Breaking News:

How AT&T Is Virtualizing Security More

Things You Should Not Buy Online More

Alibaba Accused of Selling Fake Items More

Marsh and FireEye Collaborate to Offer Cybersecurity Readiness Service More

Defense Budgets Ready to Grow Again More

Why Drones Should Bug You More

Black box sent to U.S. to seek crash clues More

Google fires first volley in new cloud pricing war More

Amazon's riding the New York subway to speed up deliveries More

Fortinet Agreement With U.S. Department of Homeland Security More

Thank you Apple and Samsung: The physical home button is essential for efficiency and security More

PFU Systems and FireEye Integrate Products to Deliver Next Generation Enterprise-Level Defense Against Network Cyber Attacks More

Zebra Technologies Introduces Mobility DNA Suite for Next Gen Intelligent Connectivity More

Self-driving cars are getting into accidents in California More

Alibaba rolls out three-hour delivery service for healthcare goods More

Garmin's running watch finally tracks your heart rate by itself More

State of Louisiana renews contract with CGI for IT services for disaster relief programs More

Verizon to Buy AOL for $4.4 Billion More

New Ecolab Total Hand Hygiene System Improves Handwashing Compliance, Decreases Water Use by up to 50 Percent More

Finding Survivors in Nepal With Google's ‘Person Finder’ More

China could become Apple's top market by next year More

OSI Systems Receives Certification for RTT® 80 Explosive Detection System More

Big Data-As-A-Service Is Next Big Thing More

General Dynamics Completes Initial Integration of NASA's New SGSS Command and Control Infrastructure More

Accenture and Oracle Form New Business Group to Help Customers Achieve Digital Transformation Goals in the Cloud More

New Research Reveals Wide Gap Between Perception and Reality of Perimeter Security Effectiveness More

Check Point Ranked Number One in Worldwide Firewall Equipment Market More

Smith & Wesson Sees Higher Demand More

Robots in the defense space More

3M Introduces Advanced Physician Documentation Platform More

Morpho Fingerprint Identification Technology First in 1-1 Verification More

General Dynamics says still focused on government cybersecurity business More

User mistakes aid most cyber attacks, Verizon and Symantec studies show More

Honeywell Technology Enables Next Generation Of Search And Rescue More

Cubic Global Defense Awarded Contract More

Identiv and Cisco to Provide Next-Generation Physical Access Solutions for the Internet of Everything More

Big Data, IoT At Heart Of GE Predictive Analytics More

Google search 'Find My Phone' to locate your missing Android More

AMAG Technology Unveils Complete Suite of Video Solutions More

NICE Actimize to Support Singapore's DBS Bank Financial Crime Strategy with Upgraded Anti-Money Laundering and Enterprise Case Management Solutions More

Coop Bank Denmark first to deploy Gemalto's unique bio-sourced contactless EMV cards More

General Dynamics' New High-speed, Cyber-defense Capable TACLANE-10G Encryptor Now NSA Certified More

Why IBM Entered into a Data Analytics Partnership with Twitter More

Oracle’s Cloud Strategy Is Different from Its Peers More

Cyber Insurance Capacity is 'Very Small': AIG CEO More

BIO-key Enters Into Global ASL Agreement With Avnet More

Clinton also used iPad for email; mixed personal, work chats More

IBM Plans to Invest Billions in the Cloud and Analytics Space More

Check Point Researchers Discover Global Cyber Espionage Campaign With Possible Link to Lebanese Political Group More

Raytheon And Estonian Ministry Of Defense To Collaborate On Cyber Security More

Unisys Obtains ISO/IEC 20000 Certification for Best Practices Related to IRS Enterprise Storage Services Contract More

Trend Micro, Ponemon Global Study Reveals Privacy is a Concern, but Consumers Remain Undeterred More

FIDO Alliance Members MedImpact and Nok Nok Labs to Deliver FIDO Authentication to Physicians, an Industry First for Healthcare More

