide Contract Extension With State of Michigan More

FireEye, Europol tag team on cybercrime detection More

Twitter sees its largest increase from governments wanting account information More

FIDO Alliance Announces 62 Authentication Products Are Now FIDO(R) Certified More

Identiv Announces U.S. Government Certification of uTrust TS ScramblePad Government Reader More

Business Wire Investigating Cyberattack More

Over Half of Android Devices Hit by Remote Control Bug More

National Survey Finds Nearly 90% of People Use Work Devices without Trusted Security Software More

Trend Micro Delivers Seamless Security for Businesses Migrating to Microsoft Windows 10 More

Mozilla Patches Bug Used in Active Attacks More

Want to be totally secure on the Internet? Good luck! More

UK Local Authorities in Data Protection Fail More

How Hackers Tore Apart A Tesla Model S To Kill The Car Mid-Drive More

Leading Analyst Firm Data Identifies Fortinet as Security Market Leader More

MorphoTrak Leads With Face Comparison Training More

Trend Micro Discusses Threats against Banking and Infrastructure More

Emergent BioSolutions Expands Biodefense Business More

Elbit to Supply DIRCM Self-Protection Systems for European and Asian Customers More

Car hacking risk may be broader than Fiat Chrysler More

How to protect your wireless network More

FireEye Report - Tactics of a Likely Kremlin-Backed Threat Actor More

IBM Security - a Leader in Gartner Magic Quadrant More

FIDO Authentication Gains Momentum in US and Europe More

Cisco Security Report - Innovation Race Between Adversaries and Defenders More

Android's Security Nightmare More

Alibaba Secures Data Centers With Quantum Research Lab More

ManTech to Provide IT Modernization for Defense Intelligence Agency More

Oracle Integrates Mobile Security Into Identity and Access Management Platform More

Imperva Skyfence and Raytheon|Websense Team to Help Organizations Secure Cloud More

Neglect Is Still The Biggest Threat To Data Security More

Major Android security flaw leaves 950 million phones vulnerable More

Apple, Google Self-Serve Home Security Takes On ADT More

NIST cybersecurity center proposes best practices More

Musk, Hawking warn of artificial intelligence weapons More

CACI to Provide Forensics Support to U.S. Army More

Infoblox DNS Threat Index Hits Record High Due to Surge in Phishing Attacks More

Twitter hoax latest trick to be played on Wall Street More

Verint Identity Authentication Helps Protect Customers, Reduce Customer Effort and Enhance Experiences More

ImageWare Systems Announces License Agreement With Lockheed Martin More

TeleCommunication Systems Interoperability Lab Drives Text-to-911 Deployment for Public Safety More

Samsung pushes forward in mobility with Internet of Things More

Google leads $100 million investment in cybersecurity firm CrowdStrike More

Independent Research Firm Cites Websense® as a Leader in SaaS Web Content Security More

Check Point Teams With VMware to Offer Advanced Security Within the Software-Defined Data Center More

Barracuda Introduces the First Web Application Firewall for Microsoft Azure App Service More

IBM, Intel, Raytheon Aim At Burgeoning Security Field More

PTC Announces PTC Integrity Product Family for the Internet of Things More

NYSE resumes trading after nearly 4-hour halt - Software Update or Breach? More

Morpho Awarded Mexico Airports Contract for Hold Baggage Explosives Detection Systems More

Will Privacy Issues Ruin Facebook's Business Model? More

FLIR Systems Secures US Homeland Security Deal More

Raytheon delivers operational border security capability to Jordan under DTRA contract More

FireEye Combines Industry Leading Email Protection With Threat Intelligence More

ImageWare Systems and OnlineAuction.com Bring Biometric Authentication to the Online Marketplace More

NTT Docomo selects Gemalto for IoT applications in Japan More

Cloud IT infrastructure spending to reach $33.4 billion in 2015: IDC More

FIDO Alliance Equips U2F Protocol for Mobile and Wireless Applications More

All About The Gun Business In America More

Edwards to Expand FireWorks® Control System to Offer Enhanced Multi-Functional Incident Management Platform More

US data hack may be 4 times larger than the government originally said More

Chinese Cyber Attack on OPM Goes Unpunished More

Facebook’s Facial Recognition More

AT&T Certifies MiFi(R) Secure SA 1100 IoT Solution for Home Security More

OSI Systems Receives $9 Million in Orders from International Customers for Cargo Inspection More

Websense® Security Labs Reveals Top Cyber Threat Trends in 2015 Financial Services Drill-Down Report More

