Breaking News:

FEMSA Selects ImageWare’s Cloud-Based Biometric Authentication to Validate Future Service More

Verizon selects Gemalto to migrate to next-generation technology More

65% of Americans traveling use mobile data to check in More

Lockheed Looks to Eliminate Northrop Grumman's Lead in Drones More

This is what happens on the Internet in 60 seconds More

Facebook and Gun Sales More

New Software Expands EMC Copy Data Management Portfolio, Modernizing Primary and Protection Storage Efficiency More

Identiv Launches Comprehensive UHF Tags for the Internet of Things Market More

FraudIQ™ Identity Score from Equifax Helps Combat Fraud More

ADT and Protection 1 Merge More

Amazon to Help European Vendors Sell Goods Across Borders More

Master Lock Offers Security Solutions for Senior Citizens More

Fortinet Adaptive Cybersecurity From IoT to Cloud Networks More

Frost & Sullivan Applauds RSA for Excellence in its Network Security Forensics Product More

Friendly Fire: Killing Russian Rocket Engines Too Soon Could Cripple U.S. Security More

Capgemini Joins Forces with FICO to Offer Risk and Fraud Expertise in Financial Services More

AT&T and SunPower Collaborate on Solar IoT Connectivity in the United States More

India orders panic button on mobile phones amid women's safety fears More

AT&T and Otis Collaborate on IoT Solutions More

SmartSoles address the “needs” market, which comprises of persons with Alzheimer’s, autism, dementia, and traumatic brain injury, all of which have high tendencies to wander More

Google warns of security threat on its own website More

Detecting and Neutralizing Terrorist Plots in Europe Requires Greater Integration of Intel and Police Agencies More

Amazon's AWS Completes An Automated Security Assessment Service More

Keyboard Shortcuts for Your Smartphone More

Route1 Provides Q1 2016 Operations Update More

Threat of Mobile Malware Continues to Grow More

Here's Why Cyber Security Stocks Are Outperforming the Market More

Hundreds of Phones Seized by FBI Over Six Months Can't Be Opened More

Here's how to avoid the worst seat on the plane More

Tyco's in-mask thermal intelligence system for the firefighting industry More

Recognizing the Signs of Sex Trafficking in the Hospitality Industry More

CA Technologies Helps Leading UK Financial Institution Secure Online Transactions More

Cisco Targets Cybersecurity For Productivity, Not Just Defense More

75% of websites at risk of malware: Study More

Oracle Delivers Complete Cloud Solution to Help Pharma Companies Improve Drug Safety More

Raytheon wants to be the Apple of defense contracting More

How to protect your data and avoid being hacked More

Route1 reports eighth consecutive quarter of growth More

Nortek Security and Alarm.com Partner On Security Automation More

Gemalto selected by National Commercial Bank of Saudi Arabia More

US Army Raytheon contract for next-gen infrared night vision More

Every WhatsApp message is now so secure that law enforcement can't read it More

Qolsys Partners with Monitronics On Security and Smarthome More

FIDO Alliance Announces Over 150 Biometric and Second-Factor Authentication Products Now Certified More

Apple Encryption Case: FBI Cracks Shooter's iPhone More

Dell's Risky Business: Cybersecurity More

Equifax Offers Tips to Detect and Deter Fraud during Customer Acquisition More

Why Google Cloud Could Spell Trouble for 3 Top Cloud Providers More

Amazon, Microsoft, or Google: Which Tech Stock Is Winning the Cloud Wars? More

NICE Helps Prince George’s County Get NG911-ready More

FBI Might Not Tell Apple How It Cracked the iPhone More

This simple app will block Microsoft from downloading Windows 10 on your PC More

ImageWare Systems Joins Amazon Web Services Partner Network to Offer Multi-Modal Biometric Authentication More

Apple May Be off the Hook as FBI Claims It's Cracked Terrorist iPhone Lock More

Brussels Attacks: When All You're Looking For is 'I'm Fine' More

Is It Time to Buy These 4 Cyber-Security Stocks? More

Microsoft, Inphi Plan To Leave Amazon, Apple In Digital Drone Dust More

Fortinet Launches Worldwide Network Security Academy to Create Global Pipeline of Cybersecurity Talent More

Cyber Security Roundtable Identifies Key Issues of Concern to Maritime Industry More

