Thought Leaders at McAfee, HP, ImageWare, Finjan and Route1 Discuss Security Solutions on SecuritySolutionsWatch.com
NEW YORK, NY--(Marketwired - Sep 24, 2015) - ImageWare Systems, Inc. (OTCQB: IWSY); Intel (NASDAQ: INTC), Finjan (NASDAQ: FNJN), Route1 (TSX VENTURE: ROI)
Mr. Raj Samani, McAfee, EMEA CTO, told us, "If I utter the words cyber, what is the term that springs to mind? In most cases they will be negative, such as crime, espionage, war, etc. However the reality is that this is only one side of the coin, and one term that is often forgotten is opportunity. Technology has transformed every industry, every person, every section of society. We have to recognize this and maximize the opportunities for the benefit of each of us, but do so in a way that reduces the risk to a level we are all comfortable with."
For our complete interview with Mr. Raj Samani, McAfee, EMEA CTO, please click here
http://securitysolutionswatch.com/Interviews/in_Boardroom_McAfee.html
For more information: www.McAfee.com / NasdaqGS INTC
*****
Mr. Carl Bradley, U.S. Navy (Ret.), Information Assurance & IT Security, Consulting & Intelligence Strategy, HP Enterprise Services, U.S. Public Sector, told us, "There are three key challenges our clients face today. First, cyber threats are ever-changing and becoming more sophisticated by the day. Cyber terrorism and targeted cybercriminal activities are directly impacting both the public and private sectors. They are persistent and yet, based on our research into exploit trends in 2014, attackers continue to leverage well known techniques to compromise systems and networks. Many vulnerabilities exploited in 2014 took advantage of code written many years ago and adversaries continue to leverage classic avenues for attack against client-side and server-side applications. Anti-virus signatures only catch approximately 45 percent of cyber attacks -- a truly abysmal rate. In our review of the 2014 threat landscape, we find that enterprises most successful in securing their environment employ complementary protection technologies. These technologies work best when paired with a mindset that assumes a breach will occur instead of only working to prevent intrusions and compromise from the perimeter. So our clients' security posture must be agile and responsive to better defend against threats -- internal and external -- in addition to vulnerabilities, in order to mitigate their risk".