Breaking News:

A Guide to White House North - Trump Tower In New York City More

C.I.A. Chief Warns Donald Trump Against Tearing Up Iran Nuclear Deal More

ICYMI - GTX Q3 2016 Results: revenue up 99%, delivered first military test order, expanded distribution into Mexico More

IBM's Cloud Platform Selected by American Airlines More

ImageWare Systems and Avatier Enter Into Five-Year GoVerifyID(R) OEM Agreement More

NetWatcher - Award-Winning Solutions That Simplify Cyber Threat Intelligence More

BlackBerry Is Testing Driverless Cars More

Skip the Phish on the Menu More

Amazon Is Gearing Up for a Crackdown on Counterfeits More

Europol Red-faced as Terror Data Appears Online More

CA Technologies Delivers Privileged User Governance to Better Protect Against Insider Threats More

Honeywell To Provide Advanced Navigation System To New British Armored Fighting Vehicles More

New Mirai Variant Targets Routers, Knocks 900,000 Offline More

San Francisco Transit Ransomware Attack - next transit hack could be train wreck More

How Retailers Can Stay Safe Over the Holidays More

Uber Portal Leaked Names, Phone Numbers, Email Addresses, Unique Identifiers More

Cisco has deployed a new cloud for smart cities More

Secret Backdoor in Some U.S. Phones Sent Data to China, Analysts Say More

Verizon...Challenges Of The IOT More

Security Metrics Checklist More

ImageWare Systems Releases Newsletter on Enterprise-Ready Biometric Authentication for the Microsoft Ecosystem Featuring Insights from Gartner More

NHS Email Blunder Spams Health Service More

Mobile Workers Still Using Insecure Free Wi-Fi More

Learning To Trust Cloud Security More

GTX 3Q 2016 Results: revenue up 99%, delivered first military test order, expanded distribution into Mexico. More

CrySis Ransomware Master Decryption Keys Released More

Avoiding the Insider Threat: How Not to Star in Snowden Part II More

Cybersecurity: A New Factor in the Electoral Process More

UK Spy Agencies on the Hunt for Recruits More

National Security Under President Donald Trump More

U.S. defense shares hit record highs, boosted by Trump win More

For Techs, Trump May Mean Pain Now -- Paid Later More

Here's what a Trump presidency means for mobile apps and platforms More

Here's what a Trump presidency means for the Internet of Things More

Cyberspies Ramped Up Attacks After Exposure of Zero-Days More

Heavy Patch Tuesday on US Election Day More

Google to Red Flag ‘Repeat Offender’ Websites More

Fully Operational TrickBot Banking Trojan Targets UK, Australia More

Tesco Bank 'Hack' Still a Mystery More

KORE Position Logic Powers GPS SmartSole Solution for Patients and Cargivers More

UK in $2.3 Billion Plan to 'Strike Back' at Hackers More

CISOs Must Step Beyond Their Comfort Zones More

Symantec's New Security Solution Powered by A.I. More

IoT Security Cameras Under the Security Spotlight Aga More

FireEye’s Value Proposition in the Cybersecurity Space More

Microsoft says it is fixing Windows flaws exploited by shadowy hacking group More

Sundown Exploit Kit ‘Larger Threat Than People Realize’ More

Can Cisco Continue Revenue Growth in Its Security Business? More

AI can learn from data without ever having access to it More

How Anonymous And Other Hacktivists Fight ISIS Online More

ImageWare Systems and Aurionpro Enter Three-Year GoVerifyID OEM Agreement More

Mirai Botnets Used for DDoS Attacks on Dyn More

The Growing Need for Data Analytics More

Russian Man Accused of Hacking LinkedIn, Dropbox More

Moscow Confirms Ministry Website Attack After U.S. Hacker Claim More

L-3 to Supply Joint Common Remote Viewing Terminal to U.K. Ministry of Defence More

Identity Guard, The First IBM Watson-Enabled Consumer Identity Protection and Privacy Service More

How Some Technologies Are Able To Overcome Disruption More

Twitter, Others Disrupted by DDoS Attack on Dyn DNS Service More

Zebra Technologies, Bosch Connected Devices, ARM, Food Safety Solution More

AI can learn from data without ever having access to it More

ImageWare Systems and Fujitsu Bring Biometric Authentication to User Proofing More