Raytheon Wins Canadian Navy Deal for Remote Weapons More

Google will pay you $100,000 if you can hack a Chromebook More

Cybersecurity Taken Too Lightly By U.K. Companies says WSJ More

Facebook (FB) to Reportedly Increase Data Encryption More

New Backup and Recovery as a Service (BaaS) Offering From Commvault, Hitachi Data Systems Forsythe More

Federal IT Survey Reveals Overreliance on Shared IP Storage Networks for Business-Critical Workloads More

Lockheed Martin (LMT) Secures DoD Contracts worth $325M More

How A So-Called ‘Professional Disruptor’ Snuck into a Trump Rally More

VASCO's Innovative Authentication and Anti-Fraud Solutions More

American Science and Engineering Debuts Three Advanced Security Screening Systems in the Middle East More

Feds launch new effort to access NYC iPhone's data More

ImageWare Systems and Aruba Deliver Biometric Security for Enhanced Network and App Defense More

Gemalto chosen to deliver ambitious new eID program in Jordan More

Apple, Facebook, Amazon, Intel War Over $500 Billion Cloud Market More

ACI Worldwide eCommerce Fraud Detection and Prevention More

Amazon New Smart-Home Devices More

Increasing Cyberattacks: Good or Bad for Cisco’s Network Security Growth? More

Verizon Agrees to Pay $1.4 Million Fine for Tracking You Without Permission More

Pentagon Cyber Campaign Against ISIS Signals A New Era In Warfare More

Google self-driving car hits public bus near Mountain View headquarters More

RSA Research Reveals Blind Spots in Threat Detection More

Fortinet and Hewlett Packard Enterprise Offer Innovative Security Bundle More

Check Point Simplifying Complexity of Security Through Consolidation More

Hexis Cyber Solutions Enhances HawkEye G Integrated Detection More

EMC Unveils DSSD D5: A Quantum Leap In Flash Storage More

IBM Security To Expand Incident Response Capabilities More

Apple Handed Early Win in Hacking Case With Judge's Ruling in New York More

AT&T To Connect WellNest Mobile Health And Wellness Wearable More

Akamai Advances Kona Site Defender More

Qualys Unveils ThreatPROTECT to Empower Organizations With Actionable Threat Intelligence More

U.S. sought data from 15 Apple iPhones in last four months More

Amazon Web Services takes aim at big U.S. banks More

Gates speaks out about Apple, FBI battle: Government must strike a balance More

Verizon and Splunk Join Forces to Advance Threat Detection for Enterprises More

Thermo Fisher To Offer Anti-Zika Virus Test Kits, Notes First Tests Available In US More

How Mark Zuckerberg Balances Apple Support With Willingness to Fight Terror More

Fortinet Earns Third-Party Certification in Virus Bulletin Web Security Testing More

For many around the world, the internet simply doesn’t speak their language More

Zwipe and Fingerprint Cards Announce Partnership More

Siemens and IBM team on next generation of cloud-based building energy management solutions More

TRC Selected by PennDOT to Provide Construction Inspection Services Statewide More

AT&T says has edge in 5G due to expanded Internet access More

ADT To Be Acquired By Apollo Global More

As Email Fraud Diversifies, DMARC Protects Employees and Consumers More

Connected Buses Keep Kids Safer (and Save Money) More

Equifax Launches FraudIQ™ Suite for Comprehensive Business Fraud Detection and Prevention More

NICE Actimize Selected by KeyBank for Enterprise Fraud Solutions More

IBM Unveils New Mainframe for Encrypted Hybrid Clouds More

General Dynamics to Help Secure German Bundeswehr's IT Networks More

Defense Spending Set to Grow More

EMC and VMware Introduce Hyper-Converged VCE VxRail Appliance Family More

Extenua and American Cyber Form Strategic Alliance. Strong encryption with ImageWare biometric authentication software provides expanded Cyber security service offerings and data protection to clients. More

What Is Wearable Technology and Who Dominates? More

Qualcomm Gains A Big Ally In Its Data Center Attack On Intel More

Are Zika Virus Fears Being Blown Out of Proportion? More

Data Suggests People Don't Tweet as Much as They Used To More

Women Fire Up the Next Round of Gun Sales More

EMC Leads the Market in the Total Disk Storage System Space More

Raytheon to complete modernization of air traffic control system More

Biggest hijacking threat Americans face today More

Pentagon Finds The Best Offense Is A Good Air-Defense Missile More

Biggest hijacking threat Americans face today More

U.S. defense budget focuses on changing security environment More

Microsoft to Build First Underwater Server Pod More

SAIC unveils newest amphibious vehicle More

BIO-key and Microsoft Report Strong Response to Windows 10 and Windows Hello Biometric Solutions More

