Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2014-02-13 06:40 PM
The Obama Administration has announced the release of the Cybersecurity Framework, the result of a year-long effort to develop a voluntary guide for critical infrastructure organizations to...
Tue, 2014-02-11 10:24 PM

Tom Kellermann

“This is a Cybersecurity 911 system for our critical infrastructure,” said Tom Kellermann regarding the National Cybersecurity and Critical Infrastructure Protection Act of 2013 (NCCIP).
Thu, 2014-02-06 10:41 PM

Dr. Oliver McGee

“Cyber-assaults on the nation's critical infrastructure are on the rise at alarming rates,” says Dr. Oliver McGee.McGee is the former United States deputy assistant secretary of transportation for...
Wed, 2014-02-05 07:35 PM
Several major Internet companies, for the first time, have revealed in broad terms the number of data requests they receive that have been approved by judges under the Foreign Intelligence...
Tue, 2014-02-04 05:36 PM

Michael Rogers 

Secretary of Defense Chuck Hagel has nominated Navy Vice Admiral Michael Rogers as President Obama’s nominee to become director of the National Security Agency (NSA) and commander of U.S. Cyber...
Fri, 2014-01-31 04:28 PM

Rebecca Richards

The National Security Agency (NSA) has appointed Rebecca Richards as its first-ever civil liberties and privacy officer. Ms. Richards most recently worked as the senior director for privacy...
Wed, 2014-01-29 09:15 PM
Data Privacy Day was held on January 28 and was part of the National Cyber Security Alliance’s (NCSA) efforts to increase the general public’s awareness of privacy and cyber security issues. The NCSA...
Wed, 2014-01-29 08:56 PM
U.S. General Services Administration (GSA) Administrator Dan Tangherlini and the Secretary of Defense, Chuck Hagel, have announced six reforms to improve cybersecurity and resilience in the federal...
Wed, 2014-01-29 11:38 AM

Scott Greiper

As reported Monday by the Times of Israel, Prime Minister Benjamin Netanyahu of Israel opened up his country’s first cybersecurity conference, Israel CyberTech 2014, on January 27th, saying “I think...
Tue, 2014-01-28 11:18 PM

Dr. Gordon Woo

“The threat level is higher than it has ever been for any other sporting event since 9/11,” explains Dr. Gordon Woo, a catastrophist at RMS. RMS is a company based in Newark, CA that provides...
Tue, 2014-01-28 08:17 PM
When it comes to digital privacy, U.S. consumers are more concerned with how businesses collect and use their data than they are with government surveillance, according to a study from the data...
Mon, 2014-01-27 10:33 PM

T.K. Keanini

Back when the Internet was young, a type of hacker called script kiddies emerged. These were people who were passionate about hacking but lacked the expertise, so most of their successes came from...

Company News

Rockville, MD-based Ultra Electronics, 3eTI, a cyber-technology company with products and systems that secure critical infrastructure and improve operational efficiency, has announced its newly enhanced CyberFence product suite that secures endpoints both within a local area network and those remotely connected via a wide area network.

Herndon, VA-based ViON Corporation, a provider of the design, delivery and maintenance of mission critical IT infrastructure solutions, has announced that it will provide storage managed services to the United States Patent and Trademark Office (USPTO), under a contract that could extend the relationship between ViON and the USPTO for seven years. The USPTO contract has an estimated value of $139 million.

Framingham, MA-based IDC Government Insights has launched the U.S. Digital Government Innovation and Transformation (DGIT) Strategies advisory service, designed to inform and support Federal government executives by identifying technology trends and disruptive technologies, innovative new programs based upon these technologies, and the successful deployment of technology in the context of policy and organizational challenges.

Atlanta, GA-based LexisNexis Risk Solutions has announced the company has been certified by the U.S. government-approved Trust Framework Provider, SAFE-BioPharma Association. This certification means that identity credentials can be trusted and used at known levels of assurance by U.S. federal agencies, such as the Department of Veterans Affairs, National Institutes of Health and Food and Drug Administration.

CNL Software, a provider of physical security information management (PSIM) software, has announced the appointment of Colin Gallick as a non-executive main board director. Gallick will work closely with the board to achieve its growth ambitions; he brings more than 30 years of “C” level sales, marketing and general management experience within the software industry.

The National Retail Federation (NRF) has issued a statement from President and CEO Matthew Shay in response to a White House announcement regarding data and payment security.

“We applaud the administration for taking proactive and positive steps by adopting PIN and chip technology for government-issued debit and credit cards, among other things.

New York-based American Express is boosting efforts to combat fraud with a new $10 million program aimed at driving U.S. small-merchant adoption of more secure check-out terminals. President Barack Obama announced American Express’ Small Merchant EMV Assistance Program during a press conference last week in Washington, D.C., urging members of the payments and retail industries to work together to educate and protect consumers and businesses.

Millis, MA-based Kanguru has unveiled an advanced, global remote management application for secure USB storage devices with the release of Kanguru Remote Management Console (KRMC) Enterprise Version 6.0. KRMC provides administrators of enterprise-level organizations with the ability to effectively manage a wide range of critical security and usage issues such as password management, active security policy enforcement, remote lock and deletion to prevent costly data breaches, and much more.

Commentary and Opinions

There are many ways for enterprise owners to discover their networks have been breached. Each “breach indicator” has its own level of certainty attached to it.

However, when an FBI agent from its cyber division visits your organization and informs you that “you’ve got a problem,”  you can be nearly 100 percent certain that you’ve been breached.

Federal chief information security officers (CISOs) know that it isn’t a matter of whether their agency will be subject to a cyber-attack; it is a question of how frequently the attacks will occur. 

A storm is gathering in cyberspace and government agencies need to do more than just close the windows. We are past the days where hacker’s just try to prove they can deface a Web site or interrupt service. Now, destructive malware, theft of intellectual property, access to critical infrastructure and connectivity to industry creates an appealing target for criminals worldwide.

The need for cybersecurity experts spans across all industries, and cyber jobs within the U.S. Government are plentiful. Recruiting top technical talent on the agency side and on the contractor side is an essential component to building a fully-functional and competent cyber network defense and cyber offensive team.  

Wireless security on the border 

By Vlad Robu 

Now, with the new immigration reform all over the news, border security is also back on the government’s "To Do" list. In past years, the government has dedicated significantly more money and resources than ever before to secure the border. Is it perfect? Far from it, but better for sure. 

 

Technology Sectors

Market Sectors

Essential Guides

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...