home

Breaking News:

U.S Department of Treasury Awards Accenture $48 Million Contract for IT. More

Garmin Enhances Connext with Wireless Cockpit Connectivity to Mobile Devices. More

BIO-key and Experian Collaborate to Offer Enhanced ID Verification. More

Nuance Unveils Dragon NaturallySpeaking 13. More

RSA Web Threat Detection Adds Enhanced Visibility & Analytics; Takes on Mobile Fraud. More

Raytheon Builds a Fleet of Decoy Robots for the U.S. Air Force. More

Versar Awarded Iraq Personal Services II Contract From U.S. Army Corps of Engineers. More

Largest New York Real Estate Development Selects AMAG Technology’s Symmetry™ Enterprise Security Management System. More

Apple and IBM Forge Global Partnership to Transform Enterprise Mobility. More

Will Home Depot, Amazon, Or Dell, Launch The 3D Printer Revolution? More

Oracle Marketing Cloud Expands the Industry's Most Comprehensive Marketing Technology Ecosystem. More

StrikeForce Adds Logical Source, Inc. as a New Distributor of Its Products. More

Trend Micro Announces Comprehensive Security Capabilities for Microsoft Office 365 Customers. More

Honeywell's Spectra Shield® Ballistic Material To Provide Ballistic Protection For Next-Generation Law Enforcement And Military Body Armor. More

Novartis Joins With Google to Develop Contact Lens to Monitor Blood Sugar. More

CVS Caremark and IBM Announce the "Technology Solutions for Smarter Health" Program. More

10 Things In Tech You Need To Know Today. More

Radware's Attack Mitigation Device Extends Common Criteria Certification Through Laboratory Testing. More

Here's A Great Explanation Of The 'Big Data' Phenom In 8 Words. More

Apple loses Siri voice recognition case in China. More

Oracle Helps dunnhumby Transform Its Global Processes via the Cloud. More

Google Cloud Storage offering 2 TB of free storage through Panzura to compete with Amazon, Microsoft. More

Oshkosh Defense’s JLTV Solution Completes “Net-Ready” Testing. More

Unisys Cited as a Leader in Independent Research Firm's Report on ITSM Implementation Services Provider. More

Security Firm Described Simulation as Real Hack. More

H-P Printers Selected by US Air Force. More

Kratos Receives $32 Million in National Security Program Awards. More

Unisys Delivers New Basic Provision Biometrics Solution to Dutch Custodial Institutions Service. More

HP Wins $147M Medicaid Contract in Delaware. More

Veterans Affairs Selects ASM Research to Modernize Electronic Health Records. More

Black & Decker recalls 108,000 routers because of shock risk. More

Three Serious Takeover Candidates in Data Security. More

CAE wins defense contracts valued at approximately $110 million. More

Security Concerns Put IBM / Lenovo x86 Server Deal In Limbo. More

Raytheon Secures a Flurry of DoD Deals. More

ImageWare Systems Awarded $1.0 Million Contract to Implement Multi-Modal Biometric Driver License System for State of Baja California. More

Google is Taking on AT&T and Preparing to Take Over Your Home. More

Glucose-Monitoring iWatch May Give Apple a Sweet Lead in Wearables. More

Oracle Agrees to Buy Micros Systems for $5.3 Billion. More

I.D. Systems Receives $500,000 Order From Railroad to Track Intermodal Containers. More

Hackers Find New Ways to Breach Computer Security More

Cyberattack on Hong Kong Vote Was Among Largest Ever More

Hackers Take Down World Cup Site in Brazil More

iHeartRadio crosses 50 million users in 3 years. More

March Networks Announces High-Performance 6700 Series Hybrid NVR Platform and Edge 4e Encoder More

IBM Builds a Cloud Ecosystem in Egypt with New Technology and Skills. More

OSI Systems announced $10 mln order from international customer to provide multiple units of its Rapiscan Eagle M60 mobile high energy X-ray cargo and vehicle inspection system. More

CA Technologies Redefines SaaS-based IT Service Management. More

StrikeForce Technologies is Awarded a Second Patent for its Keystroke Encryption Technology. More

Pentagon Awards $145 Million in Defense Contracts. More

NICE Actimize Anti-Money Laundering Poll Finds Only 48 Percent of Financial Institution Respondents Believe They Have a Strong Culture of Compliance. More

TRC Awarded Storm Hardening Contract by Public Service of New Hampshire. More

Microsoft Partners With Chinese Internet Security Company Qihoo 360. More

Fidelis XPS Extends YARA-powered Capabilities to Enhance Real-time Malware Command and Control Prevention. More