How to keep your smartphone from exploding More

With Samsung's Note 7 off shelves, here's who wins More

When DVRs Attack: A Post IoT Attack Analysis More

Qualys and NTT Security Announce Strategic Partnership More

"StrongPity" Group Targets Encrypted Data, Communications More

Europe to Push New Security Rules Amid IoT Mess More

IBM deal with Siemens to get its technology into more hospitals More

Ransomware Raises The Bar Again More

NSA Contractor Charged With Stealing Classified Hacking Secrets More

NSA Contractor Charged With Stealing Classified Hacking Secrets More

150,000 IoT Devices Abused for Massive DDoS Attacks on OVH ... More

AT&T Brings Smart Cities Technology to U.S. School Zones More

Questions Mount Around Yahoo Breach More

SWIFT Will Begin Enforcing Mandatory Security Controls More

Microsoft Roots Out Software Bugs With Artificial Intelligence More

New MarsJoke Ransomware Targets Government Agencies More

Russian Cyberspies Use "Komplex" Trojan to Target OS X Systems More

Yahoo Security Breach Poses Opportunity More

SAIC Navy Contract For New Command and Control Facility More

IBM Provides Real-Time Payment Processing for Banks More

Elbit Improves Situational Awareness for US Marines More

How Drone Usage Will Revolutionize America's Infrastructure More

Yahoo Says 'State-Sponsored Actor' Hacked 500M Accounts More

Watchdog Slams UK Government Cybersecurity More

Samsung to recall Galaxy Note 7 smartphones More

China bars charging and use of Samsung Galaxy Note 7 on flights More

Munich ramping up Oktoberfest security after summer attacks More

GTX Corp Expands Distribution in Mexico More

Ex-security guard admits pointing laser at news helicopter More

FDA, DHS Investigating St. Jude Device Vulnerabilities More

Judge Rules Use of FBI Malware Is A ‘Search’ More

Russian Hackers Leak Simone Biles, Serena Williams Medical Records More

ImageWare Systems and Fortscale Security Join Forces to Deliver the Industry's First Integrated Biometric Solution Powered by User and Entity Behavior Analytics More

Here's Why Security Is Becoming a Really Big Deal for Smartphones More

Historic Dell and EMC Transaction Set to Close on September 7, 2016 More

FBI recovers 30 Clinton emails possibly linked to Benghazi attack More

Passenger bypassing security prompts evacuation of Frankfurt Airport More

Check Point Defines Security Leadership in New Era of Cloud IT More

EMC Expands "Data Protection Everywhere" Portfolio For VMware Environments More

Japan Defense Ministry Seeks Record Budget as China Threat Grows More

How Amazon, Microsoft, Google Crushed Verizon, AT&T In The Cloud More

Raytheon - US Navy collaboration improves mine detection More

ImageWare Announces Availability of Its GoVerifyID Integrated With SAP HANA(R) Cloud Platform More

GTX revenue up, units now in 35 countries More

Luxury brands get tougher with counterfeiters — and Alibaba More

Edward Snowden: Russia Is Chief Suspect In NSA Hack More

New Technique Detects Hardware Trojans More

6 Things To Know For Securing Amazon Web Services More

PoS malware attacks highlights need for security standards in hotel industry More

Trump Calls For 'Extreme Vetting' to Screen 'Hostile Attitudes' More

CA - Reducing Risk of Data Breaches at Both Network and Server More

Fujitsu Provides IoT Solution to Baker Hill Industries More

Route1 Posts its Tenth Consecutive Quarter of Growth in Services Revenue and MobiKEY Subscribers More

Clinton And Trump Agree On Bio-Defense Spending More

Fortinet Cyber Agreement With Korea Internet & Security Agency (KISA) More

Republican security experts rail against Trump in open letter More

NXP SmartMX Secures New Electronic ID Cards in Jordan More

Hackers infect Oracle's credit card reading machines More

Ukrainian Accused of Role in WorldPay Hack Extradited to U.S. More

PLC-Blaster Worm Targets Industrial Control Systems More

Churches take new security measures in face of terror threats More

Banner Health data breach impacts 3.7 million More

Visual Hacking is Successful 91% of the Time More

Route1 Launches MobiENCRYPT - Smart Card Based Full Disk Encryption Technology More

ImageWare’s GoVerifyID Successfully Integrated with CA Technologies Security Products More

