Breaking News:

Hackers Take Advantage of Zoom's Popularity to Push Malware More

Marriott data breach exposes over 5 million people: Latest major security hack More

Should governments track your location to fight COVID-19? More

Cyber Security Today - A roundup of work from home online safety tips, and more More

Apple Confirms 30 Compelling Security Reasons To Install iOS 13.4 Right Now More

Are Zoom and Houseparty safe? How the privacy and security of video meeting apps compare More

White House Releases National Strategy for 5G Security More

Tokyo Olympics Postponed, But 5G Security Lessons Shine More

Chinese Hackers Exploit Cisco, Citrix Flaws in Massive Espionage Campaign More

Hijacked routers and attempted WHO hack highlight latest COVID-19 attacks More

The impact of COVID-19 on public networks and security More

Contribution of Blockchain to Cybersecurity More

Companies Offer Free Cybersecurity Support to Combat Threats Posed by COVID-19 More

Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic More

Virtual security conferences fill void left by canceled face-to-face events More

Microsoft's Major New Browser Security Move Reveals Serious COVID-19 Impact More

Protecting Remote Workers From Cyber Threats More

Data Privacy and Security in the Travel Industry More

Ransomware Groups Promise Not to Hit Hospitals Amid Pandemic More

COVID-19 related threats, cybersecurity implications of working remotely More

Security Breach Disrupts Fintech Firm Finastra More

Report: 2020 will be transformational year for security More

Avoiding Security Vulnerabilities While Working At Home More

The Coronavirus is Already Taking Effect on Cyber Security - This is How CISOs Should Prepare More

COVID-19 brings new security challenges and new allies, says HackerOne CEO More

Russian cybercrime forums seen selling malware-sabotaged COVID-19 map More

A list of security conferences canceled or postponed due to coronavirus concerns More

Hackers are using coronavirus maps to infect your computer More

The Security Challenges of the Cloud More

Windows 10 Alert: Critical And Unpatched Security Threat Confirmed More

Cybersecurity Has A People Problem More

Two People Who Attended Cyber Event Contract Coronavirus More

Five reasons why COVID-19 will bolster the cyber-security industry More

T-Mobile Reveals Security Breach, Customers' Data Exposed More

A novel pandemic security is no match for a novel virus More

Intel CPU Security Alert For Millions Of Users As 'Unfixable' Crypto Flaw Revealed More

McAfee Acquires Browser Isolation Firm Light Point Security More

Security of Health Information More

Ethical hackers swarm Pentagon websites More

Six Unfolding Climate Scenarios That Keep Security Experts Up At Night (Including Pandemics) More

The Importance Of Security Architecture And Attack Surface Analysis More

Samsung Reveals Galaxy S20 Security Surprise More

WhatsApp Security: Is This Hidden Flaw A New Reason To Quit? More

Blockchain Storage Offers Security, but Leaves Data Transparent More

PayPal, passwords and Wi-Fi: 11 tips for better digital security More

Facebook sues data analytics firm OneAudience over malicious SDK More

Coronavirus Fears Evident as RSA Kicks Off in San Francisco More

10 steps to smarter Google account security More

McAfee acquires Light Point Security team to bring browser isolation tech to MVISION UCE More

Critical PayPal Security Hack: Multiple Thefts Now Reported-Check Your Settings More

The Future of Security: Ransomware Hits Pipeline Operator More

Climate change could pose 'catastrophic' security threat, experts warn More

Cybersecurity alliance launches first open source messaging framework for security tools More

6 steps to a secure Windows 10 device, because the security defaults aren't enough More

Reduce Cloud Security Complexity With Zero Touch Automation More

Mastercard opens European security resilience unit More

SaaS and DSaaS Vendors Combating Cyber Security and Data Privacy Challenges More

Forbes' Road To The Cloud - Architecture, Security And The Refactor More

Three API security risks in the wake of the Facebook breach More

How to Balance Online Security and Convenience More

White House Official Says Huawei Has Secret Back Door to Extract Data More

Government Report Says Census Bureau Is Behind On Staffing Up And Cybersecurity More