Northrop Grumman Laser Mine Detection System More

Cybersecurity Firms Are Ready To Fight For Government Contracts More

1 in 4 U.S. Banks Now Use ZixCorp’s Email Encryption More

ACI Worldwide Powers Online Banking for Polish & Slavic Federal Credit Union More

Pitney Bowes Renews Global Strategic Alliance With HP More

China Telecom selects Gemalto to deploy mobile NFC transport in China's two largest cities More

Emergent BioSolutions Awarded $31 Million Contract for Advanced Development of NuThrax, a Next Generation Anthrax Vaccine More

Gemalto solution powers a unified national registry for Oman's identity documents More

Extenua and ImageWare Deliver Revolutionary Enterprise Secure Cloud Storage More

HP security platform earns FedRAMP approval. More

Agility and ImageWare Partner to Bring Biometric Solutions to New Markets More

Identiv Partners With 3M to Expand Physical Access Market by Sharing Products and Technology More

Apple Pay supported by 2,500 banks as fraud concerns linger More

Identiv Launches uTrust Sense and Smart Sensor That Tracks the Temperature of Anything More

Check Point Introduces Threat Extraction for Zero Malware in Zero Seconds More

CA Technologies and Tech Mahindra Announce Agreement to offer Enterprise Solutions to Help Manage and Secure the Internet of Things More

HP Anti-Fraud + Innovation Printing Technology More

Does Lockheed Martin’s future lie in the cybersecurity business? More

Google, Facebook update contrasting plans to connect world More

Equifax Top-10 Tips to Protect Personal Data More

BAE Systems Advanced Threat Infrared Countermeasures system has been approved for export by DoD More

H-P to Buy Aruba Networks for $2.7 Billion More

Oracle's New Ethernet Switches and Virtual Network Services Target Software-Defined Data Centers and Cloud More

Lockheed Martin Awarded Contracts To Support U.S. Navy Cross Domain Intelligence Sharing Solution More

OneWeb Selects Honeywell As A Key Partner In Game-Changing Effort To Bring High-Speed Internet To Billions Worldwide More

Gartner Ranks Check Point Number One for Worldwide Firewall Equipment Market Share, Based on Q3 2014 Revenue More

FotoNation Buys Smart Sensors for Biometric Capabilities More

Radware's Attack Mitigation System Selected by BlackMesh - Provides Customers Protection Against DDoS Without Impacting Legitimate Traffic More

Kyocera and Authentidate Complete Interoperability Testing on Integrated Mobile Telehealth Solution More

Cincinnati Children’s Signs Fourth Email Encryption Contract with Zix Corporation More

StrikeForce Technologies Releases GuardedID Version 4 of Its Keystroke Encryption Technology More

In bad cyber-breach environment - investment ideas More

Facebook Policies Taken to Task in Report for Data-Privacy Issues More

Apple to Spend Nearly $2 Billion on New European Data Centers More

How to get rid of insecure apps from Lenovo and lots of others More

Northrop Grumman Highlights Global Intelligence, Surveillance and Reconnaissance Capabilities More

A big reason companies got hacked last year More

IBM Continues Expansion of Global Cloud Centers to Support Hybrid Cloud Growth More

Oracle Advances Vision for Enterprise Big Data More

A race for the lead in the wearables market More

Gemalto Trusted Services Hub expands secure service deployment to 350 million more mobile devices More

Hackers steal directly from banks in 'new era' of cyber crime More

Northrop Grumman to Feature Global Defence Capabilities More

IBM Adds Storage Software to Help Customers Manage Cloud More

US Defense Giant Raytheon: We Need To Divide The Web To Secure It More

Google is giving companies a break on security disclosures More

President Obama and the federal government are seeking to collaborate with the biggest US tech companies in an effort to bring more data security to the everyday consumer online More

Gemalto Releases Findings of 2014 Breach Level Index More

Fujitsu and BT Prepare Customers for the Future with First IPAM-as-a-Service Leveraging Fujitsu Cloud More

