Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2014-10-21 01:50 PM

Dr. Robert Griffin 

Dr. Reginald Brothers, Department of Homeland Security Under Secretary for Science and Technology, has announced the appointment of Dr. Robert Griffin as the Science and Technology Directorate’s (S...
Tue, 2014-10-21 12:43 PM
The U.S. Immigration and Customs Enforcement (ICE) has launched a redesigned official website, www.ICE.gov, that is optimized for desktop computers, as well as mobile and tablet devices. It features...
Mon, 2014-10-20 04:01 PM

Eric Birnbaum

Director James B. Comey has named Eric S. Birnbaum special agent in charge (SAC) of the San Diego division. Birnbaum most recently served as SAC of the Administrative Division in the Los Angeles...
Thu, 2014-10-16 02:58 PM
A federal grand jury in Seattle returned a second superseding indictment last week charging a Russian national with 11 additional counts and further detailing his alleged scheme to hack into...
Tue, 2014-10-14 05:49 PM
Cybersecurity professionals from across the globe came together to compete in the World Finals of the Global CyberLympics held on September 29 2014 at ISACA’s EuroCACS/Information Security and Risk...
Thu, 2014-10-09 05:07 PM
Director James B. Comey has named Clifford Holly assistant director in charge of the Security Division at FBI Headquarters. Holly most recently served as deputy assistant director for the Training...
Wed, 2014-10-08 05:42 PM
FBI Director James B. Comey has named Donald Alway special agent in charge of the agency's Jackson (MS) Division. Alway most recently served as section chief for the Investigations and Operations...
Wed, 2014-10-08 05:01 PM
The first U.S. federal law enforcement app designed to seek the public's help with fugitive and unknown suspected child predators is now available for Android smartphones, and in Spanish for both...
Wed, 2014-10-08 01:19 PM
Cybersecurity breaches affect businesses large and small, and the annual cost of computer- and network-based crimes worldwide is estimated to be more than $400 billion, according to a report from...
Sun, 2014-10-05 05:11 PM
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) special agents from the HSI Colombia Attaché Office recently hosted a one-week law enforcement training on...
Thu, 2014-10-02 07:45 PM

Carol Johnson

Conshohocken, PA-based AlliedBarton Security Services, www.AlliedBarton.com, a provider of highly trained security personnel, has announced that Carol Johnson, president and chief operating officer,...
Sun, 2014-09-28 07:16 PM

Eric Holder

United States Attorney General Eric Holder announced his resignation on Thursday, Sept. 25, but stated he will remain in the position until a successor is announced and confirmed by the Senate. Upon...

Company News

Technical communicators, tools vendors, consultants, and even client organizations and end users all feel the rapid changes coming to content preparation, delivery and consumption. To better understand these changes over time Data Conversion Laboratory (DCL) and The Center for Information-Development Management (CIDM) are now conducting their third annual survey of practitioners, Following the Trends -- Is Your Content Ready?, which is open now until March 16, 2015.
Phoenix, AZ-based BeyondTrust, the global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced that the newest versions of PowerBroker for Windows and PowerBroker Password Safe have the ability to integrate to create an enhanced least privilege experience for IT staff and end users.
Belcamp, MD-based SafeNet Assured Technologies, a U.S. based provider of government high assurance data security solutions, has announced its formal company launch. SafeNet Assured Technologies’ mission is to provide high assurance data security products and technologies to defense, intelligence, and civilian agencies across the Federal Government.
In the wake of the latest data breach news and the fact that the personal records of more than 85 million people were exposed in 2014 alone, LifeLock has released a new identity theft risk calculator to help consumers assess their risk and adjust their behavior accordingly. The calculator asks consumers questions ranging from their habits related to changing their online passwords to whether they take steps to safeguard their postal mail.
On the globally recognized Safer Internet Day, the National Center for Missing & Exploited Children (NCMEC) and CA Technologies are joining forces to host a free webinar on Tuesday, February 10 at 4 p.m. EST, focused on new strategies in teaching online safety.
Secure cloud provider FireHost has announced it will be teaming with Dell Services to deliver secure, fully managed private cloud services to meet customers’ needs for secure, compliant private cloud environments.
Austin, TX-based HID Global, a worldwide provider of secure identity solutions, has announced it has completed the consolidation of its world headquarters and North American Operations Center. The company has also achieved recognition by three organizations for successfully implementing some of the industry’s most stringent sustainability guidelines in the design, construction and operation of its 250,000 square feet of manufacturing, office and warehouse space.
Virtustream, the enterprise-class cloud software and services provider, has announced that the H.J. Heinz Company, one of the world’s leading marketers and producers of healthy, convenient and affordable foods, has implemented Virtustream’s xStream platform to deploy a platform-as-a-service (PaaS) infrastructure and run production SAP HANA in the cloud.

Commentary and Opinions

It’s hard to fathom that as late as 2012 the U.S. State Department estimated 27 million people around the world are trapped in a life of slavery. Recent high-profile news stories have served as a painful reminder that even in the U.S. individuals are held against their will, subjected to forced labor, prostitution or other criminal activity. According to a 2013 Congressional Research Service report, as many as 100,000 children in the U.S. may be victims of domestic human trafficking.
A healthy dose of paranoia is a good thing when it comes to computer security. It sometimes seems that every person with a bad agenda is trying to attack your systems (and that just might be the case). 
In just six years, North Louisiana has created a fast-growing cyber cluster in a region historically dominated by manufacturing, oil and gas, and agricultural sectors. The catalyst for this rapid progress stems from the combined vision of local and state leaders to diversify the region’s economic base and develop a knowledge-based workforce for the expanding cyber sector.  
As the Edward Snowden soap opera continues to play out on the world stage, pundits can fill the airwaves with suppositions about personal and corporate privacy, spy tactics against presumed terrorists, and the fate of one government contractor, now encamped in Russia. In the hallways of government agencies, the conversations are more pragmatic. Security and IT professionals are asking each other how to best protect data when it is the necessary basis for employee collaboration and productivity.
In the rapidly changing mobile environment of government security, agency executives are challenged as never before by two stark realities. First, in an ecosystem increasingly shaped by the “bring your own device” (BYOD) trend, they need to be preparing their workforces to use mobile devices. Second, they must make sure that they are able to provide a level of security for mobile devices that matches the level found on their desktops.
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...