Route1 Provides Q2 2016 Operations Update + on August 9, 2016, Route1 will release MobiENCRYPT, a new Route1 technology offering that enables a secure mobile workforce by leveraging identity card-based credentials to protect government organizations from data-at-rest loss and security breaches. More

IBM wants to help businesses avoid a DNC-style hack attack More

Additional security measures announced for upcoming Rio Olympics More

Google’s Project Wing Delivery Drones to Be Tested at U.S. Site More

Why Experts Are Sure Russia Hacked the DNC Emails More

Rio Olympics: Inside Brazil's Massive Security Operation More

LastPass Patches Password Manager Vulnerability More

Check Point Breach Detection Systems More

Interbank Payments: Attackers' New Target More

Clinton Campaign Reports Breach More

NXT-ID Awarded US Patent on the UN-Password™ More

Cisco Report Predicts Next Generation of Ransomware More

FBI investigating hack of Democratic party email More

Amazon gets permission from UK to explore drone deliveries More

StackPath Sets Sights on Hot Security Market More

Twitter Paid a Hacker $10,000 For Filching Vine’s Source Code More

Unisys Wins U.S. General Services Administration Contract More

7 Ways To Lock Down Your Privileged Accounts More

Expect heavy security at DNC in Philadelphia More

Blackberry Software Selected for U.S. Senate Crisis Communications More

EMC Shareholders Voted to Approve the Multi-Billion Dollar Merger With Dell More

ImageWare Systems and Fujitsu RunMyProcess Bring Biometric Authentication to Digital Process Flows More

Cisco CEO on Growth Expectations, China More

SAIC Awarded $86 Million Task Order by U.S. Air Force More

Symantec Sees Ransomware Hackers Getting More Advanced More

Microsoft scores Boeing deal to move aviation applications to the cloud More

USA - obsessed with guns More

Drones Just Took Two Giant Steps Toward Daily Use More

TASER: Why Body Cameras Are a Bigger Deal Than You Think More

Black Hat Selects Fortinet More

Fujitsu Upgrades Biometrics-as-a-Service with Latest Catalog Manager Marketplace and ImageWare's GoVerifyID More

GTX Corp and RACO Industries Sign Distribution Agreement to Sell SmartSoles More

Security challenges at Democrat and Republican Conventions More

AT&T Advanced Network Technologies for Internet of Things More

Raytheon online classes to prepare US residents for extreme weather More

Physicians Save Time Using Nuance Cloud-based Speech Recognition More

Pokemon GO is a Huge Security Risk More

What Are the Key Drivers for EMC’s Cyber Security Products? More

Cisco Prepares Networking Industry for Transformation to Digital-Ready Networks More

Why Data Is The New Oil More

Why Is Walmart Building A Wall Around Its Mobile Payment System? More

8 Reasons You Need a Security Penetration Test More

Google 'instant object recognition' More

GTX Corp Signs Definitive Patent Agreement With Inventergy and Receives First Payment More

TSA testing new idea to speed up airport security More

Fortinet Achieves 99.9% Security Effectiveness Score - NSS Labs Data Center More

ACI eCommerce Fraud Prevention Innovations More

Android Malware Gang Makes $10,000 a Day: Report More

Defense Stocks Spotlight More

Facebook's "Co-operation Troubles" with Authorities Persist More

When Blackberry Was Cool More

GTX Research Agreement With George Mason University re: Alzheimer's & SmartSole More

'Brexit' Comes at a Particularly Bad Time for Software Companies More

Cyber Threats' Impact Highlighted in New EMC Global Survey More

Western Digital Expands Storage Capacity Of Several Drives In The My Passport® Line More

Jacksonville Sheriff's Office deploys 2,500 TASER X26P smart weapons More

C-Suite Execs Say They Won’t Pay Ransom Attacks Until... More

Why Google Might Want to Re-Enter the Smartphone Market More

You’re Implementing This Basic Security Feature All Wrong More

Insecurity for Cybersecurity More

U.S. unveiling rules on low-altitude drones More

Mobileye’s maps are the key to driverless cars More

IBM Named a Leader in Gartner Magic Quadrant for Disaster Recovery as a Service More

China has cut back on its cyber-spying activity against US firms: Study More

CACI Secures Multi-Million Contract to Counter Terrorism More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Steve Visconti
President and CEO

