IT Security

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2015-05-05 10:51 PM
San Francisco, CA, May 5 – Ripple Labs has agreed to resolve a criminal investigation in exchange for a settlement agreement calling for a series of substantial remedial measures, including a...
Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...
Wed, 2015-04-29 07:35 PM
­Fort George G. Meade, MD – The U.S. Naval Academy has won the 2015 Cyber Defense Exercise (CDX), capturing its third trophy since the annual competition began in 2001, the National Security Agency (...
Fri, 2015-04-24 12:01 AM

Robert Bonner

Editor’s Note: On April 21, the first day of the 9th Border Security Expo, held in Phoenix, AZ, Robert C. Bonner, as a member of the Expo’s advisory board, was prepared to present the prestigious...
Sun, 2015-04-19 06:53 PM
The same ultrasound technology that allows expectant parents to look at their offspring in utero has been showcased in fingerprint biometrics by Sonovation at ISC West, the spring trade show of...
Fri, 2015-04-17 12:13 AM
Sydney, Australia, April 15 – The Ministry of Interior for the United Arab Emirates was selected this week as the next chair of the Virtual Global Taskforce (VGT), an international alliance of law...
Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “Carder.su” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...
Wed, 2015-04-08 10:56 PM
One focus of the ASIS 25th New York City Security Conference and Expo, to be held April 22-23, will be educational sessions on current topics in terrorism. But the event will also consist of many...
Tue, 2015-04-07 06:42 PM
Port Canaveral, FL – As a recipient of only 1.5% of the DHS federal grants, says Captain Tom Allan, Commandant of Sector Jacksonville, FL, the U.S. Coast Guard is “the best bargain you’re ever going...
Thu, 2015-04-02 06:06 PM

Josh Shapiro 

Harrisburg, PA, April 1 – Governor Tom Wolf has announced that he has named Montgomery County Commissioners' Chairman Josh Shapiro the chair of the Pennsylvania Commission on Crime and Delinquency."I...

Company News

Arlington, VA, May 5 – The Telecommunications Industry Association (TIA), an association representing the manufacturers and suppliers of high-tech communications networks, announced today that top technology executives from Dell, xo Communications, Fujitsu and ADTRAN will take part in the annual TIA 
San Francisco, May 5 – Bay Dynamics, a provider of cybersecurity solutions and actionable risk intelligence to the world’s largest organizations, has announced that Comcast Cable is leveraging the company’s 
Pompano Beach, FL, May 5 ­– At ISC West 2015, IC Real Tech demonstrated its position as an innovator of video surveillance technologies, nabbing 3 key security industry awards for its revolutionary IC Realtime IC720 360x360 Virtual PTZ (pan, tilt, zoom) video camera and changing the way in which many security system companies will present surveillance systems to their clients.
Irvine, CA, April 28 – Getac Inc., a manufacturer of rugged computers, has released the updated V110 rugged convertible and the updated F110 rugged tablet, making Getac’s fastest-selling products even better. The second generation F110 and V110 products each feature a fifth generation Intel Processor, Intel HD Graphics 5500, an eight-megapixel rear camera, a front HD webcam and an updated LumiBond 2.0 touch screen that allows glove-on use.
San Francisco, May 1 – SINET, an organization focused on the advancement of cybersecurity innovation through public-private collaboration, has announced that the SINET 16 Innovator Awards application process is now open. The deadline for submission is July 17, 2015. There is no fee to apply or to present.
Mississauga, Ontario, Canada, May 4 – WinMagic, Inc. has announced that one of its longest-standing partners, Carolina Advanced Digital, has won a potentially lucrative contract enabling the sale of WinMagic encryption and key management solutions to U.S. federal agencies.
Cambridge, MA, May 4 – The APWG reports in its new Phishing Activity Trends Report that during the 4th quarter of 2014, a record number of crimeware variants were detected, a strategy of overwhelming proliferation of variations designed to defeat antivirus software. Meanwhile, phishers increasingly targeted retail and service sites, hoping to take advantage of the burgeoning numbers of online shoppers.
Arlington, VA, April 28 – Lookingglass Cyber Solutions has released a report by its Cyber Threat Intelligence Group (CTIG) corroborating the Ukrainian government and Security Service of Ukraine’s (SBU) claims that “Operation Armageddon” is a Russian state-sponsored cyber espionage campaign targeting Ukrainian government and military of

Commentary and Opinions

Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
By Michael D. HelmMost Americans do not know who Ali al-Marri is and it is my sincere hope that they never find out because of another horrendous attack. Nonetheless, it is extremely alarming that not only has our government released the convicted al-Qaeda operative from U.S. custody to Qatar, but that it has also gone largely unnoticed by the mainstream media.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent IT Security Videos

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...