In The Boardroom Press Room About Us Research Reports Contact Us


security stock solutionsWill Wise

Group Vice President Security,
Public Safety, Transportation
& Casino Gaming

Reed Exhibitions

There has been positive momentum over the last month which is creating renewed optimism and a clear road map to get back to in person trade shows in Las Vegas by June this year. The COVID case numbers have been decreasing significantly, and US vaccine rollouts have been scaling up rapidly, including all tiers of citizens 18 years+ to be eligible by May 1.

> More

security stock solutionsJohn Becker

Vice President of Global Sales
AMAG Technology

We continued to innovate in 2020 and launched Symmetry Business Intelligence. Our customers had been asking for a way to track behavior abnormalities, and we delivered an analytics solution that helps identify identities that may pose a high risk to an organization. It also tracks facility occupancy and office usage for high-traffic areas, which provides data needed to help meet occupancy guidelines imposed by governing authorities, enforce physical distancing and determine cleaning schedules. 

In 2021, we will continue to listen to our customers and develop and enhance our open and diverse product platform. No one in the industry offers such an innovative and comprehensive solution set. It’s important to AMAG to support our customers with solutions that not only protect employees, assets and buildings but also positively impact business operations. We will continue to innovate with AI, analytics and mobile solutions to help mitigate risk, reduce costs and ensure compliance.

> More

security stock solutionsBradford Rand

CEO & President
TECHEXPO Top Secret Cyber Security Summit

When the entire live in-person conference industry came to an immediate halt, my team and I quickly created a series of Cyber Security Briefings to help maintain its goal in educating executives called the “Power Hour”. Similarly to their live events they featured experts from The FBI, The US Secret Service and Dept. of Homeland Security / CISA. Hosted on one of the most secure and trusted virtual platforms, Cisco WebEx; these complimentary, invitation-only webcasts offered senior level business executives information on the latest cyber threats facing their companies as they worked from home during the peak of this pandemic. In addition they provided insight on best practices and technical solutions from top companies such as IBM, Google, Artic Wolf, Proofpoint, Mimecast, Duo Security, Check Point, Darktrace, KnowBe4 and more.

> More

security stock solutionsMatt Barnette

PSA Security

I plan to continue to grow on the successes that PSA has had under Bill’s leadership. PSA is structurally a very sound organization that, like others, needs to continue to grow and innovate to remain relevant in the future. For PSA that means helping our integrators continue to adopt a recurring revenue model, install cloud-based solutions and be leaders in cybersecurity. Our industry has fared better than most through the pandemic, but PSA must continue to find products and services for our members so they can meet the ever-changing needs of their end users.

> More

security stock solutionsRoget Thornton

VP of Products & Technology
AT&T Cybersecurity

Digital transformation - the movement of critical computing from the data-center to the cloud -  is driving rapid changes in business models and network architectures. It also drives changes in how cybercriminals operate, making it easier for them to harvest data and launch automated attacks at scale. The mismatch between changes in cybercrime sophistication and the relative stagnation in cybersecurity approaches is apparent as organizations continue to suffer data breaches. According to a survey presented in AT&T Cybersecurity Insights, 88% of respondents had reported at least one type of security incident or breach in the last year.

The root cause? Dispersed networks, an explosion of data, disparate technologies, complex security operations present cybercriminals with gaps or “seams” in organizations’ security postures. Fighting cybercrime requires a coordinated and collaborative approach orchestrating best-of-breed people, process and technology.

> More

security stock solutionsJoseph Young

Senior Vice President, Innovation & Product Management

In response to the disruption to business that COVID-19 caused, many companies had more questions than resolutions. When we spoke with our customers to understand their risks and concerns, we quickly determined that helping customers through this journey should be a holistic, well thought through process.

As a result of the urgent need to slow the spread of the virus and keep employees safe with more stringent protocols than ever before, we saw companies and industry groups push products and solutions to do things they weren't originally designed to do in order to meet immediate needs.

For example, the temperature screening industry became a multi-billion dollar industry overnight. Most of the marketed solutions are not compliant to the guidelines that are coming from the FDA, CDC, OSHA, IOS & IEC, and that creates additional risk for our customers, both short and long-term. We've also seen guidelines rapidly change and evolve in a matter of weeks. As a result, we came to understand that without a comprehensive approach or plan, our customers would end up spending the majority of their time responding to immediate market drivers, and wouldn't be able to dedicate resources towards building a longer-term plan.

While some of our competitors were rushing to meet the immediate needs, we paused and took a moment to consider the bigger picture. We did a lot of research, met with strategic partners, reviewed control documents, ideated with customers via our Academy innovation forum and grounded all of that in a "jobs-to-be-done" framework. The end result is a comprehensive approach to helping customers mitigate risks during this pandemic, and also helping them to put process and technology in place that will meet their future needs.