Cyberattacks have risen into the many millions of attacks per year, yet security continues to be perfunctory to the organizations overall data strategy.  It is astonishing to me that some analysts estimate that 60% of U.S. enterprise organization DO NOT have encryption strategies applied across their organization.  Hackers and their tools are very sophisticated including some with automation and its coming from many fronts you just listed.  This is precisely why an organization or enterprise must have the most secure and hardened environments possible.  Hackers and bad actors will eventually probe and eventually move on to the easier targets.  Don’t be that easy target when tools like Cloud2Drive are so easy to implement and non-disruptive.  More

security stock solutionsMr. John McClurg
Vice President in the Office of Security and Trust (OST)

CylancePROTECT is a truly advanced threat prevention solution. It sits on each endpoint within the organization, whether it’s a desktop, laptop, mobile device, server, or virtual machine. By applying artificial intelligence, machine learning, and mathematic techniques, it instantly identifies and prevents malware and cyberattacks from executing. Basically, it protects from every threat known and yet-to-be-known, including system- and memory-based attacks, malicious documents, zero-day malware, privilege escalations, scripts, and potentially unwanted programs. The solution boosts the efficiency of your IT resources and reduces user impact throughout your organization. The endpoint security product uses little memory, less than 1% of CPU. It requires no Internet connection or signature updates and is engineered to run with minimal updates and fewer system resources. In addition, it works with Windows and Mac OS, easily integrates into existing security platforms, and is available in OEM and embedded versions for technology partners. It operates in every environment, whether it’s 1,000, 10,000, or 100,000 endpoints. More

security stock solutionsMr. James Lantrip
Segment Head, Security
Siemens Industry, Inc

Siemens has a very customer-centric view. We look at our customers holistically. We're not just looking at them from a security perspective or a life-safety perspective or building automation perspective. We're looking at how we can help them with their business. And while we do break it down by market segment, we look in each segment and where we have our strengths, but more importantly we look across all the market segments and see if there are synergies that we can bring to the table that really helps our customers, manage, maintain and grow their business, as well as the practices that are underneath it. We can deliver many project sizes to help facilitate all types of projects and we have a strong team of developers that we could integrate and/or adjust specific items to be tailored to our customers’ needs. We also have very strong product offerings that are geared towards the total building– along with the service capability to deliver and support those products and solutions. More

security stock solutionsMr. Jeffrey Kessler
Managing Director, Research
Imperial Capital  

One of our key themes has been the necessity of integrators to not just increase their “IT IQ” overall, but to increase their commitment to long-term trusted partnerships with clients for multiple functions, who need a multiplicity of help in determining how to protect, monitor, and know what is going on in one or 1,000 buildings, taking seemingly disparate pieces of data collected from many thousands of sensors they are using, and creating an analysis that helps make the ROI case, and helps IRR for IT, HR, building services, logistics – not just security. More

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

ImageWare Systems a leader in mobile and cloud-based, multi-modal biometric identity management solutions, has licensed its GoVerifyID® product to Telos Corporation for use with HPE Aruba ClearPass. Telos, a leading provider of continuous security solutions and services for the world’s most security-conscious enterprises, is a leading ClearPass reseller to both the U.S. federal government and commercial organizations. ImageWare’s GoVerifyID is a mobile biometric user authentication service that verifies a user’s identity prior to granting them access to applications, systems or networks. IWS has been offering this solution on the Amazon Web Services (AWS) on-demand cloud platform. Recently, ImageWare and Hewlett Packard Enterprise (HPE) jointly developed an integration of GoVerifyID with ClearPass, a leading network access management solution that manages over 65 million end-points. The product is an enterprise-ready, turnkey, biometric authentication Software-as-a-Service (SaaS) solution. As a result of the partnership announced today, Telos will become a reseller of GoVerifyID, offer HPE Aruba ClearPass integrated with GoVerifyID, and provide and manage an instance of a multi-tenant GoVerifyID system on AWS for their customers.. More

security stock solutionsMr. Ken Mills
Chief Technology Officer Surveillance and Security
Dell Technologies

