Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Wed, 2014-01-29 10:15 PM
Data Privacy Day was held on January 28 and was part of the National Cyber Security Alliance’s (NCSA) efforts to increase the general public’s awareness of privacy and cyber security issues. The NCSA...
Wed, 2014-01-29 09:56 PM
U.S. General Services Administration (GSA) Administrator Dan Tangherlini and the Secretary of Defense, Chuck Hagel, have announced six reforms to improve cybersecurity and resilience in the federal...
Wed, 2014-01-29 12:38 PM

Scott Greiper

As reported Monday by the Times of Israel, Prime Minister Benjamin Netanyahu of Israel opened up his country’s first cybersecurity conference, Israel CyberTech 2014, on January 27th, saying “I think...
Wed, 2014-01-29 12:18 AM

Dr. Gordon Woo

“The threat level is higher than it has ever been for any other sporting event since 9/11,” explains Dr. Gordon Woo, a catastrophist at RMS. RMS is a company based in Newark, CA that provides...
Tue, 2014-01-28 09:17 PM
When it comes to digital privacy, U.S. consumers are more concerned with how businesses collect and use their data than they are with government surveillance, according to a study from the data...
Mon, 2014-01-27 11:33 PM

T.K. Keanini

Back when the Internet was young, a type of hacker called script kiddies emerged. These were people who were passionate about hacking but lacked the expertise, so most of their successes came from...
Sun, 2014-01-26 10:59 PM

Andrew Ginter

“It has been proven routinely in one security test after another that any hacker with a bit of skill and time can take control of equipment on safety-critical networks,” said Andrew Ginter, vice...
Sun, 2014-01-26 10:23 PM
People interested in attending the 2014 Winter Olympic Games in Sochi are advised to take extra precautions to protect themselves from cyber attacks during the events, according to Lysa Myers, a...
Mon, 2014-01-20 09:46 PM
Senators Tom Carper (D-DE) and Roy Blunt (R-MO) reintroduced legislation last week aimed to protect consumers from identity theft and account fraud and to establish a common set of data breach laws...
Tue, 2014-01-07 03:58 PM
The Cybersecurity Center of Excellence (NCCoE) is inviting comments on a Partial Draft Request for Proposals (RFP) for a contractor to operate a Federally Funded Research and Development Center (...
Wed, 2013-12-18 06:00 PM

Luke McCormack,
new CIO at DHS

DHS has named a new chief information officer, Luke McCormack, who will oversee the department’s continuing efforts to implement information technology enhancements and security.  Coming from...
Wed, 2013-12-11 07:15 PM

Rep. Bennie Thompson
(D-MS)

Members of both political parties introduced on December 11 a bipartisan piece of legislation, H.R. 3696, the “National Cybersecurity and Critical Infrastructure Protection Act of 2013” (NCCIP Act)....

Company News

Frisco, TX-based Sheplers, a multi-channel western-wear retailer, has determined that their payment systems suffered a security breach in which hackers gained access to their systems and some of their customers’ payment card information was exposed. With the assistance of a leading computer security firm, Sheplers is continuing the investigation into the incident, and are cooperating with law enforcement in their efforts to find the criminals responsible.

Boston, MA-based Wealth Management Systems (WMSI) has announced that Doug Perkins has joined the firm as information security officer. An industry veteran with extensive experience in software development, project management, quality assurance, and operations and information security, Perkins is assuming responsibility for the design and future development of WMSI’s enterprise-wide information security strategies and policies. Mr. Perkins reports to BJ Ralston, WMSI’s chief compliance officer, and is based in WMSI’s Boston Office.

Princeton, NJ-based IXP Corporation, a public safety and emergency response provider that has partnered with Johns Hopkins University (JHU) for the past 10 years, has announced an innovation that raises campus security to the next level.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $220K contract to provide its IM2610 TWIC Plus readers to the Port of New Orleans in Louisiana. The new contract is for a web-hosted TWIC card reading system. The readers will provide TWIC card authentication and Be On the Lookout (BOLO) checks.

London, England-based Brit PLC, a global specialty insurer and reinsurer, has developed a unique insurance service to protect companies operating critical infrastructure and industrial machinery from terrorist and other malicious attacks, such as sabotage, espionage and theft.

San Mateo, CA-based Norse, a provider of live attack intelligence, has announced that Brian Contos has joined the company as a senior vice president and chief security strategist. In this new position, Conto will help guide the company’s market strategy, technical solutions, and field engineering.

Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, and Belden, a provider of signal transmission solutions for mission-critical manufacturing applications, have announced a new marketing initiative designed to improve critical infrastructure cybersecurity in manufacturing organizations.

According to a Woburn, MA-based Kaspersky Lab and B2B International survey of worldwide IT professionals, 93% of financial services organizations experienced various cyberthreats in the past 12 months.

Commentary and Opinions

In the rapidly changing mobile environment of government security, agency executives are challenged as never before by two stark realities. First, in an ecosystem increasingly shaped by the “bring your own device” (BYOD) trend, they need to be preparing their workforces to use mobile devices. Second, they must make sure that they are able to provide a level of security for mobile devices that matches the level found on their desktops.

Being a security practitioner today is a bit like playing Whack-A-Mole at the carnival. Every time you’ve nailed one problem down, a few other nasty critters pop up faster than you can deal with them. 

A new European Union regulation that requires mandatory data breach disclosures by telecoms operators and Internet service providers (ISPs) has recently become official.

Last June, the National Institute of Standards and Technology (NIST) issued an update to its advice on mobile device security. The recommendations in the updated NIST report are good, sound advice; but perhaps because of the report’s focus on device security, it tends to overlook the advantages of building in security to apps during development with an open enterprise mobile app platform. 

There are many ways for enterprise owners to discover their networks have been breached. Each “breach indicator” has its own level of certainty attached to it.

However, when an FBI agent from its cyber division visits your organization and informs you that “you’ve got a problem,”  you can be nearly 100 percent certain that you’ve been breached.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...