Oracle’s Java Cloud Service open to code execution hacks.

Security Research shows 30 technical details along with exploit code in oracle’s Java Cloud. Some of these exploits allows to modify user’s data and even execute malacious codes.  Poland-based Security Explorations typically withholds such public airings until after any vulnerabilities have been fixed to prevent them from being exploited maliciously. …

read more

BRS Labs to demonstrate enhanced cloud service, AISight 5.0 at ISCW event

Top Priority Sector:  video_surveillance_cctv Houston, TX-based Behavioral Recognition Systems (BRS Labs), creator of the AISight platform, the artificial intelligence analytics solution that teaches itself to recognize and alert on unexpected patterns within massive volumes of sensor data, will demonstrate a new, lower-cost cloud-based AISight intelligent video analytics service at the…

read more

Motorola Solutions awarded first Public Service TETRA Radio Project by the Royal Brunei Police Force

Top Priority Sector:  law_enforcement_first_responders Schaumburg, Illinois-based Motorola Solutions, a provider of mission-critical communication solutions and services for government and enterprise customers, has been awarded a multimillion dollar contract to provide a nationwide Terrestrial Trunked Radio (TETRA) digital radio network to the Royal Brunei Police Force (RBPF). Read More…. View full…

read more

IBM offers new cybersecurity consulting service to protect critical infrastructure

Ashley Bennett Top Priority Sector:  cyber_security IBM has unveiled a new cybersecurity consulting service to help critical infrastructure organizations utilize the new NIST Cybersecurity Framework that was recently released by the Obama Administration and the Department of Commerce’s National Institute of Standards and Technology (NIST). Homepage position:  1 For more…

read more

Lastline’s Innovative Anti-Hacking Service Detects and Protects Against Malware Code

Traditional anti-virus software is designed to detect the malware, or malicious software, before it disrupts and then distributes sensitive, personal information to unintended recipients. The trouble with some of those software programs, however, is speed and accuracy. As technology has progressed, so have the cyber hackers, a detail not lost on UC Santa…

read more