I am very excited about the value Dell EMC will bring to the surveillance and security market. Mr. Dell has discussed on a number of occasions that Dell EMC is a 1 + 1 = 3 opportunity for our customers and partners. This is especially true in the surveillance market. Dell EMC brings together the industry- leading server portfolio from Dell, the industry leading virtualization platform from VMware, and the 5-time surveillance market leader in surveillance storage from EMC. The surveillance industry is rapidly moving to the datacenter and we are hearing more and more that our customers want open, scalable and reliable enterprise infrastructure for their surveillance compute and storage. Adding Dell’s server, networking and OEM portfolio to EMC’s edge to core to cloud storage architectures provides customers a validated end-to-end solution for surveillance infrastructure. Combining Dell with EMC will provide our joint customers more choice and more value than on our own. Dell EMC will reduce the complexity of deploying large scale surveillance solutions. More

security stock solutionsMr. Marc Blackmer
Product Marketing Manager, Industry Solutions
Security Business Group

We estimate that there will be 50 billion – with a “b” – connected things by 2020, and that includes critical infrastructure, mining, manufacturing, energy production, and so on. Accordingly, malicious hacking is becoming more lucrative and impactful as this connectivity increases. We’ve already seen how malware can be used to help take down a power grid. Therefore, if we are to reap the benefits of greater connectivity, then we need to be sure we are connecting security to protect human health and safety, as well as environment safety.. More

security stock solutionsMr. Lucas Le Bell
Chief Executive Officer
Watch the CerbAir Video here

When it comes to protecting a sensitive site, a lot of risks have to be taken into account, drones being one of them. We understand that integrating new protection layers in an already complex security environment isn’t easy. So we strived hard to develop a very pragmatic approach to deliver a high level of security and reliability at a modest cost matching the real level of the drone threat. Every day, we focus on our core activity which is about creating robust algorithms. Combining them with battle-proven sensors and top 3rd party countermeasures allows us to deliver first-class service to our customers. That is what our value proposition is about: selling the right solution at the right price to match a realistic level of threat.  As a result, we do not compete with military technologies that most sites at risk cannot afford and which capabilities are overkill regarding our client needs. More

security stock solutionsMr. Michael Oldham
Chief Executive Officer

We protect access for one of the major defense departments in Europe. Every item that’s purchased in that country, or around the world, is procured through systems we protect.  Whether you are buying a pencil or a battleship, PortSys protects the access to those systems. We also have several critical infrastructure customers who supply power to their regions of the world.  These customers are in the United States and in Europe, but that’s about as specific as I can get as these organizations understandably maintain a high level of secrecy about their infrastructure and security.   We all know how critical the electrical infrastructure is and how it has continued to be in the news as a potential source of vulnerability.  PortSys provides security and access control technologies for these organizations so they can continue to provide electricity to their constituents.  These are tens of millions of people who depend on these organizations for everyday life.  These are absolutely crucial services and are among some of the most targeted institutions in the world.  We are proud to be part of their defense.. More

security stock solutionsMr. Kurt Takahashi
Senior VP of Sales
AMAG Technology

End user demands are growing exponentially every day.  Whether it is managing who has access to buildings and when, recording events on video, managing incidents, meeting compliance requirements or demonstrating proof of compliance, end users must manage to keep their buildings, assets and people safe. Physical security equipment and an effective security team will always be required to keep a building safe.  But what about having reliable policies and procedures to enforce operational effectiveness?  Sure, companies can invest in the best electronic security systems and cyber security programs available, but if their internal policies are outdated and security procedures are dependent on manual processes, how can the overall security program be effective?  .. More

security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More

security stock solutionsMr. Patrick Bertagna
CEO, Founder, Chairman
GTX Corp

The SmartSole is our flagship product, think Dr. Scholl’s meets LoJack. We make a miniaturized GPS and Cellular module and imbed it inside an orthotic insole. The application is for people who have a memory disorder and have a tendency to wander, anyone with Alzheimer’s, dementia, autism, traumatic brain injury, etc. Currently there are over 100 million people worldwide who are afflicted with one of these debilitating aliments. Being that our module is small and robust we also imbed it inside other form factors and we are starting to look at OEM deals. And then we have our tracking App, which basically turns a smartphone into a tracking device, the application there is for mobile work force, sales people, delivery people, service business like electricians and plumbers, police officers, just about anyone that works in the field and benefits their superiors to know where they are at any time at the touch of a button. More

security stock solutionsMr. Scott B. Suhy
Chief Executive Officer

The Unintentional Insider Threat (UIT) is the biggest security issue corporations face today. Users, sometimes knowingly but more often than not unknowingly, are putting their organization at risk through a variety of actions such as clicking on phishing messages, going to nefarious websites, running risky software (TOR/BitTorrent), running outdated software (Java, Flash), using HTTP” versus HTTPS”, connecting to unsafe WIFI’s, connecting personal assets like phones/tablets to the corporate WIFI, allowing children to play games like Minecraft on corporate assets (laptops), etc. NetWatcher helps organizations detect all of these hygiene issues that open an organization up for exploit.. More

security stock solutionsMr. Robert Dodge, CPP
Senior VP
G4S Corporate Risk Services