New Legislation Would Help Local Gov with Cybersecurity More

11 Best Security Conferences to Attend in 2020 More

Apple Watch Users Could Be About To Get This Awesome New Security Feature More

Cybersecurity Jobs Going Begging As College Computer Science Grads Lack Skills/Experience Says House Leader More

Deep Instinct nabs $43M for a deep-learning cybersecurity solution that can suss an attack before it happens More

AI, automation, and the cybersecurity skills gap More

To Break The Rules Of Cybersecurity, You Must Know The Rules Of Cybersecurity More

WhatsApp Bug Allows Malicious Code-Injection More

Facial-recognition tech questioned, defended at House committee hearing More

Airport Security Concern As 97% Of World's Top 100 Fail Cybersecurity Test More

Facebook Vows to Improve Security After Hack of 29 Million Users More

Best cheap home security in 2020 More

Cloud Companies Chase Future in Cybersecurity 'Wild West' More

US Space Industry to Launch Cybersecurity Portal More

IoT security: Your smart devices must have these three features to be secure More

Smaller Companies Need to Step Up Their Cyber Security Efforts More

Why Elections Officials Aren't Taking A Simple Security Step More

Huawei is a cyber-security risk More

Cisco Webex Flaw Lets Unauthenticated Users Join Private Online Meetings More

The Great E-Scooter Hack: New Research Exposes Security Risk for E-Scooters and Riders More

Microsoft Leaves 250M Customer Service Records Open to the Web More

Facebook's Sir Nick Clegg criticised over WhatsApp security More

Euro Cup and Olympics Ticket Reseller Hit by Malware More

Over 2000 WordPress Sites Hit by Malicious Redirects More

Data on 30,000 Cannabis Users Exposed in Cloud Leak More

2020 cybersecurity predictions: Evolving vulnerabilities on the horizon More

Apple Addresses iPhone 11 Location Privacy Concern More

Google finds security flaws in Apple's web browser: FT More

Microsoft Exposes 250 Million Call Center Records in Privacy Snafu More

The best home security cameras of 2020 More

US elections remain vulnerable to attacks, despite security improvements More

Data on the rise: 4 new challenges security must master More

Could this firm have found a breakthrough in security? More

How to use a physical security key to sign into supported websites More

This new startup aims to make developers love security More

Windows 7 'Crazy High' Security Risk As Crypto Exploit Found In Audio Files More

Security 2020: 4 trends to watch More

One big mistake you're making that puts your online security at risk More

Google Android Security: Are Users About To Get This Essential Feature? More

TSA Desires "Cybersecurity by Design" More

Why Prioritizing Cybersecurity Makes Compliance Easier More

Broadcom sells Symantec's Cyber Security Services business to Accenture More

Cloud stocks rise as Salesforce hits new high, cybersecurity rallies on Iran concerns More

Smart-device maker Wyze confirms data leak that could affect millions More

F5 Networks to acquire Shape Security for $1 billion More

Three Things To Consider In The 2020 Cybersecurity Landscape More

F.B.I. Asks Apple to Help Unlock Two iPhones More

Security Predictions for 2020 More

Apple iOS 13: Are New Security and Privacy Features Killing iPhone Functionality? More

Facebook Security Debacles: 2019 Year in Review More

2019 Apple Platform Security guide shows what it is doing to 'push the boundaries' of security and privacy More

Facebook separates security tool from friend suggestions, citing privacy overhaul More

How to Prepare for Tomorrow’s Security Threats Today More

Smart lock has a security vulnerability that leaves homes open for attacks More

Convenience Vs. Security: Is It Possible To Have Both? More

Predictions for cyber security in 2020 More

These kids' smartwatches have security problems as simple as 1-2-3 More

Apple's New Warning For Millions Of iPhone Users More

Cyber Monday is here, YouTube CEO defends recommendation system More

5G IoT security: Opportunity comes with risks More

Office 365 To Get Microsoft Recommended Security Profiles More

Huawei ban: Full timeline as FCC bars Chinese companies from billions in federal subsidies More

The best home security cameras of 2019 More

Google Confirms Android Camera Security Threat: 'Hundreds Of Millions' Of Users Affected More

