IT Security

Featured Videos

RedSeal Networks is both a Sponsor of the 2012 Awards Program and recipient of a Winner’s trophy in the IT Security Category of “Best Continuous Monitoring Solution”. According to Allan Thompson,...

News

Thu, 2014-07-31 07:24 PM
The House has passed three bills that aim to protect critical infrastructure from cyber attack through the distribution of cyber threat information, the development and procurement of new...
Wed, 2014-07-30 06:25 PM
A new bill has been introduced by Rep. Bennie Thompson (D-MS) and Sen. Ron Wyden (D-OR) that aims to reduce U.S. government over-classification in order to improve information sharing, cut costs, and...
Mon, 2014-07-14 06:23 PM
A law enforcement and industry partnership has taken measures against the Internet domains and servers that form an advanced cybercriminal infrastructure attacking online banking systems around the...
Mon, 2014-07-07 04:38 PM
On Saturday, the U.S. Secret Service arrested Roman Valerevich Seleznev in France. Russian national Seleznev was indicted in the Western District of Washington in March 2011 for hacking into point of...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Tue, 2014-07-01 08:30 PM
Live from PortSecurity2014 -- Washington, D.C.-based Captain Andrew Tucci, U.S. Coast Guard chief of Ports and Facilities, Information Issues and Supply Chain Security, delivered a chilling...
Fri, 2014-06-27 03:16 AM
The Supreme Court on Wednesday ruled unanimously that police officers must obtain a warrant to search data on someone’s cell phone. Cell phone data has become an integral part of many criminal...
Thu, 2014-06-26 04:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 03:59 PM
Since the beginning of fiscal year 2014, U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) has identified 585 victims of child sexual abuse and exploitation,...
Tue, 2014-06-24 09:04 AM

Michael Madsen

GSN parent company World Business Media has announced that Michael Madsen, the company’s first advertising director and longtime sales “MVP,” has been promoted from Associate Publisher to Publisher...
Mon, 2014-06-23 10:56 PM
More than 70 law enforcement officials from 21 countries gathered at Europol's headquarters in The Hague June 16 and 17 to coordinate investigations into the criminal exploitation of virtual...
Tue, 2014-06-17 02:33 AM
AT&T has confirmed that attackers have compromised the personal information of some mobile account holders. In a letter mailed to customers, AT&T revealed that three employees of one of its...

Company News

Eid Passport, Inc of Hillsboro, OR, a market leader in high-assurance identity management solutions and the largest commercial provider of vendor credentials at military facilities, has secured placement on the Transportation Security Administration’s (TSA) Transportation Worker Identification Credential (TWIC) Qualified Technology List (QTL) for the company’s RAPID-RCx Program.

The Law Enforcement Legal Defense Fund (LELDF), a donor-driven non-profit that provides financial support to law enforcement professionals facing duty-related legal challenges, has named former FBI Assistant Director Ronald T. Hosko as president of the organization.

Boulder, CO-based LogRhythm, a provider of security intelligence, has announced the launch of its Threat Intelligence Ecosystem, the industry’s first collective of threat intelligence vendors focused on delivering unprecedented security intelligence via a next-generation security analytics and intelligence platform.

Madison, WI-based Esker, a provider of document process automation solutions, has announced Wisconsin’s City of Madison Police Department has signed on to leverage the on-premises automation platform, Esker DeliveryWare, in order to simplify the way it generates internal messaging reports while saving a significant amount of time and money.

Plano, TX-based Dell Services has announced that it has been selected to provide the U.S. Centers for Disease Control and Prevention (CDC) with comprehensive IT infrastructure, application, and user support services.

Eden Prairie, MN-based SUPERVALU, one of the largest grocery wholesalers and retailers in the U.S. with annual sales of approximately $17 billion, has announced that it experienced a criminal intrusion into the portion of its computer network that processes payment card transactions for some of its retail food stores, including some of its associated stand-alone liquor stores.

Novato, CA-based DriveSavers, a provider of data recovery, eDiscovery, and digital forensic services, has announced assistance to victims of the recent earthquake and tropical storm Iselle in Hawaii. The first major hurricane threat on the Big Island in 22 years turned into a tropical storm causing 30,000 homes to lose power and dumping four to six inches of rain. Due to power loss and flooding, many individuals and businesses could experience extensive damage to electronic devices.

Alexandria, VA-based MorphoTrak, a subsidiary of Safran USA, a provider of biometric and identity management solutions to an array of markets in the U.S. including law enforcement, border control, civil identification, and facility/IT security, has announced the appointment of Steve Vinsik as MorphoTrak’s new vice president of Criminal Justice and Public Security, responsible for delivering biometric and security solutions across the company’s broad span of customers.

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.

The collection of information generated from the online activities of citizens, by both private and public interests, has become so widespread and pervasive that it has prompted several social commentators to label today’s digital-defined culture as “The Surveillance Age.” The moniker is an apt one, in part given the fact that nearly every sovereign state with the means is conducting high-tech surveillance programs, a practice that is considered by most to be integral to national security and ensuring the safety of the state and its citizens.

 

2013 Awards Yearbook

Celebrate the Great
Achievements of 2013


Click on Cover
Page to access

Technology Sectors

Market Sectors

Essential Guides

Recent IT Security Videos

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

Jeff Horne explains that Denver, CO-based Accuvant , Inc has two different businesses – the Value Added Reseller (VAR) side, in which it is one of the largest resellers in the country, and the Accuvant Lab side, which provides research in IT Security and on risk and compliance management, vulnerability analysis and malware solutions. It does technical due diligence with the hardware and software it grabs from the VAR side of the business, evaluating products and incorporating them into new solutions, acting as a product agnostic, objective advisor.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...