Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2013-10-29 07:01 PM

Leeds City College

Leeds City College, the UK's third-largest further educational establishment with more than 40,000 students and more than 1,500 staff, has deployed WatchGuard Technologies Unified Threat Management (...
Tue, 2013-10-29 04:21 PM
The National Institute of Standards and Technology (NIST) has announced the opening of a 45-day comment period during which members of the public can offer their insights and opinions about NIST’s...
Mon, 2013-10-28 12:09 PM
DHS has decided to award a sole source task order to the Rand Corp., of Arlington, VA, to continue providing the analytic support that the department has required in past years to develop a resource...
Thu, 2013-10-24 04:36 PM
Lockheed Martin is inviting government organizations interested in learning how to strengthen their network security to its new continuous diagnostics and mitigation (CDM) lab and associated...
Thu, 2013-10-24 03:55 PM
CBP has decided to extend by 12 months a support contract held by InfoPro Incorporated, of McLean, VA, to allow the agency’s Border Enforcement Management Systems (BEMS) to continue running while CBP...
Tue, 2013-10-22 02:37 PM
Acting Secretary of Homeland Security Rand Beers traveled on October 21 to New York City to discuss DHS’s work with private sector partners to increase cyber-security, protect critical infrastructure...
Tue, 2013-10-22 07:15 AM
On a list of risk factors that contemporary businesses have to face, cybersecurity vulnerabilities have moved up, from number 12 to number 3, according to Robert Rodriguez, the chairman and founder...
Tue, 2013-10-15 02:47 PM

Eighty-two percent of
millenials protect their
laptops with passwords

While U.S. Government officials find the current pipeline for cyber-security talent to be lacking, 82 percent of U.S. “millennials” say no high school teacher or guidance counselor ever mentioned to...
Fri, 2013-10-11 05:38 PM
TSA has announced it plans to award a “bridge” contract to IBM Corp. to continue supporting the agency’s Secure Flight program for at least another four months and perhaps an additional six months...
Wed, 2013-10-09 04:48 PM
SANS Institute announced on October 9 a DHS Continuous Diagnostics & Mitigation (CDM) Workshop taking place in Washington, DC, on November 6. The event, which is free to all federal, state...
Tue, 2013-10-08 05:38 PM
The Air Force Association's CyberPatriot program announced on October 8 a new sponsorship from DHS at the Cyber Diamond level. With the support of DHS, CyberPatriot will continue its growth as the...
Fri, 2013-10-04 05:23 PM

DHS data center

The DHS chief procurement officer issued a request for information (RFI) on September 30 that solicited ideas from industry on how the Department can most effectively acquire the enterprise IT...

Company News

Portland, OR-based Tripwire, a provider of risk-based security and compliance management solutions, has announced a new webcast titled “Hacking Point of Sale: Anatomy of a Mega Retail Breach.”

Atlanta, GA-based AirWatch, a provider of enterprise mobility management (EMM), has announced that the Florida Department of Law Enforcement (FDLE) has selected AirWatch to manage its agency wide deployment of government-owned mobile devices.

The Cambridge, MA-based Anti-Phishing Working Group (APWG) reports in its new Phishing Activity Trends Report that the number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter. The APWG previously reported that 2013 was one of the heaviest years for phishing on record, and Q1 2014 perpetuated that trend, posting the second-highest number of phishing attacks ever recorded in a first quarter.

As enterprises continue to move towards cloud deployments to save time, costs, and resources, they need assurance from cloud providers that their critical business data is secure.

Demonstrating its commitment to delivering secure cloud solutions, Axway, of Phoenix, has announced that it has completed an independent review of security controls for its Cloud Services organization and completion of Service Organizations Control 1 (SOC 1) report.

Dell has announced new proactive security solutions designed to provide organizations of all sizes with protection for their valuable data in the face of new and increasingly sophisticated end user security threats, while continuing to meet employees’ expectations for productivity and data access.

Mountain View, CA-based Symantec has announced the launch of a first-of-its-kind programthe Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career opportunities for young adults who may not be college-bound.

White Plains, NY-based Assured SKCG, the risk management and insurance advisor to alternative investment firms, has seen an increased interest in cyber liability insurance by hedge funds. These firms are responding to investor concerns, a recent SEC Risk Alert on cybersecurity preparedness, and an escalation in cyber-attacks aimed at hedge funds and financial firms.

Within the past 12 months, 4 of the top 10 largest breaches took place and 66% of the breaches took months or more to discover.

Dallas, TX-based Zix Corporation, a provider of email data protection, has announced the unveiling of Zix Encryption Network, a growing community of nearly 10,000 businesses that enables the automatic exchange of encrypted email for all messages between members. All messages, regardless of content, are automatically encrypted and decrypted between members. Within Zix Encryption Network, businesses receive unparalleled confidence that outbound email is protected against interception.

Commentary and Opinions

Today, in the era of the Internet of Things (IoT), devices that once served simple, one-way processes are now “smart” and connected to networks that help organizations maximize their technology investment and improve efficiencies.

Card printers that produce secure identification for government entities are a great example of a once fairly static technology that has evolved into a network-connected device that not only produces a necessary security tool, but also collects and provides valuable insights into data that helps support more efficient operations.

While meeting with a couple of my regular contacts at a recent AFCEA event, their conversation veered sharply from their normal assessments of recent cyber attacks into today’s prevalent motif of Beltway pundits -- the sequester.

Normally, I wouldn’t heed current events banter between colleagues taking a break at a trade show, but these guys aren’t blusterers. They’re top information security insiders at some of our nation’s most well-known federal agencies.

Nobody can argue that cyber security and data privacy have become hot topics this year. The buzz has been felt world-wide, as people strategize on both offensive and defensive aspects. When cyber security is mentioned, many reflexively jump to thoughts of firewalls, complex passwords and malware protection.

Many industry experts believe that the Advanced Persistent Threat (APT), any group or foreign government that persistently and effectively targets a specific victim, is the primary enemy of the U.S. Government when it comes to cyber attacks. 

Over the past few years, the president of the United States has worked to remediate issues within the cyber infrastructure. The most recent executive order is yet another attempt to preempt potential disaster by mitigating underlying critical infrastructure issues.

 

2013 Awards Yearbook

Celebrate the Great
Achievements of 2013


Click on Cover
Page to access

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...