This App Knows If Your iPhone Has Been Hacked-Do You? More

Facebook's massive fake numbers problem More

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks More

Google Confirms Play Store Security Threat: Here's The Fix-But Does It Make You Safer? More

Microsoft urges us to patch after partially effective BlueKeep attack More

Real-World Cybersecurity: Keeping Ourselves And Our Children Safe More

10 Charts That Will Change Your Perspective Of AI In Security More

Microsoft announces security, identity, management, and compliance updates across Azure and Office More

Android Security Threat As 'Unremovable' Malware Infects 45,000 Phones So Far More

How To Secure Your iPhone: 12 Experts Reveal 26 Essential Security Tips More

Government Officials Hacked Via WhatsApp More

The changing face of Cyber Security More

Apple iOS 13.1.1 Release: Should You Upgrade? More

Facebook releases new election security features for the 2020 US presidential election More

Former Twitter CISO shares his advice for IT security hiring and cybersecurity More

How AI Battles Security Threats without Humans More

Samsung Warning: New Galaxy S10 And Note 10 Critical Security Update Confirmed More

Microsoft Announces Important Security Update For All Windows 10 Users More

Facebook Sweetens Deal for Hackers to Catch Security Bugs More

Google Cloud brings Security Health Analytics into beta More

Are smartphones really listening to us? Security firm conducts test to find out More

Twitter 'Inadvertently' Gives User Security Data To Advertisers More

Critical Microsoft Remote Desktop Flaw Fixed in Security Update More

U.S. AG Wants Legal Back Door to All Facebook Postings (and Everything Else) More

Alliance including IBM and McAfee aims to make cybersecurity products interoperable More

Using Cyber Security As A Competitive Advantage More

BlackBerry's new lab wants to add more machine learning to security More

Classic iPhone Leaks, iPhone 11's Hidden Features, Damaging iOS 13 Exploit More

So Easy, Even A CEO Can Understand It: A Call For Greater Clarity In Cybersecurity More

New Cybersecurity Companies Have Their Heads In The Cloud More

Huawei: Network security requires carrier, vendor and government collaboration More

Huawei: Network security requires carrier, vendor and government collaboration More

The iOS 13 Privacy and Security Features You Should Know More

Akamai Acquires KryptCo, Enhances Cloud Security Portfolio More

WeWork's weak Wi-Fi security leaves sensitive documents exposed More

Windows 10 Security Warning As Microsoft Confirms Update Breaks Windows Defender More

Huawei Suspended From Global Forum Aimed at Combating Cybersecurity Breaches More

Chicago Brokerage to Pay $1.5 Million Fine for Lack of Cybersecurity More

An Unprecedented Cyberattack Hit US Power Utilities More

'Simjacker' Attack Can Track Phones Just by Sending a Text More

Cloud (In)security: Protecting Your Business Across Multiple Platforms More

Google Finally Confirms Security Problem For 1.5 Billion Gmail And Calendar Users More

Apple defends iOS security in new statement, takes issue with Google Project Zero findings More

WordPress 5.2.3 fixes new clutch of security vulnerabilities More

Apple Security Warning As iOS 13 Leaves Millions Of iPhones At Risk More

Bitcoin Warning As Serious Security Vulnerabilities Uncovered More

McAfee CEO Chris Young Contemplates The Future Of Cyber Security More

Bitcoin Warning As Serious Security Vulnerabilities Uncovered More

Apple Just Gave 1.4 Billion Users A Reason To Quit Their iPads, iPhones More

Google reveals major iPhone security flaws that let websites hack phones More

WordPress plugins hacked for fake admin accounts More

Apple Tightens Privacy Rules on Siri Recordings After Backlash More

Identiv Focuses on Setting Technology Strategy and Improving Cyber-Resiliency of the Physical Security Industry More

Why You're Smart to Buy Shares in This Security Company More

TSA's New Restrictions For Flight Crew Security More

Instagram Security Warning: Millions At Risk From 'Believable' New Phishing Attack More

Sorry, readers. Your Bluetooth device is a security risk More

Building resilience against e-mail security threats More

Telegram's 300 Million Users Could Soon Be Trading Bitcoin And Crypto - Despite Serious Security Warning More

