Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Wed, 2014-01-29 12:18 AM

Dr. Gordon Woo

“The threat level is higher than it has ever been for any other sporting event since 9/11,” explains Dr. Gordon Woo, a catastrophist at RMS. RMS is a company based in Newark, CA that provides...
Tue, 2014-01-28 09:17 PM
When it comes to digital privacy, U.S. consumers are more concerned with how businesses collect and use their data than they are with government surveillance, according to a study from the data...
Mon, 2014-01-27 11:33 PM

T.K. Keanini

Back when the Internet was young, a type of hacker called script kiddies emerged. These were people who were passionate about hacking but lacked the expertise, so most of their successes came from...
Sun, 2014-01-26 10:59 PM

Andrew Ginter

“It has been proven routinely in one security test after another that any hacker with a bit of skill and time can take control of equipment on safety-critical networks,” said Andrew Ginter, vice...
Sun, 2014-01-26 10:23 PM
People interested in attending the 2014 Winter Olympic Games in Sochi are advised to take extra precautions to protect themselves from cyber attacks during the events, according to Lysa Myers, a...
Mon, 2014-01-20 09:46 PM
Senators Tom Carper (D-DE) and Roy Blunt (R-MO) reintroduced legislation last week aimed to protect consumers from identity theft and account fraud and to establish a common set of data breach laws...
Tue, 2014-01-07 03:58 PM
The Cybersecurity Center of Excellence (NCCoE) is inviting comments on a Partial Draft Request for Proposals (RFP) for a contractor to operate a Federally Funded Research and Development Center (...
Wed, 2013-12-18 06:00 PM

Luke McCormack,
new CIO at DHS

DHS has named a new chief information officer, Luke McCormack, who will oversee the department’s continuing efforts to implement information technology enhancements and security.  Coming from...
Wed, 2013-12-11 07:15 PM

Rep. Bennie Thompson
(D-MS)

Members of both political parties introduced on December 11 a bipartisan piece of legislation, H.R. 3696, the “National Cybersecurity and Critical Infrastructure Protection Act of 2013” (NCCIP Act)....
Wed, 2013-12-11 06:44 PM

National Archives
building in DC

The National Archives and Records Administration (NARA) has announced that its State, Local, Tribal, and Private Sector Policy Advisory Committee will hold a public meeting in Washington, DC, on...
Sun, 2013-12-08 05:11 PM
The SANS Technology Institute announced on December 3 that it is now accredited by The Middle States Commission of Higher Education, an institutional accrediting agency recognized by the U.S....
Fri, 2013-12-06 05:25 PM
The U.S. Secret Service intends to procure between 1,000 and 2,000 mobile operating system (OS) licenses to use the Samsung KNOX Enterprise Edition on some of its smart phones. The Secret Service...

Company News

Austin, TX-based Motion Computing has announced that The City of Brenham has achieved a 30% cost savings by replacing its old mobile communications and data technology throughout its police and fire vehicles with Motion’s Windows-based rugged tablets and RAM mounts.

With FICAM’s decision to approve McLean, VA-based ID.me as an accredited Credential Service Provider last Thursday, the company joins the likes of Symantec and Verizon by enabling American citizens to easily and securely access government services online through a trusted Single Sign On, ID.me says. The Federal Identity Credential Access Management (FICAM) Trust Framework Solutions program approved ID.me as a non-PKI Credential Service Provider (CSP) and Token Manager service operating at Assurance Levels 1, 2, and 3.

Ashburn, VA-based Telos Corporation, an information technology provider that delivers solutions that empower and protect the world’s most security-conscious enterprises, has announced the general availability of SE7EN: NetAlert, an interactive, Web-based network infrastructure monitoring tool to protect the physical security of fiber optic and copper cable networks.

San Mateo, CA-based Norse Corp., a provider of live attack intelligence, has announced the appointment of Jacinta Tobin to serve as the company’s first senior vice president of global sales.

Named in May 2013 as one of the top 50 most influential women in technology by Silicon Valley Global magazine, Tobin will spearhead all of Norse’s global growth initiatives.

The GSMA has announced its collaboration with the United Nations Children’s Fund (UNICEF) to promote industry guidelines to safeguard children online in Latin America and the Caribbean. The GSMA will promote the Guidelines for Industry on Child Online Protection within the Latin American mobile industry and will work closely with UNICEF to identify ways in which mobile operators can promote children’s rights and responsible digital citizenship.

Gallagher, an international provider of integrated access control, intruder alarm, and perimeter protection continues to grow operations with the appointment of Jim Saletta, new Business Development Manager for the western region of the U.S.

Working alongside Eddie Salinas, technical account manager, Jim will manage multiple relationships from distributors, business partners, and customers to drive Gallagher's end-to-end security solution.

Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, has announced the results of a survey of 215 attendees at the Black Hat USA 2014 security conference in Las Vegas, NV.

Survey respondents were asked which security event had a greater impact on their budget and executive security awareness of cybersecurity: Target's data breach, the Snowden leaks, or the increase in targeted threats.

A-T Solutions, a provider of counterterrorism based in Vienna, VA, has announced the launch of its new Data Collection Toolkit (DCT) and release of a white paper titled “Top Three Ways In-Field Data Collection Helps Achieve Urgent Objectives,” which details the benefits and value of mobile-capable data collection tools for federal agencies whose missions involve public safety, national defense, counterterrorism, homeland security, criminal investigations, and disaster and emergency management.

Commentary and Opinions

Last June, the National Institute of Standards and Technology (NIST) issued an update to its advice on mobile device security. The recommendations in the updated NIST report are good, sound advice; but perhaps because of the report’s focus on device security, it tends to overlook the advantages of building in security to apps during development with an open enterprise mobile app platform. 

There are many ways for enterprise owners to discover their networks have been breached. Each “breach indicator” has its own level of certainty attached to it.

However, when an FBI agent from its cyber division visits your organization and informs you that “you’ve got a problem,”  you can be nearly 100 percent certain that you’ve been breached.

Federal chief information security officers (CISOs) know that it isn’t a matter of whether their agency will be subject to a cyber-attack; it is a question of how frequently the attacks will occur. 

A storm is gathering in cyberspace and government agencies need to do more than just close the windows. We are past the days where hacker’s just try to prove they can deface a Web site or interrupt service. Now, destructive malware, theft of intellectual property, access to critical infrastructure and connectivity to industry creates an appealing target for criminals worldwide.

The need for cybersecurity experts spans across all industries, and cyber jobs within the U.S. Government are plentiful. Recruiting top technical talent on the agency side and on the contractor side is an essential component to building a fully-functional and competent cyber network defense and cyber offensive team.  

 

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...