Navy Awards CGI Command Center Contract More

Guidance Software Unveils New Data Risk, Privacy and Protection Solution More

Navy Awards CGI Role on $809M Naval Supply Systems Command Business Systems Center IDIQ Contract More

FireEye buys fellow cybersecurity firm Invotas More

AT&T Is 3 Steps Closer to Seizing the $1.7 Trillion Smart City Opportunity More

The fourth quarter was another good quarter for Route1 More

This is how Google drones will deliver your packages More

IBM Bets Big on Video Streaming More

Hacking deal in dispute as government tries to control dangerous software More

Marsh Launches New Global Excess Cyber Risk Facility More

Oracle Introduces New Cloud Services for Hotels and Casinos More

Walmart Makes It Easier To Switch Clouds With OneOps More

Lockheed Martin to Separate and Combine IT and Technical Services Businesses with Leidos More

Global study shows increasing security risks to payment data and lack of confidence in securing mobile payment methods More

Johnson Controls and Tyco to Merge More

Android security: Samsung plugs six OS and seven Galaxy-specific bugs More

Synaptics 'IronVeil' Brings Biometric Security To The Desktop PC More

Verint and Squiz Announce Partnership to Further Enable Digital Transformation for Government More

Critical Yahoo email flaw patched through bug bounty program More

TASER Announces Numerous Weapons Orders More

Could Cybersecurity Pay Dividends For Raytheon? More

Twitter disruption silences swaths of US, Europe for hours More

‘Fintech’ Threat Has Big Banks Rushing to Innovate More

Unisys to Deliver Enterprise Security Innovation on the AWS Cloud More

Amazon exec: Our drones will deliver in 30 minutes or less More

Check Point Takes on Car Hackers More

New Encryption Solution from Ciena Decreases Data Breach Risks More

Alibaba Teams With Nvidia in $1 Billion Bet on Cloud Computing More

Leidos government IT business More

Route1 Receives ATO for MobiKEY from the U.S. Department of the Interior More

Google reveals the number of tech glitches in self-driving cars More

North America's underground cybercrime economy: Business is booming More

AT&T to help FCC move to the cloud More

Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.

Fujitsu, T-Systems, and IBM are three Blue-Chip companies we have gone to market with. These large, established partners offer the support, brand name and worldwide cloud platform needed to seamlessly distribute our products. At the beginning of April, Fujitsu announced the kick-off and worldwide expansion of our partnership model with a dedicated sales team covering the Americas. Since then, Fujitsu and ImageWare have closed a three-year agreement with a major international retailer who will use the IWS CloudID® products running in the Fujitsu cloud for face, finger, iris, and voice enrollment and matching.  Additionally, Fujitsu has set up proof of concept pilots with several of their major customers, with more expected in the near future, and has kicked off sales and marketing of the partnership products in Japan and China. Our partnership with T-Systems has led to a project with Deutsche Bahn, the German national railroad, who is slated to become the first customer receiving our joint product offering. We expect more to follow and anticipate this agreement will begin producing revenues in the fourth quarter. More

security stock solutionsMr. Scott B. Suhy
Chief Executive Officer

The Unintentional Insider Threat (UIT) is the biggest security issue corporations face today. Users, sometimes knowingly but more often than not unknowingly, are putting their organization at risk through a variety of actions such as clicking on phishing messages, going to nefarious websites, running risky software (TOR/BitTorrent), running outdated software (Java, Flash), using HTTP” versus HTTPS”, connecting to unsafe WIFI’s, connecting personal assets like phones/tablets to the corporate WIFI, allowing children to play games like Minecraft on corporate assets (laptops), etc. NetWatcher helps organizations detect all of these hygiene issues that open an organization up for exploit.. More

security stock solutionsMr. Dave Schmitt
Solutions Architect 
IoT Vertical Solutions Group: Utilities

