home

Breaking News:

N.S.A. Breached North Korean Networks Before Sony Attack. More

France Pushes for Scrubbing Internet of Terrorism-Related Content More

After blocking Gmail, now China seems to be hacking Microsoft Outlook More

Oracle Voice Brings a Mobile, Speech-Enabled Virtual Assistant to the Oracle Sales Cloud in Release 9 on Smart Phones More

President Obama's Cybersecurity Priorites More

ImageWare Systems Joins as an Advanced Partner in the CA Technologies Tech Partner Program More

Identiv Supports President Obama's Plan to Increase Cybersecurity and Calls for U.S. Congress Mandate for All Organizations More

Alibaba Blocks Sales Of Unsafe Goods To U.S. Shoppers More

Why Google won't fix a security bug that's in almost a billion Android phones More

Pitney Bowes Unveils New Brand Strategy for the Future of Commerce More

Oracle Launches Modern and Secure Oracle Financial Services Cloud More

IBM Debuts New Mainframe in a $1 Billion Bet on Mobile More

Accenture is a Leader in U.S. Government Cloud Services. More

HP Unveils Retail Technologies to Enhance Security, Customer Experience and Enable Operational Efficiencies More

Elbit Systems Awarded Contracts for Advanced Electro-Optics Systems for Israeli Ministry of Defense. More

Uruguay selects Gemalto for eID secure document and issuance solution More

Authentidate's InscrybeMD Telehealth Solution Expanded to Several Florida Hospital Locations More

Digimarc and HP Report Significant Progress in Creating Print-to-Mobile Engagement Tools for Digital Presses More

Apple Has Patched A Hole In iCloud That Let Hackers Access Anyone's Account More

HP Debuts Virtual Reality Display Reducing the Barriers Between Digital and Physical World More

Google Was Asked To Delete 345 Million Links In 2014 Over Copyright Infringement More

Raise your home's IQ: smart gadgets take center stage at CES More

Stop Fraudsters in Their Tracks. NICE Launches Real-Time Solution to Thwart Fraud Attempts in the Contact Center More

Intel unveils app that opens sites with user's face More

Cue The Latest Cloud Vendor Announcing An Extended Maintenance Outage--Verizon Cloud Set For 2 Day Blackout More

CES 2015: Wearables, Drones, Virtual-Reality Goggles More

Why IaaS, PaaS, and SaaS are integral to Oracle’s growth More

Largest Military Medical Facility in DoD Selects NICE for Patient Security and Safety More

Why Most Companies Could Be Hacked Just as Easily as Sony More

Taser Inks New Orders Amid Civil Unrest, Shares Soar More


Raytheon awarded $2.4 bln contract to provide the State of Qatar with Defense System More

Atmel and Fingerprint Cards Enter Strategic Partnership for Biometric Fingerprint and Touchscreen Solutions More

I.D. Systems' Wireless Industrial Vehicle Management Technology to be Deployed by Ford Motor More

Kratos Award to Provide Unmanned Aerial Target Systems to US Air Force More

Morpho's Itemiser 4DX Receives ECAC Approval for Explosives Screening More

Blackberry helps Boeing with its hyper-secure 'Black' smartphone More

4 Top Cybersecurity Plays. More

IBM Opens First Cloud Data Center With SoftLayer in Japan More

Gartner's Magic Quadrant positions Gemalto as a leader in user authentication More

Sony hackers threaten theaters More

EMC launched EMC VNX-VSS100 for video surveillance market More

Facebook follows Google as Dutch watchdog probes privacy More

Magal is Awarded Contract for an Integrated Security Solution for the Port of Tarragona in Spain. More

Precise Biometrics: Tactivo™ order from US Department of Defense More

Oracle Service Cloud Achieves Federal Risk and Authorization Management Program Provisional Authority to Operate More

Cubic Buys DTech to Expand Defense Unit More

The Problem With the Plan to Give Internet Access to the Whole World More

Emergent BioSolutions Expands Biodefense Franchise More

Tyco to Acquire Industrial Safety Technologies to Expand Gas And Flame Detection Capabilities More

EMC launched Enterprise Hybrid Cloud Solution More

Nordstrom fires employee, citing Facebook comments More

Radware's Global Application & Network Security Report Reveals Cyber Attacks Now Longer and More Continuous, Lasting One Month on Average More

Amazon, Microsoft Cloud Rivalry Grows In Enterprise More

Apple, Amazon refuse to release federal diversity data More

Accenture and Microsoft Launch New Hybrid Cloud Platform to Accelerate Enterprise-Wide Adoption More

Gemalto Launches Enhanced Visual and Tactile Security Features for Official Identity Documents More

How to protect yourself from ‘SpoofedMe,’ a social login attack More

Neogen acquires food safety business More

Oracle's New Cloud Development Center in Canada Reiterates Company's Commitment to Cloud Innovation More