Diebold's Self-Service Solutions Drive The Family Credit Union's New 'Smart Branch'. More

ACI Worldwide Powers Online and Mobile Banking for Pearl Harbor Federal Credit Union. More

NICE Introduces New Text-to-911 Logging Solution for Next Gen Emergency Communications Worldwide. More

Honeywell Challenges Google's Nest With A New Smart Thermostat That Responds To Your Phone's Location. More

Mace Security International Reports Pepper Spray Saves Lives in Seattle School Shooting. More

Apple's New Plan for iPhones. More

Flaircomm selects Gemalto to provide secure M2M solution for car manufacturers in China. More

Facebook Buying Mobile-Data Company Pryte. More

Bitcoin: Coming Soon to an iPhone Near You. More

Intel’s thin tablet shows off smaller new chip: Look Ma, no fans! More

Lockheed Martin Defeats Raytheon to Win $915 Million Air Force Space Fence Contract. More

Northrop Grumman Wins Three Defense Contracts. More

SEC not to recommend action against IBM on cloud revenue. More

Zix CEO Breaks Down The Email Encryption Business. More

Is Facebook Getting a Little Too “Big Brother?” More

Apple Knows That Home Is Where the Smart Is. More

Zurich Insurance PLC Expands Use of Accenture’s Software to Rapidly Deploy Products and Improve Customer Service. More

SanDisk introduces storage solution for tablet, smartphone market in China. More

Law enforcement and the use of body cameras. More

LoJack names its 10 most stolen cars. More

Security Industry Fights Surveillance State with Words. More

VASCO to expand portfolio with Risk IDS acquisition. More

Apple Point-of-Sale Upgrade Signals Better Security. More

China Bans Windows 8 From Government PCs. More

Why the cloud needs to clean up its act. More

Alcatel Creates Israel Bell Labs Center to Bolster Cloud Effort. More

T-Mobile taps Walmart to sell low-cost 4G tablets with limited free service. More

IBM Shows Robust Growth In Cloud. More

Compliance Software Helps Meet Regulatory Demands. More

Relationships with IBM, Fujitsu, T-Systems and others representing just the tip of the iceberg for ImageWare. More

Cloud Growth Is a Game Changer for SanDisk. More

OSI Systems receives $15M order for cargo, vehicle inspection systems. More

Hope For Military Spending Growth Boosts Boeing and United Technologies. More

HP Launches HP Helion Portfolio of Cloud Products and Services. More

AT&T and Verizon received one government data request per minute last year. More

Gemalto's Olivier Piou on Secure Credit Card Technology. More

Microsoft Holds Business Software Market Share Lead. More

EMC buys secret chip maker DSSD. More

IBM's New Cybersecurity Plan: Find Bad Guys Before They Steal. More

Target CEO resigns as fallout from data breach continues. More

ImageWare(R) Systems Brings IDaaS to the IBM Cloud Platform. More

AT&T, Honeywell to challenge Gogo's airborne Web business. More

General Dynamics secures $17.65 billion contract. More

Why Are IBM and Microsoft Soaring? More

Homeland Security struggles to tempt, retain cyber talent. More

Why 'Smart' Guns Won't Transform the U.S. Firearm Industry. More

Europe’s Antitrust Chief Censures Google’s Motorola Mobility. More

AOL confirms security breach; users' passwords, address books exposed. More

Aol Mail Hacked With Spoofed Accounts Sending Spam. More

Apple vs. Samsung: Smartphone rivals billions apart in value of patent feud. More

Feds consider long-term HealthCare.gov contractor. More

AT&T Goes After Google With Plans to Bring Gigabit Broadband to 21 New Cities. More

Cloud Storage Wars Could Favor the Little Guys. More

Comtech Telecom receives $3.1 mln satellite modem order from government systems integrator. More

Australia's GE Money warns customers of 'Heartbleed' bug. More

Cloud infrastructure business seen as three-horse race. More





Please see our news archive for more breaking news about security solutions, homeland security, and security stocks... click here.

website statistics

In The Boardroom With...

security stock solutionsMr. Ramesh Kesanupalli
Founder of Nok Nok Labs
www.noknok.com

Founding Member
Fido Alliance
www.fidoalliance.org

Prevailing password authentication has proven to be insecure and risky amidst a world of escalating security threats, cyber crime and targeted attacks, not to mention increasing vulnerability associated with so many more vectors of attack coming through the Internet of Things (IoT). Right now, we are moving from informational access to a major life style change where we can access everything digitally. We’re at the threshold of using authentication to pay at retail stores with our phones, to open and start our cars, to manage home networks, appliances, and security systems all through connected devices. Authentication is the FIRST step we must perform to begin to effectively use IoT.  More


security stock solutionsMr. George Romas
Technical Director
Cybersecurity Solutions Group
HP Enterprise Services U.S. Public Sector