Utilities are especially popular, high-profile targets for attacks. According to the Cisco Security Capabilities Benchmark Study, 73% of utility IT security professionals say theyve suffered a public security breach, compared with an average of 55% in other industries. Most U.S. utilities have already undertaken substantial security measures throughout many parts of their systems. However, the nature of cyber threats and vulnerabilities keeps changing.  U.S. utilities have, for several years, been deploying IoT technology (aka Smart Grid) because it enables significant business and operational benefits: increased grid reliability, enhanced integration of renewables and other distributed energy resources, reduced operating costs, and more. However, all of this opportunity comes with the tradeoffs of increased complexity and new risks.. More

security stock solutionsMr. Ken Mills
Global Marketing and CTO
Surveillance and Security

A challenge I’ve seen with many public safety organizations is the inability to see the holistic picture when it comes to managing data. Addressing the topic of body-worndevices cannot be done independently of other data sources. In November, I participated on a Secured Cities panel with Rodney Monroe, the recently retired Chief of Police for Charlotte, NC. Chief Monroe highlighted three key things that police departments must to do before deploying body-worn cameras. More

security stock solutionsMr. Robert Dodge, CPP
Senior VP
G4S Corporate Risk Services

On a Friday in October 2015, a disgruntled customer arrived at a leading, international publisher’s New York City headquarters and insisted on seeing the company’s CEO. When the receptionist asked the man to leave, he became aggressive and made threats against staff and the CEO before leaving the building. Concerned about the potential for violence, the company reached out to G4S to respond to the threat. Within hours, workplace violence expert Robert Dodge, CPP, Senior VP of G4S Corporate Risk Services, deployed armed protection agents at the CEOs Manhattan residence to protect him and his family over the weekend.. More

security stock solutionsMr. Matt Barnette
AMAG Technology

In our newest version of Symmetry, we address the tightened smart card standards to counter growing physical and cyber threats and as a result are making Symmetry fully compliant with Federal Identity Credential and Access Management (FICAM) standards.  We are making Symmetry easier to install for our integrators by changing how access permissions are downloaded to the door controllers.  While this may not sound like an important detail, every Symmetry installer will notice the difference and save time and money when they install Symmetry. We have expanded our Symmetry High Definition camera line and added two new cameras.  The cameras offer an affordable option with a great feature set.  This is another way we are ramping up our video offering.  All of the Symmetry HD cameras in the range include built-in advanced motion detection as standard, and contain an option to turn on high quality video content analytics right inside the cameras themselves. Alarms from the cameras can automatically trigger commands throughout Symmetry, thus enhancing the security capabilities. More

security stock solutionsMr. Patrick Bertagna
CEO, Founder, Chairman
GTX Corp

The SmartSole is our flagship product, think Dr. Scholl’s meets LoJack. We make a miniaturized GPS and Cellular module and imbed it inside an orthotic insole. The application is for people who have a memory disorder and have a tendency to wander, anyone with Alzheimer’s, dementia, autism, traumatic brain injury, etc. Currently there are over 100 million people worldwide who are afflicted with one of these debilitating aliments. Being that our module is small and robust we also imbed it inside other form factors and we are starting to look at OEM deals. And then we have our tracking App, which basically turns a smartphone into a tracking device, the application there is for mobile work force, sales people, delivery people, service business like electricians and plumbers, police officers, just about anyone that works in the field and benefits their superiors to know where they are at any time at the touch of a button. More

security stock solutionsMr. Brian Brunetti

Our flagship technology is MobiKEY, a mobile access solution that uses comprehensive multi-factor authentication and identity management to securely connect an organization’s assets with its employees, mobile workers, and contractors. Secure mobile access to any asset on any network using any device. MobiKEY means freedom for an organization's team members to remotely connect to enterprise assets with zero change to their workspace environment. Additionally, the use of MobiKEY means an organization can enjoy robust secure mobile access without compromising the enterprise’s integrity - no malware, no data spillage and no network breaches. More

security stock solutionsMr. Steve Cocco
Security Strategies Today

I have dedicated my professional life to law enforcement and security and am now the president of my own company.  I got here after 27 years with the FBI, having started off in the Bureau's New York office as a linguist in the 1980s. I was so impressed with the professionalism of the agency that I decided I wanted to become an agent and was honored to be given the opportunity.  I spent several years as a field agent in San Diego and New York before going into management. That took me to Rome, Italy, where I was assigned to the US embassy to support the FBI's mission overseas.  I also responded to the US embassy bombings in East Africa and conducted extensive FBI-sponsored training to foreign law enforcement partners in Africa and in Latin America.  I was given the opportunity to set up the FBI's Joint Terrorsim Task Force in the San Juan, Puerto Rico division and finally served as Assistance Special Agent in Charge in Phoenix.  It was just an amazing career with outstanding people and opportunities. More

security stock solutionsMr. John Mears
Senior Fellow
Information Technology & Security Solutions
Lockheed Martin IS&GS Civil