Is a Threat on Social Media Really a Threat? More

Hacker Group Claims Credit For Taking Xbox Live Offline More

IBM reported online and mobile sales for Cyber Monday 2014; Online Sales From Thanksgiving to Cyber Monday Increased 12.6%; Cyber Monday Online Sales Up 8.5%, Mobile Sales Up 27.6% More

MorphoTrak Celebrates 40 Years of Automated Fingerprint Identification More

Defense sector grows with the global economy More

Gemalto teams up with Chunghwa Telecom for its commercial launch of NFC services in Taiwan. More

I.D. Systems Receives Follow-on Order From Leading U.S. Airline Valued at $500,000. More

HP Takes Big Data Platform to the Cloud With HP Haven OnDemand More

How much do you know about how the Internet works? More

U.S. Said to Cite Islamic State Fight to Block UN Spying Text More

Why iCloud Has Been Such A Mess More

Morpho Launches Non-Radioactive Trace Detector. More

Taser Shares Rise As Violence Erupts in Ferguson More

Tyco to Reinforce Technological and IoT Capabilities. More

L-3 Wins NGA Contract for Global Network Solutions More

Secure Dell Windows 8.1 Tablet Offers Mobile Computing up to Top Secret level. More

CACI awarded $62.5 mln contract to support counter narco-terrorism work. More

How banks are looking more like tech companies More

U.S. aviation safety board says FAA can enforce rules on drones More

Oracle Advances Data Integration Portfolio With Major Enhancements to Oracle GoldenGate More

San Francisco Police Department Selects AXON Body Cameras and EVIDENCE.com From TASER More

Morpho Places First in NIST 2014 MINEX Fingerprint Benchmark More

SmartMetric Ties Your Fingerprint to Your Credit Card With Its In-Card More

U.S. military scrambles to keep its edge despite budget woes More

Contextual Security is Key to Enabling Business Mobility More

IBM is launching web-based email service More

General Electric CMO on Partnership With Quirky, Smart Home Technology More

CACI Awarded Contract to Provide Digital Mapping Services to National Geospatial-Intelligence Agency More

ImageWare Systems Debuts Biometrics-as-a-Service Identity Authentication Solution Combined With FUJITSU Retail Solution Market Place. More

ImageWare Will Combine Technologies With TransUnion to Offer Biometric Authentication for Fraud Prevention More

Obama's Internet Rules Could Boost $1.3 Trillion Connected Web. More

SMARTRAC and Atmel Collaborate in Animal ID Applications More

New Cancer Detection Technique Has Enormous Potential More

CACI Awarded Contract to Support Development of Sensor Technologies for U.S. Army at Business More

CA Technologies Powers Security, Usability and Trust for Enterprise Apps on Samsung KNOX More

Pitney Bowes Wins Department of Homeland Security Contract for Mail and Document Processing Solution More

British spy chief demands more access to Twitter, Facebook to thwart attacks More

Morpho Detection Awarded Lufthansa Airlines Contract for Itemiser DX Trace Detectors More

Palerra Emerges From Stealth, Changes Its Names And Jumps On The Security Bandwagon More

Gemalto deploys secure online banking solution in Indonesia More

Small Businesses Assess Their Apple Pay Options. More

Kohl's Sets Foundation for Future Growth With Oracle Retail More

IBM and China’s Tencent Begin Cloud Partership More

China-Linked Hacking Foiled by Private-Sector Sleuthing. More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Stu Hammer
Director, USPS Application Services Practice
HP Enterprise Services, U.S. Public Sector

Applications modernization has become imperative as the maintenance of “mature” applications has increased—consuming a disproportionate share of resources. HP aligns critical applications and infrastructure with your overall modernization program. We can help you address risk, optimize benefits and prioritize the business needs of your applications. There are some very significant benefits that we can get through modernization. We’ve seen between 25 and 45 percent savings in a reduction in operations cost, development cost and overall portfolio size. The approach HP uses has been successfully executed with hundreds of modernization projects - leveraging the Advise, Transform and Manage approach, which is backed up with a strong methodology, tools and the experience to execute and de-risk the approach. What’s critical in this process is to start with a complete assessment. It’s mandatory that you get the plan right and you know what your portfolio, know what your application environment is so you can execute successfully. We’ve seen clients fail by ineffectively planning this assessment phase. If you do nothing, your costs are going to continue to rise; executing a transformation plan is critical. More


security stock solutionsMr. Jason Hart
CEO
Identiv
www.Identiv.com

Identiv’s uTrust products enable business executives and security leaders to make the paradigm shift from patchworked identity systems to a unified, simple, efficient identity solution that delivers higher security and resistance to obsolescence, for both premises and information access. Our uTrust products are unique in the marketplace as they are designed, tested, and supported to work together. No matter where a customer starts, Identiv provides the confidence that they can build a complete system in which everything works together.  Identiv’s idOnDemand service is a turn-key cloud-based platform that makes establishing a trusted ecosystem across all lines of business, geographic locations, devices, and people simple and convenient. Central to the idOnDemand service is the certification authority that issues PKI certificates — the standard for secure communications through the internet, banks, and high-security cryptographic applications within and outside the U.S. government for the last 20 years. By combining PKI with purpose-built secure hardware such as a smart card, USB token, or other devices, like mobile, the certificate’s private key is not only protected in a high state of security, but is also portable across devices and services, enabling pervasive use of strong identity whenever (and wherever) required. More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More


security stock solutionsMr. Thomas Hitzer
Head of Product House
SMARTRAC TECHNOLOGY GROUP
www.SMARTRAC-GROUP.COM

