But the wrong cyber-laws can mean government locking in inferior security technologies and procedures.
Another hot performer was Palo Alto Networks, a maker of firewalls and other security technologies, whose shares soared 26 percent on the first day of trading in July.
FORBES: Investing Opportunity: Prepping For Cyber Pearl Harbor
Since then, the committee has directed and funded the application of new security measures and advanced security technologies at all border points and in respect of immigrant and refugee screening.
Policymakers repudiate market discipline regularly, such as with, say, federal deposit insurance, rebuilding beachfront homes at taxpayer rather than insurer expense, and indemnifying makers of homeland security technologies when their products fail.
"That's a legitimate worry, " said Mr Bocque with regards to the guards' crime concerns, though he stressed that modern security technologies and revised routines have in recent years almost eliminated injuries among security staff transporting money.
Tom Kellermann, a former computer security official at the World Bank who now works at a firm called Core Security Technologies, said the most advanced hackers in the world are increasingly targeting financial institutions, particularly those involved in trading.
But the largest collections currently available from Core Security Technologies, Immunity and an open source project known as Metasploit include exploits for less than 10% of the 14, 000 security flaws publicly revealed in information technology systems over the last five years.
Most new Chevrolet models offer OnStar safety, security and convenience technologies including OnStar Hands-Free Calling, Automatic Crash Response and Stolen Vehicle Slowdown.
ENGADGET: Chevrolet launches MyLink smartphone integration for 2012 Volt and Equinox
Top-level executives are among the most guilty of leaping on the latest gadget, says Chris McKie, the director of analyst and public relations at security firm Watchguard Technologies Inc.
Middle Eastern banks and payment processors are "a bit behind" on security and screening technologies that are supposed to prevent this kind of fraud, but it happens around the world, she said.
Samsung's Exynos 5 Dual processor delivers an order of magnitude lift in performance over current generation processors and leads the way in GPU compute as the first SoC capable of full profile OpenCL. The Exynos 5 Dual also incorporates the latest in security and multimedia technologies to meet the needs of the next generation of mobile products.
ENGADGET: Samsung launches $250 Exynos 5-based Arndale community board for app developers
Vendors that are assisting include Microsoft, Internet Security Systems, Axent Technologies, Network Associates, Symantec and Trend Micro.
Any legislative mandate on U.S. companies will surely render them less secure because they will be focused on meeting a compliance requirement instead of countering a threat with the best technologies and security practices.
FORBES: Congress Needs to Go Back To School on Cyber Legislation
In the past we talked about "dual use" military-civilian technologies, but truth be told, not much of what's in a bomb migrates back to a BMW. However, the money flowing into military and homeland infra-structure security will leverage revolutionary technologies and materials of the new digital age.
Last year, he participated in California's "Top-to-Bottom" review of voting machines that found critical security vulnerabilities in the technologies of electronic voting companies Sequoia, Premier Election Solutions and Hart InterCivic--vulnerabilities that the researchers said could be used to prevent machines from accepting votes, change voting counts and, in some cases, even identify voters.
Many defense companies, like L-3, GE and Northrop Grumman have security divisions to advance these technologies.
While users will like the tablet for its aesthetics and powerful features, IT managers will particularly enjoy its security-enhanced and manageability technologies.
Therefore, we have to do all that we can do to encourage foreign authorities to utilize the same enhanced technologies for aviation security.
Any improved gains in resiliency, however, may be hard to measure or prove, especially against the metrics of a good enterprise security program that deploys proven technologies.
FORBES: Caution: Active Response to Cyber Attacks Has High Risk
Bob Cortopassi, Accelerated Payment Technologies' compliance security officer, said the breach happened because of a "lack of basic security requirements" and isn't the fault of its payment system.
Missing from the often-cited standards are specific references to many technologies that the security industry has long been pushing card companies to adopt: EMV (Chip and PIN), End-to-End (E2E) encryption, tokenization and virtualization.
FORBES: Payment Card Industry Punts On Key Security Questions
"This case dramatically illustrates the dangerous consequences of decisions made in haste to slash the list of technologies controlled for national security purposes, " said Frank J.
In parallel, define a security architecture and migration strategy that provides security through browsers, Secure Sockets Layer and passwords in the short run, and gets you started on PKI by deploying technologies such as IP Security virtual private networks and the Secure Multi-purpose Internet Mail Extensions e-mail standard.
Security researchers have shown that other virtualization technologies, like those made by Palo Alto, Calif.
While the project realization leading companies, which work with museum security systems were involved to demonstrate existent technologies.
As a practical matter, rigorous national security reviews of sensitive dual-use technologies often cannot be performed in so short a period of time.
Here, at this session, we can reaffirm our Article V commitment to our collective defense and to investing in the defense capabilities and new technologies that meet our collective security needs.
In a report recently issued by Burning Glass Technologies, demand for IT security jobs has grown 12 times faster than all other jobs, growing by more than 73% nationally between 2007 and 2012, and as much as a 100% in certain major metropolitan areas.
On the policy side of cyber security, legislation has been written around legacy technologies that are no longer relevant.
FORBES: How Secure is the 'Cloud in Your Pocket?' Someone is Making It Bulletproof.
应用推荐