Gemalto acquires Trüb AG's secure document business further strengthening its world leadership in digital identity programs for governments More

Global traffic in mobile data will grow 10-fold in just 5 years, Cisco says More

Your TV may be spying on you More

Twitter sees growth in government requests for user data More

Reinforce Your Cybersecurity With Top Standards More

Accenture Federal Services to acquire Agilex, a provider of digital solutions for the U.S. federal government More

Identiv Announces U.S. Government Certification of uTrust TS Government Readers for Premises Access More

Defense of Pentagon networks "not where it should be"- nominee More

Oracle Utilities Analytics Solution Helps Utilities Manage Storm Data in Near Real Time More

HP Unveils Retail Technologies to Enhance Security, Customer Experience and Enable Operational Efficiencies More

Google, Microsoft, and Amazon are paying Adblock Plus huge fees to get their ads unblocked More

Study from CA Technologies Reveals Why the Application Economy Demands a New Approach to Security More

As U.S. faces new threats, Pentagon seeks bigger defense budget More

Sony Cyber Attack Woes More

OTI Enters EMV Countertop Reader Market With Apple Pay-Enabled Solution More

L-3 Communications Wins 2 National Security Contracts More

Gemalto outlines the security benefits of move to EMV chip cards for US Financial Issuers More

Northrop Grumman Receives US Navy Contract to Begin Production of Additional Airborne Laser Mine Detection Systems More

Google is on the PwC Team Bidding for the Department of Defense Healthcare Management Systems Modernization Program More

Munich Airport Selects Morpho's CTX 9800 EDS for Hold Baggage Screening More

France Seeks to Sanction Web Companies for Posts Pushing Terror More

Apple In New Security Concessions To Beijing More

Hacking group Lizard Squad claims responsibility for Facebook outage More

The Morning Download: Microsoft Envisions Big Data 'Revolution' for Enterprise More

Northrop Grumman Awarded Cyber Security Contract by UK Government More

Equifax Personal Solutions Joins H&R Block to Address Growing Threat of Tax Identity Theft More

Pittsburgh Hospitals Reduce Emergency Department Visits using Patient Navigators More

BAE Systems was awarded a five-year contract by The U.S. Navy's Naval Air Systems Command to provide full life-cycle engineering and technical support. More

General Dynamics sees more demand for 'insider' cyber protection More

N.S.A. Breached North Korean Networks Before Sony Attack. More

France Pushes for Scrubbing Internet of Terrorism-Related Content More

After blocking Gmail, now China seems to be hacking Microsoft Outlook More

Oracle Voice Brings a Mobile, Speech-Enabled Virtual Assistant to the Oracle Sales Cloud in Release 9 on Smart Phones More

President Obama's Cybersecurity Priorites More

ImageWare Systems Joins as an Advanced Partner in the CA Technologies Tech Partner Program More

Identiv Supports President Obama's Plan to Increase Cybersecurity and Calls for U.S. Congress Mandate for All Organizations More

Alibaba Blocks Sales Of Unsafe Goods To U.S. Shoppers More

Why Google won't fix a security bug that's in almost a billion Android phones More

Pitney Bowes Unveils New Brand Strategy for the Future of Commerce More

Oracle Launches Modern and Secure Oracle Financial Services Cloud More

IBM Debuts New Mainframe in a $1 Billion Bet on Mobile More

Accenture is a Leader in U.S. Government Cloud Services. More

HP Unveils Retail Technologies to Enhance Security, Customer Experience and Enable Operational Efficiencies More

Elbit Systems Awarded Contracts for Advanced Electro-Optics Systems for Israeli Ministry of Defense. More

Uruguay selects Gemalto for eID secure document and issuance solution More

Authentidate's InscrybeMD Telehealth Solution Expanded to Several Florida Hospital Locations More

Digimarc and HP Report Significant Progress in Creating Print-to-Mobile Engagement Tools for Digital Presses More