> More

security stock solutionsRobert R. Ackerman, Jr.

Managing Director and Founder
Allegis Cyber

Experience continually reinforces the reality that the human element is the weakest link in cybersecurity. This means the most important proactive strategy of all is to train everybody in a corporation - and I mean everybody - in good cybersecurity practices, along with their contractors and vendors. All employees should not only understand what is expected of them regarding company security policy and good online behavior, but also be trained to spot nefarious or suspicious activity and to conduct periodic tests to ensure best practices are followed.

> More

security stock solutionsPeter Ford

Director, Northeast Region
G4S Corporate Risk Services

Plan, plan and plan early. If the C-Suite decides to attend a big event overseas at the last minute, have a basic security plan for large events already organized so all you have to do is fill in the blanks. Use the resources that the U.S. government provides and the resources that professional security firms provide for these types of scenarios. Use your connections that you’ve made through OSAC, DSAC, ISMA, ASIS or LinkedIn to make your job easier.

Additionally, we can help plan your company’s events overseas by utilizing G4S’ Corporate Risk Services large-event security expertise and G4S’ deep reach throughout the different regions of the globe (G4S is one of the largest employers in the world and is represented in around 90 countries).

Finally, I also strongly recommend professionals in our industry join the U.S. Department of State’s Overseas Security Advisory Council (OSAC), which can astronomically increase the safety of your personnel, your facilities and help you protect information. Please check out or call (571) 345-2223 if you have any questions. 

Thank you for providing me this opportunity to discuss a topic I enjoy talking about. If you wish to discuss this topic further or if you need assistance in your company’s security program, I can be reached at:, or LinkedIn: peter-ford-8b841710/

> More

security stock solutionsRobert Dodge

Executive Vice President
G4S Corporate Risk Services

G4S has a long legacy in the security industry that actually stretches back more than 100 years. During that time, the company has evolved with the industry, growing from a guarding company to the diversified and modern operation that it is today. We are security risk advisors, security software developers, installers and technicians, security officers and personnel who serve clients with deep expertise across most vertical markets.

The goal and mission of the ROC is to deliver cost-effective, risk mitigation solutions to our clients. What we've done with the ROC is combine our suite of Corporate Risk Services intelligence/travel risk management offerings, security command and control function with our formerly separate remote video monitoring services into a single location. This streamlines our operations and creates more value for our clients. It also puts us into a leading position in the industry because we have paired elite analysts with the latest AI-driven algorithms and technologies. The result is the early detection and timely response to a wide spectrum of threats the two hallmarks of competent risk management.

Today's threat landscape is persistent, complex and I would add that it is constantly evolving. We live in an age where we are flooded with information and clarity means power. Getting our customers what they need to know and when is a critical component of the modern global risk management landscape. That's where our AI platform comes into play by allowing us to separate the noise from the clear indications of risk, to get pertinent information and place it into context quickly so the best possible response can be initiated.

> More

security stock solutionsBruce K. Taragin

Managing Director
Blumberg Capital

One should think about security under the following framework:

Continuous authentication: 100% of fraud occurs inside authenticated sessions. This means that the login function is not really relevant anymore because fraudsters have found ways to bypass it, whether it is password, token or even a physical biometrics.

- Dynamic authentication: Most methods of authentication are static. Behavior by definition changes over time so one needs to deploy techniques that cannot be copied, stolen or otherwise used in a replay attack.

- Go beyond the endpoint. Applications and active sessions are incredibly vulnerable as fraudsters use social engineering scams and even phishing scams (where the legitimate person defrauds themselves under the influence of a fraudster).

- Recognize that humans are the weakest link and design systems accordingly. Thirty percent of participants will still open malicious emails within 30 minutes of phishing training. It only takes one person (the weakest link) to bring down an entire enterprise.

> More

security stock solutionsDov Yoran

Sr. Director, Strategy &
Business Development

Security Business Group Cisco

There is no silver bullet. A committed attacker will always find a way. Your best defense is a balance of both protection and detection. When bad things do inevitably happen, your detection capabilities will enable you to find the threat quickly and mitigate the damage. Our focus in Cisco Security is to automate as much of this process are possible for organizations so that once a new threat is identified, it is automatically blocked across not only the enterprise, but also the entire Cisco user-base. In doing so, we multiply the collective wisdom of our customers, partners, and our deep bench of talented threat researchers.

> More

security stock solutionsCarl Bradley, U.S. Navy (Ret.)

