Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2014-04-29 12:34 AM
On the heels of the Heartbleed security bug, Microsoft Corp. is scrambling to fix a bug affecting the widely used Internet Explorer (IE) Web browser. The U.S. DHS is advising computer users to...
Fri, 2014-04-25 01:48 AM
About 58 percent of cyber security incidents in the public sector were caused by employees, according to this year’s annual Verizon Data Breach Investigations Report. About 34 percent were caused by...
Wed, 2014-04-09 10:26 PM

Ryan Kalember

“Most of the government’s sensitive information is not in databases, but in files such as PDFs, PowerPoint slides, and Word documents. As a matter of fact, the Snowden NSA leak was all files,” said...
Fri, 2014-03-28 02:40 AM
“Security is escalating in importance,” said Dan Reuckert.Rueckert is the associate vice president of Black & Veatch’s Management Consulting Division’s Security & Compliance practice. He has...
Wed, 2014-03-19 10:02 PM

Mark Gelhardt

“You have to take cybersecurity seriously no matter what business you are in,” said Mark Gelhardt.
Wed, 2014-03-12 11:20 PM

Rep. Kerry Bentivolio 

A bill introduced by Rep. Kerry Bentivolio (R-MI) to improve the security of government websites has been unanimously approved by the House Oversight and Government Reform Committee.
Thu, 2014-02-13 07:40 PM
The Obama Administration has announced the release of the Cybersecurity Framework, the result of a year-long effort to develop a voluntary guide for critical infrastructure organizations to...
Tue, 2014-02-11 11:24 PM

Tom Kellermann

“This is a Cybersecurity 911 system for our critical infrastructure,” said Tom Kellermann regarding the National Cybersecurity and Critical Infrastructure Protection Act of 2013 (NCCIP).
Thu, 2014-02-06 11:41 PM

Dr. Oliver McGee

“Cyber-assaults on the nation's critical infrastructure are on the rise at alarming rates,” says Dr. Oliver McGee.McGee is the former United States deputy assistant secretary of transportation for...
Wed, 2014-02-05 08:35 PM
Several major Internet companies, for the first time, have revealed in broad terms the number of data requests they receive that have been approved by judges under the Foreign Intelligence...
Tue, 2014-02-04 06:36 PM

Michael Rogers 

Secretary of Defense Chuck Hagel has nominated Navy Vice Admiral Michael Rogers as President Obama’s nominee to become director of the National Security Agency (NSA) and commander of U.S. Cyber...
Fri, 2014-01-31 05:28 PM

Rebecca Richards

The National Security Agency (NSA) has appointed Rebecca Richards as its first-ever civil liberties and privacy officer. Ms. Richards most recently worked as the senior director for privacy...

Company News

Frisco, TX-based Sheplers, a multi-channel western-wear retailer, has determined that their payment systems suffered a security breach in which hackers gained access to their systems and some of their customers’ payment card information was exposed. With the assistance of a leading computer security firm, Sheplers is continuing the investigation into the incident, and are cooperating with law enforcement in their efforts to find the criminals responsible.

Boston, MA-based Wealth Management Systems (WMSI) has announced that Doug Perkins has joined the firm as information security officer. An industry veteran with extensive experience in software development, project management, quality assurance, and operations and information security, Perkins is assuming responsibility for the design and future development of WMSI’s enterprise-wide information security strategies and policies. Mr. Perkins reports to BJ Ralston, WMSI’s chief compliance officer, and is based in WMSI’s Boston Office.

Princeton, NJ-based IXP Corporation, a public safety and emergency response provider that has partnered with Johns Hopkins University (JHU) for the past 10 years, has announced an innovation that raises campus security to the next level.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $220K contract to provide its IM2610 TWIC Plus readers to the Port of New Orleans in Louisiana. The new contract is for a web-hosted TWIC card reading system. The readers will provide TWIC card authentication and Be On the Lookout (BOLO) checks.

London, England-based Brit PLC, a global specialty insurer and reinsurer, has developed a unique insurance service to protect companies operating critical infrastructure and industrial machinery from terrorist and other malicious attacks, such as sabotage, espionage and theft.

San Mateo, CA-based Norse, a provider of live attack intelligence, has announced that Brian Contos has joined the company as a senior vice president and chief security strategist. In this new position, Conto will help guide the company’s market strategy, technical solutions, and field engineering.

Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, and Belden, a provider of signal transmission solutions for mission-critical manufacturing applications, have announced a new marketing initiative designed to improve critical infrastructure cybersecurity in manufacturing organizations.

According to a Woburn, MA-based Kaspersky Lab and B2B International survey of worldwide IT professionals, 93% of financial services organizations experienced various cyberthreats in the past 12 months.

Commentary and Opinions

It’s hard to fathom that as late as 2012 the U.S. State Department estimated 27 million people around the world are trapped in a life of slavery.

Recent high-profile news stories have served as a painful reminder that even in the U.S. individuals are held against their will, subjected to forced labor, prostitution or other criminal activity. According to a 2013 Congressional Research Service report, as many as 100,000 children in the U.S. may be victims of domestic human trafficking.

A healthy dose of paranoia is a good thing when it comes to computer security. It sometimes seems that every person with a bad agenda is trying to attack your systems (and that just might be the case). 

In just six years, North Louisiana has created a fast-growing cyber cluster in a region historically dominated by manufacturing, oil and gas, and agricultural sectors. The catalyst for this rapid progress stems from the combined vision of local and state leaders to diversify the region’s economic base and develop a knowledge-based workforce for the expanding cyber sector.  

As the Edward Snowden soap opera continues to play out on the world stage, pundits can fill the airwaves with suppositions about personal and corporate privacy, spy tactics against presumed terrorists, and the fate of one government contractor, now encamped in Russia. In the hallways of government agencies, the conversations are more pragmatic. Security and IT professionals are asking each other how to best protect data when it is the necessary basis for employee collaboration and productivity.

In the rapidly changing mobile environment of government security, agency executives are challenged as never before by two stark realities. First, in an ecosystem increasingly shaped by the “bring your own device” (BYOD) trend, they need to be preparing their workforces to use mobile devices. Second, they must make sure that they are able to provide a level of security for mobile devices that matches the level found on their desktops.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...