IT Security

Featured Videos

RedSeal Networks is both a Sponsor of the 2012 Awards Program and recipient of a Winner’s trophy in the IT Security Category of “Best Continuous Monitoring Solution”. According to Allan Thompson,...

News

Sun, 2014-09-28 08:16 PM

Eric Holder

United States Attorney General Eric Holder announced his resignation on Thursday, Sept. 25, but stated he will remain in the position until a successor is announced and confirmed by the Senate. Upon...
Thu, 2014-09-25 10:35 PM
In response to requests from a number of vendor companies and government agencies, Government Security News has announced an extension of the deadline for entries in its 2014 Homeland Security Awards...
Tue, 2014-09-23 08:26 PM
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) special agents from the HSI Attaché Office for the Southern Cone of the Americas has begun a four-day...
Tue, 2014-09-23 08:09 PM

 

Attorney General Eric Holder has announced that the federal prison population has dropped by roughly 4,800 inmates since September 2013, representing the first time the federal inmate population has...
Mon, 2014-09-22 07:12 PM
US Customs and Border Protection Field Operations officers and import specialists seized in late August two fraudulent iPhone 6 cell phones among other counterfeit phones and cell phone accessories,...
Tue, 2014-09-16 10:49 PM

Michael Finnegan

This article focuses on the incredible determination of former FBI Special Agent Michael Finnegan, who spent five-plus years of his life studying the activities of Palestinian terrorist Khalid Al-...
Mon, 2014-09-15 09:00 PM
Attorney General Eric Holder announced Monday that the Justice Department will launch a new series of pilot programs in cities across the country to bring together community representatives, public...
Wed, 2014-09-10 08:52 PM

Terry Wade

FBI Director James B. Comey has named Terry Wade special agent in charge of the criminal division at the FBI’s Los Angeles Field Office. Mr. Wade most recently served as section chief of the...
Wed, 2014-09-10 08:25 PM
Shannon Conley, 19, of Arvada, CO, has pled guilty to one count of conspiracy to provide material support to a designated foreign terrorist organization. She pled guilty before U.S. District Court...
Tue, 2014-09-09 07:57 PM
More than 20,000 security professionals from 80 countries are expected to attend the ASIS International (ASIS) 2014 60th Annual Seminar and Exhibits taking place 29 Sept.-02 Oct. at the Georgia World...
Mon, 2014-09-08 06:39 PM
The Joint Cybercrime Action Taskforce (J-CAT) was recently launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3...
Wed, 2014-09-03 07:53 PM
FBI Director James B. Comey has named Joshua Skule special agent in charge of the FBI’s Intelligence Division of the Washington Field Office (WFO). He most recently served as a deputy assistant...

Company News

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $247K contract to upgrade the current Defense ID system at Fort Irwin National Training Center in California.

Tysons Corner, VA-based Preferred Systems Solutions (PSS), a provider of Information Technology (IT) infrastructure, software development, enterprise resource planning, and financial consulting services to government, has announced the appointment of Fred Funk to their executive management team as senior vice president, National Security Group.

Frisco, TX-based Sheplers, a multi-channel western-wear retailer, has determined that their payment systems suffered a security breach in which hackers gained access to their systems and some of their customers’ payment card information was exposed. With the assistance of a leading computer security firm, Sheplers is continuing the investigation into the incident, and are cooperating with law enforcement in their efforts to find the criminals responsible.

Boston, MA-based Wealth Management Systems (WMSI) has announced that Doug Perkins has joined the firm as information security officer. An industry veteran with extensive experience in software development, project management, quality assurance, and operations and information security, Perkins is assuming responsibility for the design and future development of WMSI’s enterprise-wide information security strategies and policies. Mr. Perkins reports to BJ Ralston, WMSI’s chief compliance officer, and is based in WMSI’s Boston Office.

Princeton, NJ-based IXP Corporation, a public safety and emergency response provider that has partnered with Johns Hopkins University (JHU) for the past 10 years, has announced an innovation that raises campus security to the next level.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $220K contract to provide its IM2610 TWIC Plus readers to the Port of New Orleans in Louisiana. The new contract is for a web-hosted TWIC card reading system. The readers will provide TWIC card authentication and Be On the Lookout (BOLO) checks.

London, England-based Brit PLC, a global specialty insurer and reinsurer, has developed a unique insurance service to protect companies operating critical infrastructure and industrial machinery from terrorist and other malicious attacks, such as sabotage, espionage and theft.

San Mateo, CA-based Norse, a provider of live attack intelligence, has announced that Brian Contos has joined the company as a senior vice president and chief security strategist. In this new position, Conto will help guide the company’s market strategy, technical solutions, and field engineering.

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.

 

Technology Sectors

Market Sectors

Essential Guides

Recent IT Security Videos

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

Jeff Horne explains that Denver, CO-based Accuvant , Inc has two different businesses – the Value Added Reseller (VAR) side, in which it is one of the largest resellers in the country, and the Accuvant Lab side, which provides research in IT Security and on risk and compliance management, vulnerability analysis and malware solutions. It does technical due diligence with the hardware and software it grabs from the VAR side of the business, evaluating products and incorporating them into new solutions, acting as a product agnostic, objective advisor.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...