IoT will create completely new industries that form around smart devices. We already see the beginnings of that today, where smoke detectors, thermostats, audio/video equipment, watches, smart phones, vehicles and more are becoming sensor-rich and network-enabled. Everyday devices in your home or office will collaborate to form new capabilities. An example of this scenario can be demonstrated through home security. Using IoT, your home would know that your house is vacant by polling the motion detectors embedded in its Nest Protect smoke detectors and thermostat, and correlating that information with the family schedule (work and school). When the back door opens without the proper key code or ping from an authenticated smart phone and motion is detected, your home sounds a piercing alarm over the whole-house audio speaker system. In turn, it also sends an alert with streaming video to the police, sends warning texts to all family members, and disrupts other communications from within the house.   More


security stock solutionsMr. Jim Miller
Chairman and CEO
ImageWare Systems, Inc.
www.iwsinc.com

We see our relationships with IBM, Fujitsu, T-Systems and others
representing just the tip of the iceberg in terms of our opportunities in the commercial and consumer marketplaces. All of these partnerships are progressing well, and although they have not yet produced revenue, there is every indication that the steps we have been taking are building shareholder value and will ultimately provide a steady stream of recurring revenue. More


security stock solutionsMr. Michael D. Day
IBM Distinguished Engineer
Virtualization and Linux

www.ibm.com

None of the security issues associated with networked computing have gone away with Cloud Operating Systems. In many ways we are more vulnerable than ever to breaches being escalated. The Trusted Platform Module is a partial solution which can validate the boot chain of a compute node. (Verify the platform has come up without a root kit). The TPM is well supported by Linux and by the KVM hypervisor, but not widely used, although it should be. As bad as the security issues are with data center computing, they are much worse with the IoT right now, primarily because that set of products has evolved in a disconnected state and has not been exposed to attack in the same way our data processing infrastructure has been for decades.. More


security stock solutionsMr. John Felker
Director, Cyber and Intelligence Strategy
HP Enterprise Services, U.S. Public Sector

HP takes an enterprise view of security which, in turn, helps our clients overcome the limitations typically associated with historical and siloed views of risk mitigation, globalized security and cost reductions. With the increased deployment of digital technologies, frequently operated remotely and unmanned, comes the need for increased cyber- and physical security for critical assets such as SCADA systems. At HP, we don’t simply improve your security posture to address threats and manage risk and compliance, we also bring to bear an array of services, solutions and industry-leading technology to ensure you maintain a proactive, mature and agile security posture designed to navigate through ever-evolving threat and regulatory landscapes. By leveraging cloud, big data and mobility initiatives, you can evolve into a more proactive operating model which will increase productivity, optimize resource utilization and help you build and maintain safe, secure and environmentally sound operations.  More



security stock solutionsMs. Jody Ross
Vice President of Business Development
AMAG Technology, Inc
www.AMAG.com

AMAG’s Symmetry access control system is the best software on the market today. Our software and hardware come packed with features that other manufacturers charge for.  The GUI is similar to Microsoft’s so it’s familiar to everyone, reducing training time, and it integrates to a wide variety of technology partners to provide video, audio, HR, etc. options to customers who need those options.  Innovative features such as Alarm Workflow, Task Manager and Threat Level Manager allow security directors to better manage their security team’s response times and actions, and secure their building during crisis situations. Symmetry is a leading-edge security system designed for buildings of any kind, which combines all aspects of security into a single well-designed and future-proof software solution suitable for small, large or very large applications. . More


security stock solutionsMr. Rob Wigley
Director, Cybersecurity Consulting Services
HP Enterprise Services, U.S. Public Sector

Without question, adversaries have become smarter, better organized, and more persistent as they seek to cause disruptions and access intellectual property and other sensitive information. The number of cyber threats is proliferating faster than many organizations can defend. Many companies and global governments have been subjected to some very sophisticated and targeted attacks, which have had a significant impact on their mission. This includes some recent extremely high-profile breaches conducted by insiders. In order to address these threats, first and foremost an organization needs to have an effective risk management program supported by senior management, with a strong governance structure, and integrated across all business processes. As businesses look for new growth opportunities and consequently adopt new technologies, the tradeoff becomes uncertainty and risk that could affect their mission and goals. A continuous process of risk management activities should be applied to identify new risks, reassess previously identified risks, and monitor and track the effectiveness of risk mitigation plans. . More




security stock solutionsMr. Net Payne
Chief Marketing Officer
March Networks
An Infinova Company
www.MarchNetworks.com