Information Assurance & IT Security Consulting & Intelligence Strategy
HP Enterprise Services,
U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate.

In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...

> More

security stock solutionsTom Kellermann

Chief Cybersecurity Officer
Carbon Black

Existing cybersecurity architectures are failing due to two macro trend cloud computing and mobility. The endpoint is inadequately secured and the adversary often has a footprint within one’s perimeter defenses. We must pursue a strategy of intrusion suppression wherein we can decrease dwell time and this detect, deceive, divert and hunt and adversary unbeknownst to the adversary. To achieve this an organization must: employ application whitelisting, employ an endpoint protection platform, establish a Hunt Team and roll out deception grids. Employ Deceptiongrids.

> More

security stock solutionsRobin Harris

Chief Executive Officer
Applied Cyber Strategy Group

Many clients are referred to us for immediate support with onsite impromptu compliance audits from their current customers, prospects or industry compliance authority. Several clients are bidding a federal government or international corporate contract and need assistance responding to the RFP. Yet others are facing a stop work order until they can demonstrate a suitable cyber security posture and compliance with specific regulations. We assist our clients at any stage of their operations and their journey begins with relief upon initial engagement with us. Cyber security can keep you up at night. We take time to care. We listen to understand all the requirements, pain points and urgency clients face. Each client is assigned a strategic risk management team consisting of a privacy lawyer, cyber security expert, business analyst and program manager experienced in the client's industry.

The core team leads the strategy for compliance and risk management solution. They also engage additional resources as necessary to support success. We help clients win business. A cyber-attack can cost an organization a fortune in fines, reputation and prison time for executives. Without cyber security companies lose revenue opportunities. We support their targeted growth strategy. The investment in cyber security not only meets compliance but yields a return on that investment

> More




Cybersecurity attack hits world's largest meat supplier JBS' IT systems in the US and Australia > More

Proactive Security Key to Combatting Supply Chain Attacks > More

Printer risks go deep into IT history > More

Where Security And Privacy Regulations Meet Cyber Insurance > More

Wanted: Millions of cybersecurity pros. Salary: Whatever you want > More

Venmo will let users hide friends list after Biden security blunder > More

Ransomware attacks saddle Biden with grave national security crisis > More

Ransomware has thrust cybersecurity into the spotlight > More

Cybersecurity experts say more can be done to prevent ransomware attacks > More

Hackers Breached Colonial Pipeline Using Compromised VPN Password > More

The Best Cyber Security News Websites Of 2021 > More


DHS to announce cybersecurity regulations for pipelines after Colonial hack > More

The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms > More

Cyber security chief fears hackers could target hospitals > More

The Makings of a Better Cybersecurity Hire > More

Timeline: How the Wuhan lab-leak theory suddenly became credible > More

Businesses Are at Risk of Cybersecurity Breaches Due to Worker Error > More

10 Emerging Cybersecurity Trends To Watch In 2021 > More

Amid threats to members, House to vote on new security > More

Parks Associates: DIY Installation of Security Systems has Increased Nearly 40% Since 2018 > More

New research reveals today's biggest application security challenges > More

Aid agency security is a disaster waiting to happen > More

Pandemic Pressures Reveal Significant Mobile Application Security Issues; Thousands of the Most Popular Apps Contain Common Vulnerabilities > More

Lockheed Martin removes contractors from Iraq base over security fears > More

Colonial Pipeline Cyber Attack Points To Larger Security Concerns > More

Researchers design a graphene-based encrypted key for novel hardware security > More

What CISOs really want from security vendors > More

Security Vs. Convenience: Navigating the Mobile World > More

Microsoft and Darktrace Partner on Azure and AI Security Solutions > More

Biden on cyber security after 100 days: A good start, but now comes the hard part > More

Phishers Delivering Increasingly Convincing Lures > More

What Cybersecurity Can Learn From Video Games > More

Dell patches vulnerable driver > More

Security camera in Florida captures mysterious flying orbs of light > More

The Cybersecurity 202: Nearly two-thirds of cybersecurity experts think Biden's response to Russian hack is sufficient > More

Rethinking mobile security in a post-COVID workplace > More

Industrial Security: Not Just IT and OT, but Old OT and New OT > More

SolarWinds, Microsoft Hacks Prompt Focus on Zero-Trust Security > More

The cyber security mesh: how security paradigms are shifting > More

Personal Security IS Enterprise Security > More

Allied Universal Acquires G4S plc; Creating A Global Integrated Security Services Leader > More

U.S. sanctions on Russia: Will they stop cybersecurity attacks? > More

Google Trumpets New Mobile App Security Standard > More

Growing reliance on third-party suppliers signals increasing security risks > More