Google adds Undo Send as default setting to Gmail More

If BlackBerry Adopts Android, Its Security Standards Could Suffer More

Self-Driving Cars Create Opportunities and Problems More

Belgium Takes Facebook to Court Over Privacy, User Tracking More

SaaS App Adoption Creates New Blind Spots for Data Leakage in the Enterprise More

AT&T Leads The Industry In The Internet Of Things More

Kaspersky says Iran talks spyware masqueraded under Foxconn name More

New Security Findings--Apple Isn't Immune And Fixing Takes Too Long More

Privacy groups and the dispute over facial recognition software More

Honeywell's Security Subsidiary More

Orange Business Services and Gemalto join forces to provide customers with highly secure access to cloud-based applications More

Millennials' banking habits could make Wall Street obsolete More

Google info stop syncing to iPad? Try this simple fix More

Experts Point to Chinese in U.S. and Insurance Cyberattacks More

Siemens Security Products now part of Vanderbilt More

Data Breach Linked to China Exposes Millions of U.S. Workers More

Is Stanley Black & Decker Preparing to Saw Off Its Security Business? More

I.D. Systems' announces that Toyota Motor Manufacturing Texas has purchased its PowerFleet Vehicle Management System More

Biz-Gov cybersecurity collaboration More

Cyber Security in Focus After Taxpayer Accounts Breached More

Fingerprint Cards and Google More

Rise of ad blocking threatens publishers More

Level 3 Experiments with Cybersecurity Offense More

Newest metric for retailers: Social media followers More

How Big Data And The Internet Of Things Improve Public Transport In London More

Radware’s ADC Solution Helps China Railway Build Next Generation e-Ticketing System More

Air Cargo Carriers Becoming Data-Driven Businesses More

oti NFC Readers Support Android Pay(TM) More

Pentagon Awards $400 Million in Defense Contracts More

Invest In Cyber Security With These Stocks More

Numerex Launches nxFAST iIoT Platform for Rapid Deployment of Enterprise-Class Industrial Internet of Things Solutions More

How AT&T Is Virtualizing Security More

Things You Should Not Buy Online More

Alibaba Accused of Selling Fake Items More

Marsh and FireEye Collaborate to Offer Cybersecurity Readiness Service More

Defense Budgets Ready to Grow Again More

Why Drones Should Bug You More

Black box sent to U.S. to seek crash clues More

Google fires first volley in new cloud pricing war More

Amazon's riding the New York subway to speed up deliveries More

Fortinet Agreement With U.S. Department of Homeland Security More

Thank you Apple and Samsung: The physical home button is essential for efficiency and security More

PFU Systems and FireEye Integrate Products to Deliver Next Generation Enterprise-Level Defense Against Network Cyber Attacks More

Zebra Technologies Introduces Mobility DNA Suite for Next Gen Intelligent Connectivity More

Self-driving cars are getting into accidents in California More

Alibaba rolls out three-hour delivery service for healthcare goods More

Garmin's running watch finally tracks your heart rate by itself More

State of Louisiana renews contract with CGI for IT services for disaster relief programs More

Verizon to Buy AOL for $4.4 Billion More

New Ecolab Total Hand Hygiene System Improves Handwashing Compliance, Decreases Water Use by up to 50 Percent More

Finding Survivors in Nepal With Google's ‘Person Finder’ More

China could become Apple's top market by next year More

OSI Systems Receives Certification for RTT® 80 Explosive Detection System More

Big Data-As-A-Service Is Next Big Thing More

General Dynamics Completes Initial Integration of NASA's New SGSS Command and Control Infrastructure More

Accenture and Oracle Form New Business Group to Help Customers Achieve Digital Transformation Goals in the Cloud More

New Research Reveals Wide Gap Between Perception and Reality of Perimeter Security Effectiveness More

Check Point Ranked Number One in Worldwide Firewall Equipment Market More

Smith & Wesson Sees Higher Demand More

Robots in the defense space More

3M Introduces Advanced Physician Documentation Platform More

Morpho Fingerprint Identification Technology First in 1-1 Verification More

General Dynamics says still focused on government cybersecurity business More

User mistakes aid most cyber attacks, Verizon and Symantec studies show More

Honeywell Technology Enables Next Generation Of Search And Rescue More

Cubic Global Defense Awarded Contract More

Identiv and Cisco to Provide Next-Generation Physical Access Solutions for the Internet of Everything More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More