The Impact of Artificial Intelligence on Cyber Security More

The Android 10 Privacy and Security Upgrades You Should Know Abou More

MoviePass Confirms Security Lapse May Have Exposed Customer Credit Card Data More

Ransomware Attack Hits 23 Texas Towns, Authorities Say More

Trump reiterates Huawei as 'national security threat' More

Blockchain is not a magic bullet for security. Can it be trusted? More

Google Nest Security Cam Bugs Allow Device Takeover More

Why the growth of cybersecurity in healthcare may not prevent data breaches More

Capital One Cyber Staff Raised Concerns Before Hack More

Data breaches increased 54% in 2019 so far More

More Focus on Security as Payment Technologies Proliferate More

Security Experts Find That Latest DSLR Cameras Are Vulnerable To Ransomware Attacks More

Apple will hand out unlocked iPhones to vetted researchers More

How government agencies can up their cybersecurity game More

The importance of cybersecurity education More

Pelco Provides Meaningful Cybersecurity More

Three Reasons Why Collaboration Apps Can Be A Security Minefield More

Apple may soon hand special iPhones to security researchers More

It's not just Equifax: Here's every major security breach and data hack so far More

Apple Hands Hackers Secret iPhones In A Bid To Boost Security, Sources Say More

What We Can Learn from the Capital One Hack More

Facebook fined $5 billion by FTC, must update and adopt new privacy, security measures More

Equifax to pay up to $700 million to settle state and federal investigations into 2017 security breach More

Software, Security And The Future Of Market Dominance More

Comparing 5G to Wi-Fi 6 from a security perspective More

Cybersecurity in the Age of the Internet of Things More

WhatsApp, Telegram had security flaws that let hackers change what you see More

Security Flaw Exposed Valid Airline Boarding Passes More

Security, safety tips to keep in mind ahead of Trump's Greenville rally More

Infographic: Why email is your weakest security link More

Confirmed: Amazon Prime Day Security Problem In The Wild More

Cybersecurity: Is your boss leaving your organisation vulnerable to hackers? More

Google keeps track of anything you've ever bought using Gmail, even if you delete emails More

Privacy and security risks as Sign In with Apple tweaks Open ID protocol More

The Huawei muddle: Where national security meets Trump's transactional worldview More

The security and prosperity paradox, shoplifting edition More

Professor uncovers key metric that puts Huawei and security risks back in spotlight More

Apple Users Warned About iOS 13 Security And Privacy Problem More

Facebook's Libra Lacks Foundational Components for Crypto Key Security More

YouTube's 'instructional hacking' ban threatens computer security teachers More

5 tips to stay secure on social media More

Cloudflare outage takes down a large portion of the internet More

6 ways smaller health systems are falling behind in cybersecurity: CHIME-KLAS survey More

Ask these cybersecurity questions More

These 11 Facebook privacy tweaks put you back in control More

Message to IT: Trusting Apple and Google for mobile app security is career suicide More

We are much less security savvy with our smartphones than we think More

The Best Firefox Extensions for Online Safety and Security More

Microsoft asks to join private Linux security developer list More

Myspace Employees Used to Spy on Users More

7 steps to enhance IoT security More

Mozilla patched two Firefox zero-day flaws in one week More

Amazon Web Services rolls out Control Tower and Security Hub, courting big business customers More

Democratising technology for cyber security and the power of AI More

How Cybersecurity Is Turning Users Into Security Experts More

Critical Security Warning For iPhone Users More

Strangers could have been watching your home security camera More

Security vulnerabilities found in three quarters of mobile apps More

JP Morgan Chase spend $600 million a year on cyber security threats... More

Disgruntled security firm discloses zero-days in Facebook's WordPress plugins More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsPeter Ford
Director, Northeast Region
G4S Corporate Risk Services

Plan, plan and plan early. If the C-Suite decides to attend a big event overseas at the last minute, have a basic security plan for large events already organized so all you have to do is fill in the blanks. Use the resources that the U.S. government provides and the resources that professional security firms provide for these types of scenarios. Use your connections that you’ve made through OSAC, DSAC, ISMA, ASIS or LinkedIn to make your job easier.

