Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2014-09-02 09:51 PM
Eagle Eye Expositions of Norwalk, CT has announced the full roster of speakers, topics, panelists and sponsors for its “Beyond the Border 2.0” U.S./Canada Border Conference, which will take place at...
Mon, 2014-09-01 01:26 PM
As the primary research and development arm of the Department of Homeland Security, the Science and Technology Directorate (S&T) is looking twenty to thirty years out, or even further, to define...
Thu, 2014-08-28 06:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Tue, 2014-08-26 06:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Thu, 2014-07-31 06:24 PM
The House has passed three bills that aim to protect critical infrastructure from cyber attack through the distribution of cyber threat information, the development and procurement of new...
Wed, 2014-07-30 05:25 PM
A new bill has been introduced by Rep. Bennie Thompson (D-MS) and Sen. Ron Wyden (D-OR) that aims to reduce U.S. government over-classification in order to improve information sharing, cut costs, and...
Mon, 2014-07-14 05:23 PM
http://www.nikeairmaxfreerun.com nike air max 2015 A law enforcement and industry partnership has taken measures against the Internet domains and servers that form an advanced cybercriminal...
Mon, 2014-07-07 03:38 PM
On Saturday, the U.S. Secret Service arrested Roman Valerevich Seleznev in France. Russian national Seleznev was indicted in the Western District of Washington in March 2011 for hacking into point of...
Sun, 2014-07-06 08:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Tue, 2014-07-01 07:30 PM
Live from PortSecurity2014 -- Washington, D.C.-based Captain Andrew Tucci, U.S. Coast Guard chief of Ports and Facilities, Information Issues and Supply Chain Security, delivered a chilling...
Fri, 2014-06-27 02:16 AM
The Supreme Court on Wednesday ruled unanimously that police officers must obtain a warrant to search data on someone’s cell phone. Cell phone data has become an integral part of many criminal...
Thu, 2014-06-26 03:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...

Company News

Pasadena, CA-based Guidance Software, a provider of digital investigations, has announced the appointment of Jay Ackerman as its first chief revenue officer. Ackerman will provide leadership across all customer-facing organizations to deliver the highest-quality customer experience, from initial contact through the sales process, implementation, and ongoing management. Those teams include sales, professional services, and technical support.
Portland, OR-based Tripwire, Inc., a provider of advanced threat, security and compliance management solutions, and Check Point Software Technologies Ltd., an Internet security firm, have announced a technology partnership and integration. The collaboration is part of Tripwire’s Technology Alliance Program, designed to allow a wide variety of vendors team with Tripwire to deliver innovative security solutions.
Minneapolis, MN-based Kroll Ontrack has released a year-end review discussing data security, business continuity, and mobile devices being among the biggest trends impacting the data recovery industry in 2014. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.
The San Diego, CA-based Identity Theft Resource Center (ITRC), a nonprofit organization dedicated to the understanding of identity theft and related issues since 1999, has announced that its call center will now be available to help victims toll-free, 24 hours a day, seven days a week. The round-the-clock assistance is supported by IDT911 (IDentity Theft 911), a provider of data risk management, breach response, resolution and education services.
Waltham, MA-based CounterTack, a pioneer in delivering real-time endpoint threat detection, context and visibility around targeted attacks, has announced its partnership with SAVANTURE, a security services (SaaS) and managed security service provider (MSSP). SAVANTURE will be joining the CounterTack CyberPath Partner Program.
St. Louis, MO-based Belden Inc., a provider of signal transmission solutions for mission-critical applications, has announced it has signed a definitive agreement to acquire Tripwire for $710 million in cash. Tripwire, a provider of advanced threat, security and compliance solutions, will bring an important element to Belden’s portfolio. Together, the companies will work to deliver the next generation of cybersecurity solutions that can be deployed across enterprise, industrial, and broadcast markets.
Vancouver, British Columbia-based Viscount Systems, a provider of IT-based security access control software and services, has announced that it has appointed Scott Sieracki as its new vice president of Sales effective immediately. Sieracki, who reports directly to Viscount President and CEO Dennis Raefield, will drive new opportunities for growth and development for the company specifically in the commercial marketplace.
The final results of the Global Cybersecurity Index (GCI) have been officially announced at ITU Telecom World 2014 taking place in Doha, Qatar. The GCI ranked the U.S. as the country with the highest national cybersecurity commitment, followed by Canada in second place. Jointly in third position are Australia, Malaysia, and Oman.

Commentary and Opinions

Last June, the National Institute of Standards and Technology (NIST) issued an update to its advice on mobile device security. The recommendations in the updated NIST report are good, sound advice; but perhaps because of the report’s focus on device security, it tends to overlook the advantages of building in security to apps during development with an open enterprise mobile app platform. 
There are many ways for enterprise owners to discover their networks have been breached. Each “breach indicator” has its own level of certainty attached to it. However, when an FBI agent from its cyber division visits your organization and informs you that “you’ve got a problem,”  you can be nearly 100 percent certain that you’ve been breached.
Federal chief information security officers (CISOs) know that it isn’t a matter of whether their agency will be subject to a cyber-attack; it is a question of how frequently the attacks will occur. 
A storm is gathering in cyberspace and government agencies need to do more than just close the windows. We are past the days where hacker’s just try to prove they can deface a Web site or interrupt service. Now, destructive malware, theft of intellectual property, access to critical infrastructure and connectivity to industry creates an appealing target for criminals worldwide.
The need for cybersecurity experts spans across all industries, and cyber jobs within the U.S. Government are plentiful. Recruiting top technical talent on the agency side and on the contractor side is an essential component to building a fully-functional and competent cyber network defense and cyber offensive team.  
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...