security stock solutionsMr. Jason Hart

Identiv’s uTrust products enable business executives and security leaders to make the paradigm shift from patchworked identity systems to a unified, simple, efficient identity solution that delivers higher security and resistance to obsolescence, for both premises and information access. Our uTrust products are unique in the marketplace as they are designed, tested, and supported to work together. No matter where a customer starts, Identiv provides the confidence that they can build a complete system in which everything works together.  Identiv’s idOnDemand service is a turn-key cloud-based platform that makes establishing a trusted ecosystem across all lines of business, geographic locations, devices, and people simple and convenient. Central to the idOnDemand service is the certification authority that issues PKI certificates — the standard for secure communications through the internet, banks, and high-security cryptographic applications within and outside the U.S. government for the last 20 years. By combining PKI with purpose-built secure hardware such as a smart card, USB token, or other devices, like mobile, the certificate’s private key is not only protected in a high state of security, but is also portable across devices and services, enabling pervasive use of strong identity whenever (and wherever) required. More

security stock solutionsMr. Steve Visconti
President and CEO

Applying superior encryption techniques along with multi-modal biometric identity management features provides the most secure, unified enterprise platform without precedent. No matter the cloud service provider and scheme deployed—public, private, and hybrid—the security, flexibility and cost savings of cloud storage more fully leverage enterprise data assets.  Partnering with ImageWare allowsExtenua to make advanced biometric authentication for cloud storage a reality. Combined, Cloud2Drive with ImageWare GoVerifyID™ revolutionizes secure cloud storage providing unmatched enhanced levels of security the enterprise is looking for.  We can now deliver a robust and secure product incorporating ImageWare GoVerifyID™’s out-of-band biometric authentication with advanced fraud-prevention capabilities to organizations.  In this current world of security breaches and significantly elevated hacker threats, this platform is purpose built to provide the much needed enterprise-grade security layers required for responsible and proactive governance and data protection.  ..More

security stock solutionsMr. Dongpyo Hong 
President of CrucialTec USA

When CrucialTec first met FIDO, we liked FIDO’s goal which is to build a standard protocol for an online authentication process to communicate with different industries in the world. CrucialTec has been building strong business relationship with many mobile clients throughout the world and we thought that we could contribute to FIDO’s goal as a biometric authentication solution provider. I believed that with FIDO, CrucialTec could create a huge synergy effect, not just from mobile but from Medical/Health device, wearable, automobile and the other consumer products. Also, we were very confident that CrucialTec can contribute largely in Fintech, Mobile Commerce industry in Asia through FIDO..More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More

security stock solutionsMr. Christian Matthews
Director of Product Management for IoT Software

Simply monitoring high-value assets provides a general example. Video surveillance combined with other sensor output such as audio, motion, or building contacts is used to increase protection and monitor assets without constant human supervision. Threats of incidents are detected and the risks mitigated by alerting personnel or automatically initiating preventative actions. When combined with advance video analytics, benefits continue to grow. At the University of San Francisco (USF), IP cameras and the Cisco Video Surveillance Manager deliver facial recognition to detect when unauthorized individuals enter an area and then notify appropriate staff.  Dallas Area Rapid Transit(DART) use Cisco’s IoT Physical Security solutions to increase effectiveness of the transit police. With better intelligence, first responders and their associated operations teams have increased productivity substantially. They have done this at scale with a centralized command center managing more than 1700 remotely deployed IP cameras. Recently the system has been extended across busses and emergency response vehicles..More

security stock solutionsMr. Matt Barnette
AMAG Technology

In our newest version of Symmetry, we address the tightened smart card standards to counter growing physical and cyber threats and as a result are making Symmetry fully compliant with Federal Identity Credential and Access Management (FICAM) standards.  We are making Symmetry easier to install for our integrators by changing how access permissions are downloaded to the door controllers.  While this may not sound like an important detail, every Symmetry installer will notice the difference and save time and money when they install Symmetry. We have expanded our Symmetry High Definition camera line and added two new cameras.  The cameras offer an affordable option with a great feature set.  This is another way we are ramping up our video offering.  All of the Symmetry HD cameras in the range include built-in advanced motion detection as standard, and contain an option to turn on high quality video content analytics right inside the cameras themselves. Alarms from the cameras can automatically trigger commands throughout Symmetry, thus enhancing the security capabilities. More

security stock solutionsMr. Derek Gabbard
President, FourV Systems
SRC, Inc.