Additionally, we can help plan your company’s events overseas by utilizing G4S’ Corporate Risk Services large-event security expertise and G4S’ deep reach throughout the different regions of the globe (G4S is one of the largest employers in the world and is represented in around 90 countries).

Finally, I also strongly recommend professionals in our industry join the U.S. Department of State’s Overseas Security Advisory Council (OSAC), which can astronomically increase the safety of your personnel, your facilities and help you protect information. Please check out OSAC.gov or call (571) 345-2223 if you have any questions. 

Thank you for providing me this opportunity to discuss a topic I enjoy talking about. If you wish to discuss this topic further or if you need assistance in your company’s security program, I can be reached at: peter.ford@usa.g4s.com, or LinkedIn:  https://www.linkedin.com/in/peter-ford-8b841710/


security stock solutionsRobert Dodge
Executive Vice President
G4S Corporate Risk Services

G4S has a long legacy in the security industry that actually stretches back more than 100 years. During that time, the company has evolved with the industry, growing from a guarding company to the diversified and modern operation that it is today. We are security risk advisors, security software developers, installers and technicians, security officers and personnel who serve clients with deep expertise across most vertical markets.

The goal and mission of the ROC is to deliver cost-effective, risk mitigation solutions to our clients. What we've done with the ROC is combine our suite of Corporate Risk Services intelligence/travel risk management offerings, security command and control function with our formerly separate remote video monitoring services into a single location. This streamlines our operations and creates more value for our clients. It also puts us into a leading position in the industry because we have paired elite analysts with the latest AI-driven algorithms and technologies. The result is the early detection and timely response to a wide spectrum of threats the two hallmarks of competent risk management.

Today's threat landscape is persistent, complex and I would add that it is constantly evolving. We live in an age where we are flooded with information and clarity means power. Getting our customers what they need to know and when is a critical component of the modern global risk management landscape. That's where our AI platform comes into play by allowing us to separate the noise from the clear indications of risk, to get pertinent information and place it into context quickly so the best possible response can be initiated.


security stock solutionsMichael Zatulov
Chief Operating Officer
Elite Interactive, LLC

The key innovation for remote guarding is that we can quickly detect, observe, voice down, and dispatch first responders in real time, as the crime is taking place. Our systems use advance machine learning and AI algorithms in combination with professionally trained operators to supplement how alerts are addressed. As we are technology centric and not dependent on a multitude of cameras to cover the perimeter, our alerts are approximately 95% more efficient than traditional video monitoring companies and this results in more detainments and arrests. Here are some sample videos of how effective our systems are in deterring crime.


security stock solutionsRobin Harris
Chief Executive Officer
Applied Cyber Strategy Group

Many clients are referred to us for immediate support with onsite impromptu compliance audits from their current customers, prospects or industry compliance authority. Several clients are bidding a federal government or international corporate contract and need assistance responding to the RFP. Yet others are facing a stop work order until they can demonstrate a suitable cyber security posture and compliance with specific regulations. We assist our clients at any stage of their operations and their journey begins with relief upon initial engagement with us. Cyber security can keep you up at night. We take time to care. We listen to understand all the requirements, pain points and urgency clients face. Each client is assigned a strategic risk management team consisting of a privacy lawyer, cyber security expert, business analyst and program manager experienced in the client's industry. The core team leads the strategy for compliance and risk management solution. They also engage additional resources as necessary to support success. We help clients win business. A cyber-attack can cost an organization a fortune in fines, reputation and prison time for executives. Without cyber security companies lose revenue opportunities. We support their targeted growth strategy. The investment in cyber security not only meets compliance but yields a return on that investment


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

ImageWare Systems, Inc.  (OTCQB: IWSY), a leader in mobile and cloud-based identity proofing and biometric authentication solutions, announced it has successfully been audited for  Service Organization Control 2, conducted by NDNB Assurance LLP, a leading SOC-2 auditor.

Completion of the SOC-2 audit demonstrates that a qualified third-party firm has provided an unbiased examination of ImageWare Systems’ processes and practices for assuring that its platform is safe and secure.