Apple Has Patched A Hole In iCloud That Let Hackers Access Anyone's Account More

HP Debuts Virtual Reality Display Reducing the Barriers Between Digital and Physical World More

Google Was Asked To Delete 345 Million Links In 2014 Over Copyright Infringement More

Raise your home's IQ: smart gadgets take center stage at CES More

Stop Fraudsters in Their Tracks. NICE Launches Real-Time Solution to Thwart Fraud Attempts in the Contact Center More

Intel unveils app that opens sites with user's face More

Cue The Latest Cloud Vendor Announcing An Extended Maintenance Outage--Verizon Cloud Set For 2 Day Blackout More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More

security stock solutionsMr. Jason Hart

Identiv’s uTrust products enable business executives and security leaders to make the paradigm shift from patchworked identity systems to a unified, simple, efficient identity solution that delivers higher security and resistance to obsolescence, for both premises and information access. Our uTrust products are unique in the marketplace as they are designed, tested, and supported to work together. No matter where a customer starts, Identiv provides the confidence that they can build a complete system in which everything works together.  Identiv’s idOnDemand service is a turn-key cloud-based platform that makes establishing a trusted ecosystem across all lines of business, geographic locations, devices, and people simple and convenient. Central to the idOnDemand service is the certification authority that issues PKI certificates — the standard for secure communications through the internet, banks, and high-security cryptographic applications within and outside the U.S. government for the last 20 years. By combining PKI with purpose-built secure hardware such as a smart card, USB token, or other devices, like mobile, the certificate’s private key is not only protected in a high state of security, but is also portable across devices and services, enabling pervasive use of strong identity whenever (and wherever) required. More

security stock solutionsMr. Christian Matthews
Director of Product Management for IoT Software

Simply monitoring high-value assets provides a general example. Video surveillance combined with other sensor output such as audio, motion, or building contacts is used to increase protection and monitor assets without constant human supervision. Threats of incidents are detected and the risks mitigated by alerting personnel or automatically initiating preventative actions. When combined with advance video analytics, benefits continue to grow. At the University of San Francisco (USF), IP cameras and the Cisco Video Surveillance Manager deliver facial recognition to detect when unauthorized individuals enter an area and then notify appropriate staff.  Dallas Area Rapid Transit(DART) use Cisco’s IoT Physical Security solutions to increase effectiveness of the transit police. With better intelligence, first responders and their associated operations teams have increased productivity substantially. They have done this at scale with a centralized command center managing more than 1700 remotely deployed IP cameras. Recently the system has been extended across busses and emergency response vehicles..More

security stock solutionsMr. Mark VanDover
Tyco Integrated Security

In the last six months, we’ve seen security technology changing the way businesses operate across multiple industries. For example, expanded use of RFID-enabled technologies is helping retailers identify and combat operational loss, deepen the customer experience and improve omni-channel operations. Additionally, in heavily regulated industries like food manufacturing and pharmaceuticals, we’ve seen physical security play a bigger role in ensuring standard compliance. On another level, since entering the small business market last fall, we’ve seen firsthand how affordable commercial-grade security solutions can make a difference for small business owners’ bottom line.More

security stock solutionsMr. Fred Duball
Data Center Practice Principal, Workload and Cloud Solutions
HP Enterprise Services, U.S. Public Sector

Many of our clients know that HP has a strong legacy of IT infrastructure support; we have more than 80 data centers worldwide supporting more than 1,300 customers. But here’s what makes the Mid-Atlantic Data Center (MDC) different—we have enhanced our security and compliance posture to accommodate and support the critical needs of the U.S. Federal Government, as well as commercial companies requiring stronger measures.  The HP Mid-Atlantic Data Center has been designed to provide customers with high levels of security, reliability, compliance and cost effectiveness. In fact, the U.S. government has designated this facility as being a part of our nation’s critical infrastructure, guaranteeing priority restoral of services in the event of a natural or manmade disaster. More