Re-imagining The Cybersecurity Workforce > More

‘Consequences’ for Russia if Alexei Navalny dies, Joe Biden’s national security official warns > More

Verizon Mobile Security Index: COVID-19 unearths new cyber threats for businesses > More

Convergint Technologies buys electronic security business > More

Nearly all security professionals are struggling to secure IoT devices > More

Three vital security measures to protect your corporate network > More

Ex-national security officials call for commission to investigate Capitol attack > More

533 million Facebook users' phone numbers and personal data have been leaked online > More

Suspected Russian hackers gained access to US homeland security emails > More

Security breach: 8.2TB data up for sale on dark web > More

Blockstream Issues Security Token Tied to Bitcoin Hashrate, Payable in BTC > More

Pelosi picks DC National Guard chief to lead security in US House > More

AdaptiveMobile Security finds ‘fundamental vulnerability’ in 5G network slicing architecture > More

The pandemic-driven rush to cloud is compromising security > More

Microsoft Exchange Server attacks: 'They're being hacked faster than we can count', says security company > More

Swiss Cyber Security Firm Says It Accessed Servers of a SolarWinds Hacking Group > More

6 Cloud Security Resources that You Should Be Using > More

Security and Cyber Resilience for IoT: Let’s Get Started > More

DoT directs all state procurements to be of local cyber security products > More

Industrial Cyber Security Market Size to Reach USD 19220 Million by 2026 at a CAGR 6.9% | Valuates Reports > More

How to reduce remote working cyber security attacks > More

Oldsmar, Florida Breach Sheds Light on Need for Industrial Cybersecurity > More

The cybersecurity risks associated with 5G networks and how to manage them > More

Why Data Privacy Should Be on President Biden's Agenda for His First 100 Days > More

Fake Google reCAPTCHA Phishing Attack Swipes Office 365 Passwords > More

FINRA Warns of Ongoing Phishing Attacks Targeting Brokerage Firms > More

McAfee Faces Decades Behind Bars After Fraud Indictment > More

Iranian Hackers Using Remote Utilities Software to Spy On Its Targets > More

FTC Busts $110m Charity Fraud Operation > More

DHS announces new measures to boost nation's cybersecurity > More

Capitol security officials blame poor intelligence — and each other — for the Jan. 6 riot > More

Security camera captures insanely close falling meteor > More

5 Security Lessons for the Post COVID19 Era > More

Emmanuel Macron pledges €1bn for cybersecurity after hospital ransomware attacks > More

The future of cybersecurity will be about ‘fighting fire with fire’ > More

Senate will hold a public inquiry into the security breaches in the Capitol riot > More

How Businesses Can Look To Prepare For The Long-term Cyber Security Impacts Of COVID-19 > More

This cybersecurity threat costs business millions. And it's the one they often forget about > More

The Adoption of Cybersecurity Insurance and its Role in the Modern World > More

Cyber Security Isn’t Expensive - It’s Priceless > More

The Fourth Industrial Revolution – AI, Quantum, and IoT Impacts on Cybersecurity > More

In Biden World, Economic Policy Is National Security Policy > More

Biden officials believe China to be 'greatest long-term national security threat' to the US > More

Top security technologies to protect remote workers > More

Google steps up its game on open-source security. "Our new tool makes open-source security bugs easier to spot" > More

3 Critical Data Security Strategies for 2021 > More

The IoT Security Risks and Benefits of IT Convergence > More

China Arrests Australian TV Anchor on National Security Charge > More

Security Experts on Anticipated Pandemic Impacts in 2021 > More

What will Biden's immigration overhaul mean for national security? > More

COVID-19 and the International Security Environment > More

Google says North Korean state hackers are targeting security researchers on social media > More

Hundreds of Industrial Organizations Received Sunburst Malware in SolarWinds Attack > More

Apple says iOS 14.4 fixes three security bugs ‘actively exploited’ by hackers > More

The Biden-Harris Administration Immediate Priorities > More

Better than the best password: How to use 2FA to improve your security > More

Biden Has a Peloton Bike. That Raises Security Issues at the White House > More

State of Residential Security 2021: Reasons for Optimism, New Opportunities & More > More

SolarWinds hack is quickly reshaping Congress’s cybersecurity agenda > More

Police Reassess Security for Inauguration and Demonstrations After Capitol Attack > More