“Protecting our customers’ data and privacy is our highest priority,” said Jim Miller, CEO, ImageWare Systems. “SOC-2 compliance is widely recognized as a benchmark of security, and we’re very proud to have third-party validation that our processes are secure.”

SOC-2 is considered the industry standard for information security and held only by organizations with a rigorous and demonstrated commitment to protecting user data. It was developed by the American Institute of CPAs (AICPA) and was specifically designed for service providers using the cloud for services such as data hosting and data processing.

In addition to SOC-2, ImageWare Systems provides software that is designed and built to support many U.S. and international standards and guidelines including GDPR, CCPA, PSD2, PCI, and FIPS 140-2 (level3).

For more information, please click here.

security stock solutionsRoger Thornton
VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

AT&T started down this path years ago by building a best-of-breed Cybersecurity Consulting practice and Managed Security Services business serving customers of all sizes, across industries, and around the world. Combined with its network visibility across the threat landscape, AT&T has been well-positioned to take a unique role in cybersecurity.

With the acquisition of AlienVault, AT&T Cybersecurity will continue to deliver on our joint vision to address these “seams” and uniquely bring together people, process, and technology through a “software defined” unified security management platform. A platform that integrates, automates and orchestrates a wide spectrum of best-of-breed point security products.

By abstracting much of the management of individual security products, we are automating deployment and ongoing operations, and operating them as a single unified solution - much in the same way AlienVault had done with the critical capabilities required for threat detection and response.  This platform will use the technical capabilities and reach of AT&T’s Edge-to-Edge intelligence in order to deliver solutions as on-demand digital services optimized to help protect customers through their own digital transformation journey.

We will accomplish this through collaboration with AT&T’s industry-leading Chief Security Organization, our impressive list of industry partners and through the integration and automation of AT&T Alien Labs threat intelligence.  The combination of Open Threat Exchange now curated by Alien Labs and AT&T’s incredible breadth and depth of threat intelligence will create one of the world’s leading threat intelligence platforms!


security stock solutionsDavid Harding
SVP & Chief Technical Officer
ImageWare Systems, Inc.

The ImageWare Digital Identity Platform combines the most robust identity proofing capabilities with the broadest and most complete set of multi-factor and biometric authentication methods. We have always had a robust platform and a robust set of products for two-factor and multi-factor identity authentication as well as full identification capabilities. But now, with complete integration of all these products, all factors of identity proofing and authentication are combined into a cohesive product set. This allows our customers to create and manage digital and biometric identities using fully vetted government issued documents, reliable biometric authentication, and a fully managed digital identity life cycle. More

security stock solutionsRachelle Loyear
Vice President

About three years ago, G4S in the Americas started focusing on how we can bring the most value to our customers by ensuring we look at their needs from a perspective of holistically managing their security risks, not merely "selling a product." From that initial focus, we have built out our G4 operational management approaches across the business units, as well as our G4S Integrated Practices. That approach ensures we truly understand our customer's organization - the resources they need to protect, the risks those resources are exposed to, and the level of risk the organization is willing to tolerate - before we attempt to suggest any security services or products. It's an approach that makes both security sense and business sense, because we recognize that our security partners in every organization we work with need to work within the structure of their business. We use our approach to support our customer's overall business needs, by using security tactics to enable the ongoing capacity of the business to complete its primary mission. More

security stock solutionsAria Kozak
President & CEO
Elite Interactive

The benefits of Remote Guarding are numerous. With Elite, our clients build strong relationships with local law enforcement and receive priority response since dispatch knows that they are responding to an actual crime in progress and that officers will be guided remotely as they enter the scene and ultimately apprehend the suspect.

Our clients also realize cost savings and who doesn't appreciate that? Savings through reduction or elimination of Security Guards cost, Loss and Theft Prevention, Elimination of false alarm expenses, and insurance premium reductions.

Incident and accident claims from customers or employees can be extremely expensive for any business. Insurance companies will often opt to pay a large settlement simply because there is no hard evidence defending your position. Workers Compensation expenses continue to grow. Elite captures, stores and retrieves video in an organized, very user friendly and easily searchable manner. Employee accidents, customer incidents and other occurrences can be found, retrieved and archived for later use, including critical evidence for use in court or otherwise.