security stock solutionsMr. Matt Barnette
AMAG Technology

In our newest version of Symmetry, we address the tightened smart card standards to counter growing physical and cyber threats and as a result are making Symmetry fully compliant with Federal Identity Credential and Access Management (FICAM) standards.  We are making Symmetry easier to install for our integrators by changing how access permissions are downloaded to the door controllers.  While this may not sound like an important detail, every Symmetry installer will notice the difference and save time and money when they install Symmetry. We have expanded our Symmetry High Definition camera line and added two new cameras.  The cameras offer an affordable option with a great feature set.  This is another way we are ramping up our video offering.  All of the Symmetry HD cameras in the range include built-in advanced motion detection as standard, and contain an option to turn on high quality video content analytics right inside the cameras themselves. Alarms from the cameras can automatically trigger commands throughout Symmetry, thus enhancing the security capabilities. More

security stock solutionsMr. Paul Brady
Technology and Solution Evangelist
Senior Director

The weak link is the fact that, in most cases, these breaches happened because the accounts (Target, Home Depot, and JPMorgan) were using password-based authentication. That is the weak link. Had the exploited accounts required the use of Identiv’s uTrust Credential to securely login without a password, these attacks could have been mitigated. Identiv’s uTrust Credentials are incredibly easy to use because they are a form of authentication we are all used to — the idea of a card plus PIN is something users accept, we are all accustomed to using a card plus PIN to authenticate an ATM, a gas pump, etc. Identiv has recently helped a large network hardware provider secure its administrator accounts and remote access security. The company uses Identiv’s uTrust Credentials and built-in group policy to enforce smart-card-only login to Windows, Linux, and other servers. Identiv is also currently working with major energy companies to help them become NERC-compliant while securing both physical and logical access; we are working with one of the largest credit reporting agencies to secure remote access to its networks as well as physical access to its facilities; and we have helped one of the largest insurance companies in the world move away from insecure proximity technology to secure contactless physical access.   More

security stock solutionsMr. Matt Tryniski
Vice President, Defense and Environmental Solutions
SRC, Inc.

UAS, also commonly referred to as unmanned aerial vehicles (UAVs), remotely piloted aircraft (RPA) and drones, offer many advantages. There are commercial applications like precision agriculture, film production, package deliveries, etc. And there are military applications like intelligence gathering, surveillance, reconnaissance and high-risk operations that no longer require putting a human pilot in harm’s way. These applications are recognized globally, which has led to the proliferation of UAS worldwide. With such a large population of these aircraft, there is a pressing need to safely integrate these systems into the airspace and to defend against them when they are used for hostile purposes. More

security stock solutionsMr. Xavier Giandominici
VP, General Manager FIME America

Everyone has their eyes on the upcoming October fraud liability shift, and that’s one of the most important themes at Cartes America this year. How to get there is a very hot topic, and that’s something we’re trying to help. We recently put out a white paper to help the merchant community understand the changes and challenges associated with introducing EMV chip technology to the U.S. It provides practical education and best practices to get started on the right path to chip deployment. And for issuers, we just released a go-to-market consulting kit for financial institutions to fast-track and simplify EMV chip card issuance. I’m looking forward to hear what others are saying and doing to positively impact the migration to chip cards. There’s going to be a lot of interest in NFC and HCE due to significant advancements over the past year, such as ApplePay and modifications to Google Wallet, mobile and cloud-based payments.More

security stock solutionsMr. Marcelo Bellini Garcia
Vice President Sales Payment Americas

As a leading player in the payment business, we offer financial institutions a complete and innovative portfolio of solutions ranging from classic chip card technologies, cutting-edge mobile payment and TSM services to innovative online payment security, eID and leading biometric identification and authentication solutions. At Cartes America 2015 we will focus on pioneering products and solutions for the following application and business areas: EMV migration, Biometrics technology applied to payment applications both for identification and authentication such as the Match-On-Card (featuring biometric authentication performed by the EMV card) and on-device authentication, Mobile payment, such as Trusted Service Management and Host Card Emulation, eTIS (eTrusted Identity Services) – trust platforms that manage digital identity services securely and reliably. More

security stock solutionsMr. Sami Nassar
Vice President
Cyber Security Solutions at NXP Semiconductors

