IT Security

Featured Videos

RedSeal Networks is both a Sponsor of the 2012 Awards Program and recipient of a Winner’s trophy in the IT Security Category of “Best Continuous Monitoring Solution”. According to Allan Thompson,...

News

Wed, 2014-04-09 10:26 PM

Ryan Kalember

“Most of the government’s sensitive information is not in databases, but in files such as PDFs, PowerPoint slides, and Word documents. As a matter of fact, the Snowden NSA leak was all files,” said...
Wed, 2014-04-09 07:48 AM
Hospitals can be stressful places, and can face a host of potentially violent threats, ranging from potential revenge killings to domestic violence to disgruntled employees. But medical facilities...
Fri, 2014-03-28 02:40 AM
“Security is escalating in importance,” said Dan Reuckert.Rueckert is the associate vice president of Black & Veatch’s Management Consulting Division’s Security & Compliance practice. He has...
Wed, 2014-03-12 11:20 PM

Rep. Kerry Bentivolio 

A bill introduced by Rep. Kerry Bentivolio (R-MI) to improve the security of government websites has been unanimously approved by the House Oversight and Government Reform Committee.
Mon, 2014-02-17 09:15 PM
The Defense Advanced Research Projects Agency (DARPA) has asked for proposals to help improve Web searches for defense and other agencies and eventually the public. Initially, the system would be...
Thu, 2014-02-13 07:40 PM
The Obama Administration has announced the release of the Cybersecurity Framework, the result of a year-long effort to develop a voluntary guide for critical infrastructure organizations to...
Tue, 2014-02-11 11:24 PM

Tom Kellermann

“This is a Cybersecurity 911 system for our critical infrastructure,” said Tom Kellermann regarding the National Cybersecurity and Critical Infrastructure Protection Act of 2013 (NCCIP).
Thu, 2014-02-06 11:41 PM

Dr. Oliver McGee

“Cyber-assaults on the nation's critical infrastructure are on the rise at alarming rates,” says Dr. Oliver McGee.McGee is the former United States deputy assistant secretary of transportation for...
Wed, 2014-02-05 08:35 PM
Several major Internet companies, for the first time, have revealed in broad terms the number of data requests they receive that have been approved by judges under the Foreign Intelligence...
Tue, 2014-02-04 12:47 AM
When the final seconds of the Super Bowl XLVIII play clock had ticked away, the Seattle Seahawks weren’t the only parties in MetLife Stadium to breathe a sigh of relief. There were also thousands of...
Fri, 2014-01-31 05:28 PM

Rebecca Richards

The National Security Agency (NSA) has appointed Rebecca Richards as its first-ever civil liberties and privacy officer. Ms. Richards most recently worked as the senior director for privacy...
Wed, 2014-01-29 10:15 PM
Data Privacy Day was held on January 28 and was part of the National Cyber Security Alliance’s (NCSA) efforts to increase the general public’s awareness of privacy and cyber security issues. The NCSA...

Company News

A new poll by Germany-based marketing research firm GfK has found that almost nine in ten (88 percent) of U.S. consumers are at least “a little” concerned about the privacy of their personal data. One in three consumers also reports being directly impacted by misuse of personal data within the past year.

The poll, conducted last month, revealed 49 percent of respondents say they are now “very much” concerned about the privacy of their data; 59 percent said their concern has risen in the last twelve months.

Seattle, WA-based F5 Networks, in response to widespread concern about the OpenSSL Heartbleed bug and related attacks, has issued a statement providing guidance to customers about the protection F5’s BIG-IP Local Traffic Manager (LTM) can offer. “This is an industry-tested, high-performance solution that delivers exceptional security, even for severe threats such as the Heartbleed bug.”

Former U.S. Under Secretary of Defense for Policy Dr. James Miller has accepted a position on Endgame Inc.’s advisory board. Endgame is an Arlington, VA based security intelligence and analytics firm. Dr. Miller served as the U.S. Under Secretary of Defense for Policy from 2012-2014.

The University of Connecticut (Storrs, CT), home to a major center on hardware security, and Comcast have announced the establishment of the Center of Excellence for Security Innovation (CSI) at UConn.

“Many of the security challenges are the same, but the technology has changed,” said Jack LeGrand.

LeGrand is the director of identity & access management, Federal Civilian, at Dell Software. He has 22 years of experience in IT security. As an attendee at the 2014 RSA Conference in San Francisco, he gained a number of valuable insights regarding some of the security challenges that both businesses and government agencies face. “The RSA Conference has several strata, but it primarily focuses on the evolution of security technology,” he said.

South Dakota Secretary of State Jason Gant has activated the new iOASIS system, a computerized absentee ballot system for members of the military. The iOASIS system will be available to military members serving overseas for the upcoming South Dakota elections in April 2014.

Palo Alto, CA based Hewlett-Packard (HP) Enterprise Services has announced a new service designed to help accelerate the U.S. public sector’s adoption of mobile technology to drive workforce productivity while securing IT assets.

Tenable Network Security’s Chief Security Officer, Marcus J. Ranum, will speak at the upcoming Los Angeles chapter of the Information Systems Security Association (ISSA-LA) Sixth Annual Information Security Summit. The event’s theme will be “The Growing Cyber Threat: Protect Your Business.” It will focus on providing educational programs and forums for businesses, IT professionals, and law enforcement to learn more about how to secure their information online.

Commentary and Opinions

The collection of information generated from the online activities of citizens, by both private and public interests, has become so widespread and pervasive that it has prompted several social commentators to label today’s digital-defined culture as “The Surveillance Age.” The moniker is an apt one, in part given the fact that nearly every sovereign state with the means is conducting high-tech surveillance programs, a practice that is considered by most to be integral to national security and ensuring the safety of the state and its citizens.

By Jonathan Lewis

Data breaches occur more often than we realize, and affect everyone from consumers to municipal governments. 

Government computing has undergone rapid change in recent years. Within the data center, multiple drivers are pushing cloud computing to the forefront, including technology policies such as “Cloud First” and general austerity mandates aimed at eliminating large infrastructure or asset ownership and management.

Defense and military applications are also changing, as the applications that a warfighter utilizes at the tactical edge are becoming increasingly compute-intensive to enhance and extend combat cognition, efficiency and effectiveness.

Mobility, bring-your-own-device and telework policies pay off several times over. In addition to creating a work-life balance for employees with anytime, anywhere connectivity, the ability to go mobile can help to ease vexing budgetary constraints that many state and local governments will carry, once again, into a new year.

With these benefits and a growing citizen demand for round-the-clock accessibility to government services and information, few will dispute that mobility presents a compelling value proposition for state and local governments.

 

2013 Awards Yearbook

Celebrate the Great
Achievements of 2013


Click on Cover
Page to access

Technology Sectors

Market Sectors

Essential Guides

Recent IT Security Videos

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

Jeff Horne explains that Denver, CO-based Accuvant , Inc has two different businesses – the Value Added Reseller (VAR) side, in which it is one of the largest resellers in the country, and the Accuvant Lab side, which provides research in IT Security and on risk and compliance management, vulnerability analysis and malware solutions. It does technical due diligence with the hardware and software it grabs from the VAR side of the business, evaluating products and incorporating them into new solutions, acting as a product agnostic, objective advisor.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...