Elite Remote Guarding Solutions can increase employee productivity, helping you utilize virtual management tours, remotely access any site and conduct your own inspections. Staff perform better when they are monitored, and recorded video can be used to verify compliance with policies, procedures, dress codes, training, and other business process adherence concerns. It will also help ensure your customers are serviced professionally, courteously and in a timely manner.


security stock solutionsRobert R. Ackerman, Jr.
Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed. More

security stock solutionsAndrew Schonzeit

Implementing a successful ID card program can be overwhelming and there is usually a lot more involved than just buying a card printer. Customers choose Idesco because they can come to us with any ID project and we can spec it in record time and provide them with all the products and services that they need. From ID card printers, printer supplies and badge accessories to any type of technology cards, we got it all. We also have a team of technicians who provide unparalleled support for everything that we sell. Our expertise allows us to assist each customer with their unique needs and we are here to help at all times. For example, we work with many schools, colleges and universities that rely on us to provide them with the best card printers and technology cards to issue student IDs, staff IDs and visitor badges on demand in the most effective and secure way. We also work with healthcare facilities that need to have their ID card system running at all times and rely on us to answer any questions or fix any issues that they may have in a timely manner. Government agencies need the most secure and durable ID card solutions and trust us to deliver them and keep them up-to-date on the latest technology. We always want to bring true value to our clients and that's what we focus on. More

security stock solutionsBruce K. Taragin
Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise. More

security stock solutionsKurt Takahashi
AMAG Technology

For the past few years, AMAG Technology has been transforming into a total unified solution provider that provides open solutions. Our history shows we've been known as primarily an access control company with a proprietary system, and our older panels support that statement. But that is no longer correct. About three years ago, we released Symmetry CONNECT. Symmetry CONNECT is a policy-based identity management platform that helps organizations of all sizes to manage the identities of their employees, visitors and contractors and requests, recertification, audits and compliance. This was a turning point product for us, and one that set us on a new course. Today, other access control companies refuse to provide their API to Symmetry CONNECT to interoperate. However, PLAI will allow CONNECT to inter-operate to those companies who want to be open.

This affordable, open platform operates in the cloud and helps companies with onboarding, offboarding, access Our next release was Symmetry GUEST, our web-based visitor management system, which automates how organizations manage visitors. This open platform provides an audit trail to track all visitors, meet compliance and improve a visitor's overall experience. The GUEST API is available to any company that would like their solution to inter-operate. Our brand new Symmetry M4000 panel uses an onboard Linux operating system with an open API. Linux is an open-source software operating system. Any company is able to integrate their access control software solution to the M4000. Our Symmetry CompleteView Video Management System has always been open. It operates with countless camera manufacturers and access control systems, including AMAG's Symmetry Access Control system. More

security stock solutionsManfred Mueller
Chief Operating Officer

Our transponders are powering the IoT. We're dominating the NFC and mobility space, access and transport, events and leisure, library applications, gaming and vending, loyalty and payments, strong authentication, and health and pharma. Specializing in custom design, our tag portfolio covers anything and everything our customers can dream up. That includes HF and UHF inlays, standard and Tag on Metal labels, tickets for transportation, ski lifts, events, and more, tokens for transit and asset tracking, and library labels for books, CDs, DVDs, and tablets. We build miniaturized labels for cosmetics and pharmaceuticals, giant NFC transponders, NFC stickers for mobile devices, and our uTrust Sense Temperature Tracker tracks the temperature of practically anything. More

security stock solutionsHoward Johnson
Chief Operating Officer
AMAG Technology

We are close to completing the transition from being a product-led business to a solutions-led business. The breadth and sophistication of the product set we have is becoming difficult for the traditional integrator to communicate to their user base. Increasingly, the product manufacturer needs to be involved in selling the solution to ensure the requirements are met and the value proposition is fully explained.

