Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2014-06-24 08:04 AM

Michael Madsen

GSN parent company World Business Media has announced that Michael Madsen, the company’s first advertising director and longtime sales “MVP,” has been promoted from Associate Publisher to Publisher...
Mon, 2014-06-23 09:56 PM
More than 70 law enforcement officials from 21 countries gathered at Europol's headquarters in The Hague June 16 and 17 to coordinate investigations into the criminal exploitation of virtual...
Tue, 2014-06-17 01:33 AM
AT&T has confirmed that attackers have compromised the personal information of some mobile account holders. In a letter mailed to customers, AT&T revealed that three employees of one of its...
Mon, 2014-06-16 02:05 AM
The Federal Aviation Administration (FAA) has ordered Boeing to modify technology found aboard 737 aircrafts that could be vulnerable to computer hackers. The FAA’s order, which was released in the...
Wed, 2014-06-11 09:20 AM

Charles Brooks

Former judge of GSN Awards program and well-known leader of Linkedin discussion groups Charles Brooks has announced that he will present a webinar on the evolving role of Strategic Cyber Operations...
Wed, 2014-06-11 04:01 AM
In a new report released earlier this week from Crowdstrike, security researchers have linked a Chinese military unit to cyber attacks against U.S. companies and government agencies. Just last month...
Wed, 2014-06-04 12:34 AM
Computer security experts from academia, industry, and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand Challenge (CGC) -- a first-of-...
Tue, 2014-06-03 09:17 PM
The Justice Department has announced a multi-national effort to disrupt the Gameover Zeus Botnet, a global network of infected victim computers used by cyber criminals to steal millions of dollars...
Wed, 2014-05-28 01:07 AM
The FBI New York Field Office and the U.S. Attorney’s Office for the Southern District of New York have announced the results of a cyber takedown, which included the unsealing of an indictment...
Mon, 2014-05-12 03:25 AM

Kevin Kern 

U.S. Immigration and Customs Enforcement (ICE), part of the DHS, has named Kevin M. Kern as its new chief information officer.Kern has over 30 years of experience in global operations and technology...
Tue, 2014-04-29 08:35 PM
A recent report from George Mason University’s Mercatus Center, a non-profit think tank, has criticized the Commerce’ Department’s voluntary Cybersecurity Framework, introduced in February, as too “...
Mon, 2014-04-28 11:34 PM
On the heels of the Heartbleed security bug, Microsoft Corp. is scrambling to fix a bug affecting the widely used Internet Explorer (IE) Web browser. The U.S. DHS is advising computer users to...

Company News

Atlanta, GA-based LexisNexis Risk Solutions has announced the launch of the LexisNexis Fraud Defense Network, a first-of-its-kind alliance that seeks to link organizations across all industries with resources, information and actionable intelligence to predict, detect and mitigate the risks that fraud presents. The announcement kicks off the company’s participation in International Fraud Awareness Week, an awareness campaign spearheaded by the Association of Certified Fraud Examiners that estimates global fraud in the trillions.

CGI and Dell have announced a joint initiative to offer services and solutions specifically tailored to improve enterprise efficiency, security, and business processes. These offerings are the initial solutions of a planned multi-year relationship between the two companies that will focus on solving some of the most critical technology challenges that enterprise and public sector clients face today.

LexisNexis Risk Solutions has announced the results of a comprehensive study focused on the use of social media by law enforcement for crime investigation and prevention. The study, a follow-up to one conducted in 2012, revealed that social media use remains high -- eight out of 10 law enforcement professionals use it – with the most common use being for crime investigations (63 percent).

Amazon Web Services, Inc. (AWS), an Amazon.com company, has announced three new services to make it easier for enterprises to maintain security, governance, and compliance of their resources in the AWS Cloud. AWS Key Management Service is a fully managed service that makes it easy for customers to create and control the encryption keys used to encrypt their data on the AWS Cloud.

FRISCO, TX- July 1, 2014- Encryptics, a provider of patented data privacy and protection services for businesses and government entities, has named John D. Cohen as the company’s Chief Strategy Advisor. In this role, Cohen will be responsible for continuing to position its data encryption technology at the forefront of the cybersecurity landscape for private and public companies, governments, and public safety entities.

Robert Weaver is an award-winning and nationally recognized senior executive who over the course of a 40 year distinguished career served in a variety of leadership positions in the U.S. Secret Service (USSS), U.S. Supreme Court, Federal Bureau of Investigation, and in the Department of Homeland Security (DHS).

TrendLabs has released a report called, The Invisible Becomes Visible, in which it outlines its industry predictions on what the cyber threat landscape is expected to look like in 2015.

Alexandria, VA-based ASIS International (ASIS) and The National Center for Missing & Exploited Children (NCMEC) are collaborating on the development of an online training module focusing on what private security professionals need to know about child victimization.

Commentary and Opinions

There are many ways for enterprise owners to discover their networks have been breached. Each “breach indicator” has its own level of certainty attached to it.

However, when an FBI agent from its cyber division visits your organization and informs you that “you’ve got a problem,”  you can be nearly 100 percent certain that you’ve been breached.

Federal chief information security officers (CISOs) know that it isn’t a matter of whether their agency will be subject to a cyber-attack; it is a question of how frequently the attacks will occur. 

A storm is gathering in cyberspace and government agencies need to do more than just close the windows. We are past the days where hacker’s just try to prove they can deface a Web site or interrupt service. Now, destructive malware, theft of intellectual property, access to critical infrastructure and connectivity to industry creates an appealing target for criminals worldwide.

The need for cybersecurity experts spans across all industries, and cyber jobs within the U.S. Government are plentiful. Recruiting top technical talent on the agency side and on the contractor side is an essential component to building a fully-functional and competent cyber network defense and cyber offensive team.  

Wireless security on the border 

By Vlad Robu 

Now, with the new immigration reform all over the news, border security is also back on the government’s "To Do" list. In past years, the government has dedicated significantly more money and resources than ever before to secure the border. Is it perfect? Far from it, but better for sure. 

 

Technology Sectors

Market Sectors

Essential Guides

http://www.nikeairmaxfreedom.com nike air max

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...