Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2014-07-31 06:24 PM
The House has passed three bills that aim to protect critical infrastructure from cyber attack through the distribution of cyber threat information, the development and procurement of new...
Wed, 2014-07-30 05:25 PM
A new bill has been introduced by Rep. Bennie Thompson (D-MS) and Sen. Ron Wyden (D-OR) that aims to reduce U.S. government over-classification in order to improve information sharing, cut costs, and...
Mon, 2014-07-14 05:23 PM
http://www.nikeairmaxfreerun.com nike air max 2015 A law enforcement and industry partnership has taken measures against the Internet domains and servers that form an advanced cybercriminal...
Mon, 2014-07-07 03:38 PM
On Saturday, the U.S. Secret Service arrested Roman Valerevich Seleznev in France. Russian national Seleznev was indicted in the Western District of Washington in March 2011 for hacking into point of...
Sun, 2014-07-06 08:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Tue, 2014-07-01 07:30 PM
Live from PortSecurity2014 -- Washington, D.C.-based Captain Andrew Tucci, U.S. Coast Guard chief of Ports and Facilities, Information Issues and Supply Chain Security, delivered a chilling...
Fri, 2014-06-27 02:16 AM
The Supreme Court on Wednesday ruled unanimously that police officers must obtain a warrant to search data on someone’s cell phone. Cell phone data has become an integral part of many criminal...
Thu, 2014-06-26 03:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 02:59 PM
Since the beginning of fiscal year 2014, U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) has identified 585 victims of child sexual abuse and exploitation,...
Tue, 2014-06-24 08:04 AM

Michael Madsen

GSN parent company World Business Media has announced that Michael Madsen, the company’s first advertising director and longtime sales “MVP,” has been promoted from Associate Publisher to Publisher...
Mon, 2014-06-23 09:56 PM
More than 70 law enforcement officials from 21 countries gathered at Europol's headquarters in The Hague June 16 and 17 to coordinate investigations into the criminal exploitation of virtual...
Tue, 2014-06-17 01:33 AM
AT&T has confirmed that attackers have compromised the personal information of some mobile account holders. In a letter mailed to customers, AT&T revealed that three employees of one of its...

Company News

Tempe, AZ-based LifeLock, a provider of proactive identity theft protection, has introduced a new service for organizations to integrate identity theft protection into their data breach response plans. LifeLock Data Breach Service enables organizations to rapidly activate LifeLock if they are exposed by a data breach and to help protect their customers or employees from identity fraud.

Atlanta, GA-based LexisNexis Risk Solutions has announced the launch of the LexisNexis Fraud Defense Network, a first-of-its-kind alliance that seeks to link organizations across all industries with resources, information and actionable intelligence to predict, detect and mitigate the risks that fraud presents. The announcement kicks off the company’s participation in International Fraud Awareness Week, an awareness campaign spearheaded by the Association of Certified Fraud Examiners that estimates global fraud in the trillions.

CGI and Dell have announced a joint initiative to offer services and solutions specifically tailored to improve enterprise efficiency, security, and business processes. These offerings are the initial solutions of a planned multi-year relationship between the two companies that will focus on solving some of the most critical technology challenges that enterprise and public sector clients face today.

LexisNexis Risk Solutions has announced the results of a comprehensive study focused on the use of social media by law enforcement for crime investigation and prevention. The study, a follow-up to one conducted in 2012, revealed that social media use remains high -- eight out of 10 law enforcement professionals use it – with the most common use being for crime investigations (63 percent).

Amazon Web Services, Inc. (AWS), an Amazon.com company, has announced three new services to make it easier for enterprises to maintain security, governance, and compliance of their resources in the AWS Cloud. AWS Key Management Service is a fully managed service that makes it easy for customers to create and control the encryption keys used to encrypt their data on the AWS Cloud.

FRISCO, TX- July 1, 2014- Encryptics, a provider of patented data privacy and protection services for businesses and government entities, has named John D. Cohen as the company’s Chief Strategy Advisor. In this role, Cohen will be responsible for continuing to position its data encryption technology at the forefront of the cybersecurity landscape for private and public companies, governments, and public safety entities.

Robert Weaver is an award-winning and nationally recognized senior executive who over the course of a 40 year distinguished career served in a variety of leadership positions in the U.S. Secret Service (USSS), U.S. Supreme Court, Federal Bureau of Investigation, and in the Department of Homeland Security (DHS).

TrendLabs has released a report called, The Invisible Becomes Visible, in which it outlines its industry predictions on what the cyber threat landscape is expected to look like in 2015.

Commentary and Opinions

As the Edward Snowden soap opera continues to play out on the world stage, pundits can fill the airwaves with suppositions about personal and corporate privacy, spy tactics against presumed terrorists, and the fate of one government contractor, now encamped in Russia. In the hallways of government agencies, the conversations are more pragmatic. Security and IT professionals are asking each other how to best protect data when it is the necessary basis for employee collaboration and productivity.

In the rapidly changing mobile environment of government security, agency executives are challenged as never before by two stark realities. First, in an ecosystem increasingly shaped by the “bring your own device” (BYOD) trend, they need to be preparing their workforces to use mobile devices. Second, they must make sure that they are able to provide a level of security for mobile devices that matches the level found on their desktops.

Being a security practitioner today is a bit like playing Whack-A-Mole at the carnival. Every time you’ve nailed one problem down, a few other nasty critters pop up faster than you can deal with them. 

A new European Union regulation that requires mandatory data breach disclosures by telecoms operators and Internet service providers (ISPs) has recently become official.

Last June, the National Institute of Standards and Technology (NIST) issued an update to its advice on mobile device security. The recommendations in the updated NIST report are good, sound advice; but perhaps because of the report’s focus on device security, it tends to overlook the advantages of building in security to apps during development with an open enterprise mobile app platform. 

 

Technology Sectors

Market Sectors

Essential Guides

http://www.nikeairmaxfreedom.com nike air max

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...