March Networks is ranked the #1 provider of enterprise digital video recorders (DVRs) in the Americas, as well as the #1 supplier of video surveillance equipment to the Americas’ banking market (IHS Inc., formerly IMS Research).  While our video surveillance solutions can be used in a variety of industries and applications, we focus in particular on providing the financial and retail markets with integrated solutions that help them increase profits and realize faster returns on their technology investments. We are also a leader in providing mobile video surveillance solutions to bus and light rail transit authorities. . More


security stock solutionsMr. Mark L. Kay
Chairman and CEO
StrikeForce Technologies, Inc.
www.strikeforcetech.com

Cyber Theft and data breaches are increasing at a faster pace and in the news almost every day with reports on Data Breaches (e.g. Target, Living Social, Federal Reserve, State of Maryland), Viruses stealing keystrokes (e.g. Facebook, Twitter, Gmail) and phishing attacks (fake websites - IRS, banks). Financial institutions are being sued and losing, and cybercrime statistics in our opinion, are projected to be into the trillions of dollars globally. In conjunction with this news, regulations focusing on protecting information are gathering strength with emphasis in the financial (FFIEC), healthcare (HIPPA), consumer (PCI) and now legal markets. If you then include various articles that state "...it is only a matter of time before your mobile device is hacked, if it isn't already," StrikeForce management contends that demand is increasing specifically for the types of features and capabilities that StrikeForce Technologies' patented and patent pending products deliver. All of this translates, in our estimation, into the potential for substantial sales and revenue growth in 2014 as the Company begins to exploit the mobile market and reaches its Vision of "Making the World a Safer Place." More


security stock solutionsMr. Danish Thanvi
CEO & President
Xcluesiv Cloud Technology Pte Ltd
www.xcluesiv.com

Xcluesiv is the Alliance partner of Zoho.com and Google Apps in Singapore. Both of them are world leaders in Cloud-Based Solutions, so Xcluesiv provides a perfect combination of 360 degree solution for small and midsize businesses to quickly adopt integrated cloud based ERP tools (CRM, HRM, recruitment, accounting, collaboration etc) and thus save a lot of money and time.  These solutions are secure and redundant, accessible from anywhere and from any device; this enhances the business potential tremendously. Interestingly, the Singapore government is aggressively pushing for the adoption and deployment of cloud services in the country." More


security stock solutions Mr. Ryan Skipp
T-Systems International GMBH
Portfolio & Solution Design - IT

Applications & Portfolio Architecture

www.t-systems.com

T-Systems as an Outsourcing & Service Provider has to provide base infrastructure services which meet the cost and quality expectations that a company transitioning to outsourced services would expect – better than they as an end-user could produce, with better quality, and lower cost!  In order to achieve that, T-Systems was one of the first Outsourcers to produce a “Cloud” platform, based on highly shared leveraged infrastructure, and with a number of pre-defined applications on top of that.  Today we have enhanced that infrastructure, and wrapped the Cloud functionality into it, all the way up to self-service (to application level) for our Private Cloud clients. . More



security stock solutions

Mr. Mark Wood
Product Manager
Cloud Security
Dell SecureWorks
www.secureworks.com

Our purpose-built security platform enables us to filter, correlate and analyze more than 29 billion events across our global customer base every day. We’re also well known for our Counter Threat Unit research team, which includes some of the most experienced security experts in the industry. We use our correlation algorithms and our skilled staff to identify threat activity on customer networks as benign or hostile and to assign a level of severity to the hostile activity. The net is that if we call you, you know it’s worth your immediate attention and if we don’t, you know you can sleep easier. More



security stock solutions

Mr. Jason Waxman
General Manager
Cloud Infrastructure Group
Intel

With cloud infrastructure, servers are typically virtualized and shared across multiple lines of business or even among multiple organizations rather than dedicated to specific lines of business. When IT wants to link multiple cloud data centers together to gain efficiencies—the tools to secure this far-reaching infrastructure are still evolving. This lack of visibility – even in private clouds that are behind a company’s firewall - have people concerned because they no longer have dedicated equipment for their line of business and instead are using shared, multi-tenant resources. This is why 61% of IT that were surveyed are concerned about having less control and visibility over these shared resources, even in a private cloud. Intel and McAfee are working to address these challenges and advance security solutions for cloud services. More