Security Think Tank: Don’t bet on a new normal just yet! > More

Top 7 security mistakes when migrating to cloud-based apps > More

Biden picks cyber veteran to reinvigorate security response > More

COVID-19’s impact on healthcare’s security infrastructure in 2020 > More

How security failures enabled Trump mob to storm U.S. Capitol > More

Justice Department, federal court system hit by Russian hack > More

Countdown To 2021: Privacy & Data Security > More

Top 10 cyber security stories of 2020 > More

It’s the nightmare scenario that has worried cybersecurity experts for years > More

The Biden family put national security at risk > More

Phishers bypass Microsoft 365 security controls by spoofing > More

A better kind of cybersecurity strategy > More

FireEye hack: Cybersecurity firm says nation-state stole attacking tools > More

Cybersecurity Predictions for 2021: Robot Overlords No, Connected Car Hacks Yes > More

Most Businesses Concerned About Cloud Security but Few Adopt Data Loss Prevention Measures > More

Former top US cybersecurity official ousted by Trump said there was 'no manipulation of the vote on the machine-count side > More

Cybersecurity In The New Normal: Good Enough Is No Longer Enough > More

Biden Will Nominate First Women to Lead Treasury and Intelligence, and First Latino to Run Homeland Security > More

New US IoT law aims to improve edge device security > More

Security Researchers Sound Alarm on Smart Doorbells > More

Is TikTok a harmless app or a threat to U.S. security? > More

Meet the hackers who earn millions for saving the web: How bug bounties are changing cybersecurity > More

Three Ways Your Company Can Avoid A Security Breach > More

Top 10 Cyber Security Trends to Watch out for in 2021 > More

Ransomware Group Turns to Facebook Ads > More

How Trump’s Refusal to Concede Affects Biden’s National Security Transition > More

Cisco Warns of Severe DoS Flaws in Network Security Software > More

SIA identifies top 10 security megatrends affecting the industry ahead of its Securing New Ground conference > More

Onslaught of Login (Brute Force) Attacks Shakes Enterprise IT Security > More

Sophisticated new Android malware marks the latest evolution of mobile ransomware > More

Microsoft disrupted Trickbot, a 'prolific' ransomware distributor and election security threat > More

Amazon Prime Day leads to spike in phishing attempts > More

Crypto Poses a Growing Threat to National Security, U.S. Says > More

Remote work can make a business tempting cyber prey. Here's what the experts recommend. > More

Current trends in Mac security threats > More

Booming Industries In 2020: Cybersecurity > More

Six cybersecurity threats the financial services sector faces > More

Current trends in Mac security threats > More

UK Spies Slam Huawei Security > More

61% of business don't apply basic password security techniques, here's how to > More

Cisco acquires PortShift to raise its game in DevOps and Kubernetes security > More

Out of date Huawei kit posed threat to UK telecoms security > More

After breach, Twitter hires a new cybersecurity chief > More

Sleepwalking into a Cybersecurity Nightmare? > More

Microsoft outage was not part of 'coordinated campaign' says cybersecurity agency > More

Crypto will never hit critical mass until cybersecurity improves > More

Google removes 17 apps from Play Store after cloud security firm cautions of malware causing WAP fraud > More

Linux Systems are Hackers' Next Targets > More

TikTok says it didn't take part in Australia security probes > More

Covid-19 has changed how we think about cyber security forever > More

5 tips for better Google Drive security > More

Shopify discloses security incident caused by two rogue employees > More

Intel Introduces IoT-Enhanced Processors to Increase Performance, AI, Security > More

IBM Brings Risk Analytics to Security Decision Making > More

Think Twice Before Using Facebook, Google, or Apple to Sign In Everywhere > More

FBI Helped Twitter, Facebook Disrupt Russia Influence Operation > More

Siemens USA launches cybersecurity analytics lab to help protect operational technology > More

Here's everything Apple just announced > More

What newsrooms can learn from threat modeling at Facebook > More

Abnormal Security and Microsoft Team Up to Deliver AI-Driven Security > More

Portland Issues Sweeping Ban on All Facial Recognition Use > More

235 million TikTok, Instagram and YouTube accounts exposed in database breach > More

11 Ways COVID has Changed Security Integration > More

5G security suffering from too many cooks in the kitchen > More

Facebook to Pay Some Users to Stop Using Facebook, Instagram Ahead of Election Day > More

China presents 'global standard for data security' > More

Work From Home Is Not Without Security Costs > More

WhatsApp Discloses 6 Bugs via Dedicated Security Site > More

Public Safety and Security Market worth $516.5 billion by 2025 - Exclusive Report by MarketsandMarkets > More

Verizon advances 5G network and cyber security > More

3 Top Cybersecurity Stocks to Buy in September > More

Could Working From Home Help Close The Cybersecurity Skills Gap? > More

Android security bug let malicious apps siphon off private user data > More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.