We are finding complementary markets for our products where integration opportunities are helping companies with different aspects of their businesses. For example, intrusion integration, fire integration, BMS, space management and heat and light are all part of security. Our Symmetry products can integrate with these solutions and help users meet compliance, mitigate risk and save money. Our long-term strategy remains the same: to be a long-term valued partner and provide continuous value to our customers. More

security stock solutionsDov Yoran
Sr. Director, Strategy & Business Development
Security Business Group

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers. More

security stock solutionsSteven Humphreys
Chief Executive Officer

SecuritySolutionsWatch.com: Thank you for joining us today, Steve. One will read at Identiv.com, that “ Identiv’s mission is to secure access to the connected physical world: from perimeter to desktop access, and from the world of physical things to the Internet of Everything.“ Seems to us that significant traction has been achieved with one (1) billion transponders deployed, 5,000 customers, $500 million of equipment in the field, 400 hundred partners. Impressive metrics, indeed! Care to elaborate? Steve Humphreys: Absolutely… and thanks so much for inviting me to tell Identiv’s story. I think we’re all familiar with the convenience of the digital world — the world where Netflix knows what you want to watch next and Amazon knows what you're going to buy next. Identiv’s vision is to bring the benefits of the digital world to the physical world. We have a variety of products and go-to-market strategies that are putting us in a leading position to deliver those benefits. We see a major market opportunity as the physical world goes online, and we want to be the leading platform to get there. That's a big statement to make for a small company, but as you pointed out with those metrics, we’re in a great position to do just that. More

security stock solutionsGraham Porter
Business Development Director EMEA
Dell EMC
Surveillance and Security

The Munich Airport system is a paradigm among airport security systems. It was designed around a single centralized and virtual data archiving system, accessible to anyone with permission anywhere on the airport network, and uses behavioral analytics to trigger alarm, camera management (zoom into the picture, follow a suspect, increase image resolution etc.) thereby reducing the number and scope of ‘People-Watching-Cameras’ and providing a massive saving for the airport operators. The system installed was placed by a Dell EMC partner in a public competitive RFP, so value as well as functional excellence was a determinant of the solution choice. We are given permission to reference this system and use it for show-&-tell visits and in our sales meetings with new and existing Customers. The airport has since expanded the system beyond the original scope and size of the original purchased hardware, emphasizing their commitment to our solution and their happiness with it. More

security stock solutionsMr. Tom Kellermann
Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.More

security stock solutionsMr. Joseph Grillo
Founder and CEO

The access control and intrusion market is still a fragmented landscape, so yes, I think consolidation will continue to make its impact on the industry. Mobile credentialing seems to be a hot topic for the industry, along with the continued focus on cloud-based technologies. The demand for these solutions comes from customers wanting new levels of security and convenience while protecting critical data. With regards to mobile credentials, however, there's still a lot that needs to be done to develop this technology further, and as a result, many companies are choosing to implement hybrid solutions that offer mobile as an option. Another trend we will continue to see is a greater focus on integrated solutions; more video tied into access control, for example. We'll also see the increased use and installation of wireless locks to more doors as a means to reduce cost.More

security stock solutionsMr. John S. Shegerian
Executive Chairman

Be it a government official’s laptop, a family smartphone or a business tablet, technology today is far too vulnerable to criminal attacks. Our personal privacy, businesses’ proprietary information and even data pertinent to our national security are at stake. The key is for everyone to remember to safely recycle all old and unwanted items at the end of their lifecycles with a trusted recycling company. This final step in the life of an electronic device is now more important than ever.More

security stock solutionsMr. Ken Mills
General Manager
IoT and Surveillance

Public Sector continues to be a key vertical for us. With the demand in public safety at an all time high, the need for cost effective and proven solutions has never been greater. We are seeing strong demand for our Public Safety Data Lake solution built on Isilon. Customers are pushing back on closed single vendor solutions are looking for reliable open platforms for evidence management whether they are deploying on premises or in the cloud. Dell EMC is focused on building solutions that allow our customers choice in how they manage their evidence data. We are also seeing strong demand in airports across the world as airports look to modernize their infrastructure. We are also going to continue to bring the Dell EMC value to our enterprise and commercial customers across the globe... More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More