It’s safe to say that SMARTRAC has the broadest product portfolio in the RFID industry. Encompassing basic UHF tags for retail use, contactless card products for transportation, banking and access, animal and automotive transponders and complex, high-security products for eGovernment purposes, SMARTRAC can satisfy any demand. SMARTRAC excels in technological versatility, enabling tailored solutions such as dual-interface cards. No matter what frequency range they prefer, customers can choose between different antennas and manufacturing technologies. Furthermore, our production resources ensure security of supply for quantities of up to billions of pieces per year. More


security stock solutionsMr. John Diamant
Distinguished Technologist, CISSP, CSSLP
HP Secure Product Development & Application Security Strategist
HP Enterprise Services, U.S. Public Sector, Cybersecurity Solutions

Attackers are better funded and more motivated today than they were in decades past. It used to be that the primary motivation of attackers was fame or just to prove that they could successfully exploit a vulnerability. Today, a large percentage of attacks are motivated by identity theft, credit card theft, industrial espionage, cyber warfare or “hactivism”, and some are Advanced Persistent Threats (APTs). In these cases, the motivation is significant financial, political or strategic gain and, as a result, the attackers are often well funded and more sophisticated. More


security stock solutionsMr. Will Geoghegan
Cloud Architect
TPS5 Cloud & ISV Partner Solutions
Fujitsu Americas
Fujitsu ISV Cloud Program

Fujitsu has a long and demonstrated history delivering world-class solutions that enable businesses to succeed in a highly-competitive market and ever-evolving technology landscape. The Fujitsu Cloud ISV Partner Program is one more way we’re delivering exceptional value to our customers, where we focus on helping companies transform and deliver their solutions in an “as-a-service” model from our cloud. Our aim is to work closely with leading solution providers to take full advantage of not only our platform and tools, but the underlying shift in how the market consumes technology solutions today. With the Fujitsu Cloud ISV Partner Program, we offer the chance for solution providers to step into a leadership role and maximize the benefits of the latest cloud technology, including not only the transformation and delivery of their solutions as SaaS, but also for support in areas like sales, marketing, professional services, and across innovative operating and revenue models that support a “zero cost” option for the partner.  More


security stock solutionsMr. Matt Barnette
President
AMAG Technology
www.amag.com

We are thrilled to be a part of the Hudson Yards project so early on in the process.  This project when finished will be the largest real estate development in Manhattan since Rockefeller Center.  Five office towers, 5,000 residences, 100 shops, 20 restaurants, and 14 acres of public space will reside over Hudson Yards, taking up six city blocks.  Symmetry will be installed in the first tower, which is being built now.   Bank of America will be installing AMAG’s Symmetry OneFacility cloud solution, SymmetryCONNECT that will tie the banks disparate security systems together.  The overlay delivers one dashboard so security personnel only have to learn one security system and use one set of data.  As the bank upgrades, it will install AMAG’s Symmetry SR Retrofit solution, saving the bank thousands of dollars on hardware. Yale University has also chosen the Symmetry SR Retrofit solution.  The three to five year project will include new installations, as well as retrofit upgrades to replace its legacy Casi Rusco security system.  Evans Hall, home to the School of Management, was the first building integrated into Yale’s new security system. The new Symmetry system will manage 120 proximity card readers and 100 cameras to serve 16 classrooms, 22 breakout rooms, three library spaces, 13 interview rooms and office space for roughly 120 faculty and 195 staff. Approximately 7,000 doors will be converted to Symmetry when the project is completed. More


security stock solutionsMr. Aria Kozak
President and Chief Executive Officer
Elite Interactive Solutions, Inc.
www.EliteInteractiveSolutions.com

Many people in the industry know me as the Father of Remote Guarding. This is a term I was using twenty years ago. Today, this refers to providing security of any property, anywhere in the country by remote, command center based agents. . But Elite has taken this idea and expanded it beyond what anyone else, to my knowledge is doing. We do this through a proprietary combination of staffing, guided processes, client-facility based systems and our world-class Security Operations Command Center (our SOCC). The client’s system design is based on our detailed site review and forensic analysis. The resulting specifications include video cameras converted by military grade software into undercover digital guards that monitor and protect the property’s perimeter and further defined interiors.  Once this system is installed, we connect the site to the SOCC via the internet to support operation by highly trained Command Center agents. Armed with our command center’s state-of-the art systems and tools, Elites agents remotely secure any facility, anywhere in the United States.  More


security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.
www.strikeforcetech.com

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More