SRC, the parent company of FourV, is a not-for-profit company that has provided research and development services to U.S. government customers for more than 55 years. Over the last several years, in response to customer challenges and market needs, SRC has been developing analytic platforms for what is known today as “big data.” Due to some recent, high profile data breaches (that you can read about in the news), SRC saw an opportunity to focus on the commercial application of its research and development, and began to focus on products and services in the big data analytics market. SRC formed FourV to offer its analytic platform, known as the GreySpark™ Reasoning Engine, into the commercial marketspace. We’re committed to making the GreySpark Reasoning Engine the industry leader in combining historical big data analytics and real-time, fast data analytics and processing. The core of GreySpark is incredibly flexible and can be applied across a number of use cases within the enterprise. We are developing flexible yet powerful modules to be deployed with the core engine to address enterprise needs in fraud detection, financial market analysis and have additional capabilities in the roadmap for other use cases as well. More

security stock solutionsMr. Mark VanDover
Tyco Integrated Security

In the last six months, we’ve seen security technology changing the way businesses operate across multiple industries. For example, expanded use of RFID-enabled technologies is helping retailers identify and combat operational loss, deepen the customer experience and improve omni-channel operations. Additionally, in heavily regulated industries like food manufacturing and pharmaceuticals, we’ve seen physical security play a bigger role in ensuring standard compliance. On another level, since entering the small business market last fall, we’ve seen firsthand how affordable commercial-grade security solutions can make a difference for small business owners’ bottom line.More

security stock solutionsMr. Fred Duball
Data Center Practice Principal, Workload and Cloud Solutions
HP Enterprise Services, U.S. Public Sector

Many of our clients know that HP has a strong legacy of IT infrastructure support; we have more than 80 data centers worldwide supporting more than 1,300 customers. But here’s what makes the Mid-Atlantic Data Center (MDC) different—we have enhanced our security and compliance posture to accommodate and support the critical needs of the U.S. Federal Government, as well as commercial companies requiring stronger measures.  The HP Mid-Atlantic Data Center has been designed to provide customers with high levels of security, reliability, compliance and cost effectiveness. In fact, the U.S. government has designated this facility as being a part of our nation’s critical infrastructure, guaranteeing priority restoral of services in the event of a natural or manmade disaster. More

security stock solutionsMr. Paul Brady
Technology and Solution Evangelist
Senior Director

The weak link is the fact that, in most cases, these breaches happened because the accounts (Target, Home Depot, and JPMorgan) were using password-based authentication. That is the weak link. Had the exploited accounts required the use of Identiv’s uTrust Credential to securely login without a password, these attacks could have been mitigated. Identiv’s uTrust Credentials are incredibly easy to use because they are a form of authentication we are all used to — the idea of a card plus PIN is something users accept, we are all accustomed to using a card plus PIN to authenticate an ATM, a gas pump, etc. Identiv has recently helped a large network hardware provider secure its administrator accounts and remote access security. The company uses Identiv’s uTrust Credentials and built-in group policy to enforce smart-card-only login to Windows, Linux, and other servers. Identiv is also currently working with major energy companies to help them become NERC-compliant while securing both physical and logical access; we are working with one of the largest credit reporting agencies to secure remote access to its networks as well as physical access to its facilities; and we have helped one of the largest insurance companies in the world move away from insecure proximity technology to secure contactless physical access.   More

security stock solutionsMr. Matt Tryniski
Vice President, Defense and Environmental Solutions
SRC, Inc.

UAS, also commonly referred to as unmanned aerial vehicles (UAVs), remotely piloted aircraft (RPA) and drones, offer many advantages. There are commercial applications like precision agriculture, film production, package deliveries, etc. And there are military applications like intelligence gathering, surveillance, reconnaissance and high-risk operations that no longer require putting a human pilot in harm’s way. These applications are recognized globally, which has led to the proliferation of UAS worldwide. With such a large population of these aircraft, there is a pressing need to safely integrate these systems into the airspace and to defend against them when they are used for hostile purposes. More

security stock solutionsMr. Will Geoghegan
Cloud Architect
TPS5 Cloud & ISV Partner Solutions
Fujitsu Americas
Fujitsu ISV Cloud Program

Fujitsu has a long and demonstrated history delivering world-class solutions that enable businesses to succeed in a highly-competitive market and ever-evolving technology landscape. The Fujitsu Cloud ISV Partner Program is one more way we’re delivering exceptional value to our customers, where we focus on helping companies transform and deliver their solutions in an “as-a-service” model from our cloud. Our aim is to work closely with leading solution providers to take full advantage of not only our platform and tools, but the underlying shift in how the market consumes technology solutions today. With the Fujitsu Cloud ISV Partner Program, we offer the chance for solution providers to step into a leadership role and maximize the benefits of the latest cloud technology, including not only the transformation and delivery of their solutions as SaaS, but also for support in areas like sales, marketing, professional services, and across innovative operating and revenue models that support a “zero cost” option for the partner.  More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More

security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More