FIDO's mission is to create a protocol to support an interoperable ecosystem of vendors that develop and deliver products, services and solutions that enable users to use the same “key” across multiple cloud services and devices. Today, reliance on Internet services increases as people move from using the Internet to browse websites to using the Internet for gathering, storing, accessing, and sharing digital information. As the Internet continues to permeate our daily lives and more and more devices connect to the Internet, we need to ensure these devices are protected. NXP engaged with FIDO since its inception, starting with the concept of replacing the Username/Password Authentication with Strong Authentication. Originally this concept was created to help Google resolve enterprise security issues, but as work progressed, we realized this solution would be of high interest to the consumer. The idea was to anonymize an Internet user via their physical possession and therefore protect their digital identity.  Security technology, like the secure element IC from NXP, plays a key role in enabling Strong Authentication which links the virtual or Internet world with a physical asset while maintaining privacy.. More

security stock solutionsMr. Daniel Murray
Director Key Accounts
Systems Integration
Bosch Security Systems

Cyber security is a major area of concern for integrators, and future success is tied to the integrators’ ability to meet their own cyber security needs and those of the customers they support. One of the most startling facts is that the vast majority of cyber vulnerabilities can be mitigated by appropriate password implementation and process management. This is common practice in the IT world and an area for improvement in the arena of physical network security.  Many of the thousands of cameras installed globally are done so with default, insufficient and missing passwords.  This is an easy “first step” in securing the physical security network which is missed by many dealers. At the PSA Cybersecurity Congress, discussion focused on multiple factors of network integrity that will change the face of our industry in the next 3-5 years More

security stock solutionsMr. Will Geoghegan
Cloud Architect
TPS5 Cloud & ISV Partner Solutions
Fujitsu Americas
Fujitsu ISV Cloud Program

Fujitsu has a long and demonstrated history delivering world-class solutions that enable businesses to succeed in a highly-competitive market and ever-evolving technology landscape. The Fujitsu Cloud ISV Partner Program is one more way we’re delivering exceptional value to our customers, where we focus on helping companies transform and deliver their solutions in an “as-a-service” model from our cloud. Our aim is to work closely with leading solution providers to take full advantage of not only our platform and tools, but the underlying shift in how the market consumes technology solutions today. With the Fujitsu Cloud ISV Partner Program, we offer the chance for solution providers to step into a leadership role and maximize the benefits of the latest cloud technology, including not only the transformation and delivery of their solutions as SaaS, but also for support in areas like sales, marketing, professional services, and across innovative operating and revenue models that support a “zero cost” option for the partner.  More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More

security stock solutionsMr. Stu Hammer
Director, USPS Application Services Practice
HP Enterprise Services, U.S. Public Sector

Applications modernization has become imperative as the maintenance of “mature” applications has increased—consuming a disproportionate share of resources. HP aligns critical applications and infrastructure with your overall modernization program. We can help you address risk, optimize benefits and prioritize the business needs of your applications. There are some very significant benefits that we can get through modernization. We’ve seen between 25 and 45 percent savings in a reduction in operations cost, development cost and overall portfolio size. The approach HP uses has been successfully executed with hundreds of modernization projects - leveraging the Advise, Transform and Manage approach, which is backed up with a strong methodology, tools and the experience to execute and de-risk the approach. What’s critical in this process is to start with a complete assessment. It’s mandatory that you get the plan right and you know what your portfolio, know what your application environment is so you can execute successfully. We’ve seen clients fail by ineffectively planning this assessment phase. If you do nothing, your costs are going to continue to rise; executing a transformation plan is critical. More

security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More