The idea behind IDHaystack™ is to make identification and verification services more accessible and evergreen within a secure Government community cloud construct. We were thinking, “Wouldn’t it be wonderful to be able to offer an advanced multi-modal biometric system in a way accessible to many different Government customers without their having to expend significant capital to get it?” We wanted to create an evergreen biometrics engine that could support an open framework in which customers’ existing unique workflows, rules, interfaces and user requirements could be accommodated as they exist or built separately to suit them. We tested these tenets with customers around the world and got positive affirmation that this is what they wanted going forward. Let me elaborate on why this idea is revolutionary. More

security stock solutionsMr. George Romas
Technical Director
HP Enterprise Services, U.S. Public Sector

The current atmosphere of porous government networks and unprotected information is demanding attention from government leaders and CIOs. The idea of a cybersecurity sprint seems to have been a decent approach to jumpstarting efforts to improve security. However, this top-down approach does not adequately address the variety of issues that lead to compromise of government networks, including cyber terrorism, cybercrime, and hacktivism. The Cyber Sprint had four specific goals: for DHS to share priority threat-actor Techniques, Tactics and Procedures (TTPs); immediately patch critical vulnerabilities on a weekly basis; improve controls and governing policies on privileged users; accelerate implementation of multi-factor authentication. While these short-term measures are adequate for improved security, they are not nearly sufficient because software does not exist in a vacuum; you must also consider vulnerabilities of the overall design of the architecture and platform.. More

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
Founding Member
Fido Alliance

FIDO Alliance has enjoyed significant growth in 2 years from 4 initial board members with 6 total members at inception to 27 board members with 225+ total members and representation from all cross sections of technology players, platform players, device manufactures to financial and other service providers globally. The FIDO Alliance board currently includes Alibaba Holdings(NYSE:BABA); ARM Holdings plc (LSE: ARM and NASDAQ: ARMH); Bank of America Corporation(NYSE:BAC);CrucialTec (KRX: 114120); Discover Financial Services (NYSE: DFS); EgisTec and Google (NASDAQ: GOOG). More

security stock solutionsMr. Raj Samani

If I utter the words cyber, what is the term that springs to mind?  In most cases they will be negative, such as crime, espionage, war, etc. However the reality is that this is only one side of the coin, and one term that is often forgotten is opportunity.  Technology has transformed every industry, every person, every section of society.  We have to recognize this and maximize the opportunities for the benefit of each of us, but do so in a way that reduces the risk to a level we are all comfortable with.. More

security stock solutionsMr. Carl Bradley, U.S. Navy (Ret.)
Information Assurance & IT Security
Consulting & Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks—a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients’ security posture must be agile and responsive to better defend against threats —internal and external—in addition to vulnerabilities, in order to mitigate their risk...More

security stock solutionsMr. Daniel Almenara
Vice President of Risk Management
Discover Financial Services

Information security risks for financial institutions have increased and are continuing to increase. Factors include the proliferation of new technologies, the use of the internet and telecommunications technologies to conduct financial transactions, and the increased sophistication and activities of activists, hackers and organized criminals. Security is a top priority for Discover and the FIDO Alliance. Both are working to make online interactions easier and more secure. At Discover, we monitor our customers’ accounts to prevent, detect, investigate and resolve fraud.  We also look to our work with the FIDO Alliance to help inform our authentication techniques and strategies. Our fraud prevention systems handle the authorization of Discover’s application information, verification of our customers’ identities, sales, processing of convenience and balance transfer checks and electronic transactions. Each and every card transaction is subject to screening, authorization and approval through a proprietary POS decision system. Discover uses a variety of techniques that help identify and halt fraudulent transactions, including adaptive models, rules-based decision-making logic, report analysis, data integrity checks and manual account reviews.  We manage accounts identified by the fraud detection system through technology that integrates fraud prevention and customer service. These strategies are subject to regular reviews and enhancements to enable us to respond quickly to changing conditions, as well as to protect our customers and our business from emerging fraud activity. More