Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Mon, 2014-09-01 02:26 PM
As the primary research and development arm of the Department of Homeland Security, the Science and Technology Directorate (S&T) is looking twenty to thirty years out, or even further, to define...
Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Thu, 2014-07-31 07:24 PM
The House has passed three bills that aim to protect critical infrastructure from cyber attack through the distribution of cyber threat information, the development and procurement of new...
Wed, 2014-07-30 06:25 PM
A new bill has been introduced by Rep. Bennie Thompson (D-MS) and Sen. Ron Wyden (D-OR) that aims to reduce U.S. government over-classification in order to improve information sharing, cut costs, and...
Mon, 2014-07-14 06:23 PM
http://www.nikeairmaxfreerun.com nike air max 2015 A law enforcement and industry partnership has taken measures against the Internet domains and servers that form an advanced cybercriminal...
Mon, 2014-07-07 04:38 PM
On Saturday, the U.S. Secret Service arrested Roman Valerevich Seleznev in France. Russian national Seleznev was indicted in the Western District of Washington in March 2011 for hacking into point of...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Tue, 2014-07-01 08:30 PM
Live from PortSecurity2014 -- Washington, D.C.-based Captain Andrew Tucci, U.S. Coast Guard chief of Ports and Facilities, Information Issues and Supply Chain Security, delivered a chilling...
Fri, 2014-06-27 03:16 AM
The Supreme Court on Wednesday ruled unanimously that police officers must obtain a warrant to search data on someone’s cell phone. Cell phone data has become an integral part of many criminal...
Thu, 2014-06-26 04:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 03:59 PM
Since the beginning of fiscal year 2014, U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) has identified 585 victims of child sexual abuse and exploitation,...

Company News

Real-Time Technology Group (RTTG), a provider of secure and hosted identity management solutions for operations and incident response, has partnered with All Points Logistics, a Service Disabled Veteran Owned Small Business, to bring RTTG’s Real-Time Verification (RTV) technology platform to All Points’ state and federal customers.

Austin, TX-based Motion Computing has announced that The City of Brenham has achieved a 30% cost savings by replacing its old mobile communications and data technology throughout its police and fire vehicles with Motion’s Windows-based rugged tablets and RAM mounts.

With FICAM’s decision to approve McLean, VA-based ID.me as an accredited Credential Service Provider last Thursday, the company joins the likes of Symantec and Verizon by enabling American citizens to easily and securely access government services online through a trusted Single Sign On, ID.me says. The Federal Identity Credential Access Management (FICAM) Trust Framework Solutions program approved ID.me as a non-PKI Credential Service Provider (CSP) and Token Manager service operating at Assurance Levels 1, 2, and 3.

Ashburn, VA-based Telos Corporation, an information technology provider that delivers solutions that empower and protect the world’s most security-conscious enterprises, has announced the general availability of SE7EN: NetAlert, an interactive, Web-based network infrastructure monitoring tool to protect the physical security of fiber optic and copper cable networks.

San Mateo, CA-based Norse Corp., a provider of live attack intelligence, has announced the appointment of Jacinta Tobin to serve as the company’s first senior vice president of global sales.

Named in May 2013 as one of the top 50 most influential women in technology by Silicon Valley Global magazine, Tobin will spearhead all of Norse’s global growth initiatives.

The GSMA has announced its collaboration with the United Nations Children’s Fund (UNICEF) to promote industry guidelines to safeguard children online in Latin America and the Caribbean. The GSMA will promote the Guidelines for Industry on Child Online Protection within the Latin American mobile industry and will work closely with UNICEF to identify ways in which mobile operators can promote children’s rights and responsible digital citizenship.

Gallagher, an international provider of integrated access control, intruder alarm, and perimeter protection continues to grow operations with the appointment of Jim Saletta, new Business Development Manager for the western region of the U.S.

Working alongside Eddie Salinas, technical account manager, Jim will manage multiple relationships from distributors, business partners, and customers to drive Gallagher's end-to-end security solution.

Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, NV.

Survey respondents were asked which security event had a greater impact on their budget and executive security awareness of cybersecurity: Target's data breach, the Snowden leaks, or the increase in targeted threats.

Commentary and Opinions

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.

Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...