On a Friday in October 2015, a disgruntled customer arrived at a leading, international publisher’s New York City headquarters and insisted on seeing the company’s CEO. When the receptionist asked the man to leave, he became aggressive and made threats against staff and the CEO before leaving the building. Concerned about the potential for violence, the company reached out to G4S to respond to the threat. Within hours, workplace violence expert Robert Dodge, CPP, Senior VP of G4S Corporate Risk Services, deployed armed protection agents at the CEOs Manhattan residence to protect him and his family over the weekend.. More

security stock solutionsMr. Brian Brunetti

Our flagship technology is MobiKEY, a mobile access solution that uses comprehensive multi-factor authentication and identity management to securely connect an organization’s assets with its employees, mobile workers, and contractors. Secure mobile access to any asset on any network using any device. MobiKEY means freedom for an organization's team members to remotely connect to enterprise assets with zero change to their workspace environment. Additionally, the use of MobiKEY means an organization can enjoy robust secure mobile access without compromising the enterprise’s integrity - no malware, no data spillage and no network breaches. More

security stock solutionsMr. Steve Cocco
Security Strategies Today

I have dedicated my professional life to law enforcement and security and am now the president of my own company.  I got here after 27 years with the FBI, having started off in the Bureau's New York office as a linguist in the 1980s. I was so impressed with the professionalism of the agency that I decided I wanted to become an agent and was honored to be given the opportunity.  I spent several years as a field agent in San Diego and New York before going into management. That took me to Rome, Italy, where I was assigned to the US embassy to support the FBI's mission overseas.  I also responded to the US embassy bombings in East Africa and conducted extensive FBI-sponsored training to foreign law enforcement partners in Africa and in Latin America.  I was given the opportunity to set up the FBI's Joint Terrorsim Task Force in the San Juan, Puerto Rico division and finally served as Assistance Special Agent in Charge in Phoenix.  It was just an amazing career with outstanding people and opportunities. More

security stock solutionsMr. John Mears
Senior Fellow
Information Technology & Security Solutions
Lockheed Martin IS&GS Civil

The idea behind IDHaystack™ is to make identification and verification services more accessible and evergreen within a secure Government community cloud construct. We were thinking, “Wouldn’t it be wonderful to be able to offer an advanced multi-modal biometric system in a way accessible to many different Government customers without their having to expend significant capital to get it?” We wanted to create an evergreen biometrics engine that could support an open framework in which customers’ existing unique workflows, rules, interfaces and user requirements could be accommodated as they exist or built separately to suit them. We tested these tenets with customers around the world and got positive affirmation that this is what they wanted going forward. Let me elaborate on why this idea is revolutionary. More

security stock solutionsMr. George Romas
Technical Director
HP Enterprise Services, U.S. Public Sector

The current atmosphere of porous government networks and unprotected information is demanding attention from government leaders and CIOs. The idea of a cybersecurity sprint seems to have been a decent approach to jumpstarting efforts to improve security. However, this top-down approach does not adequately address the variety of issues that lead to compromise of government networks, including cyber terrorism, cybercrime, and hacktivism. The Cyber Sprint had four specific goals: for DHS to share priority threat-actor Techniques, Tactics and Procedures (TTPs); immediately patch critical vulnerabilities on a weekly basis; improve controls and governing policies on privileged users; accelerate implementation of multi-factor authentication. While these short-term measures are adequate for improved security, they are not nearly sufficient because software does not exist in a vacuum; you must also consider vulnerabilities of the overall design of the architecture and platform.. More

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More

security stock solutionsMr. Raj Samani

If I utter the words cyber, what is the term that springs to mind?  In most cases they will be negative, such as crime, espionage, war, etc. However the reality is that this is only one side of the coin, and one term that is often forgotten is opportunity.  Technology has transformed every industry, every person, every section of society.  We have to recognize this and maximize the opportunities for the benefit of each of us, but do so in a way that reduces the risk to a level we are all comfortable with.. More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More