IT Security

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2014-11-20 04:20 PM
As in previous years, the Government Security News Homeland Security Awards was divided into three broad categories of entries: Best Vendors of IT Security Products and Solutions; Best...
Thu, 2014-11-20 04:09 PM
Last week, U.S. Rep. Curt Clawson (R-FL), a member of the Committee on Homeland Security, introduced H.R. 5712, the “DHS Private Sector Office Engagement Act,” aimed at improving private sector...
Thu, 2014-11-20 02:54 PM
On Wednesday, Secret Service Acting Director Joseph P. Clancy testified before the U.S. House of Representatives Committee on the Judiciary on a variety of issues and addressed ongoing efforts to...
Tue, 2014-11-18 02:43 PM
With judging of this year’s Homeland Security Awards entries nearing completion, Government Security News has announced that the roster of 2014 Winners and Finalists will be posted on the GSN website...
Sun, 2014-11-16 05:39 PM
A Georgia man who purchased stolen credit card data and other personal information through an identity theft and credit card fraud ring known as “Carder.su” was sentenced Wednesday to 115 months in...
Wed, 2014-11-12 03:31 PM
As the result of the ongoing partnership with the Department of Defense, the Transportation Security Administration has extended TSA Pre-check expedited screening benefits to students of four U.S....
Tue, 2014-11-11 06:41 PM
A moment of silence was observed around the country this morning. During these precious minutes, families, neighbors, and friends remembered those who are serving and have served our nation. This...
Tue, 2014-11-11 01:51 PM
November 11, 2014 -- As Veterans’ Day approaches, I have a couple of thoughts. First, I’m thankful for all of the sacrifices our Veterans have made, that in so many ways it is difficult for many to...
Tue, 2014-11-11 01:30 PM
The New York-based Open Society Foundations awarded a grant of $50 million Friday to the American Civil Liberties Union (ACLU) in support of its nationwide campaign to end mass incarceration. The...
Mon, 2014-11-10 05:30 PM
The estimated number of violent crimes in the nation decreased 4.4 percent in 2013 when compared with 2012 data, according to FBI figures released today. Property crimes decreased 4.1 percent,...
Sun, 2014-11-09 07:37 PM
Dozens of dark market websites offering a range of illegal goods and services for sale on the Tor network went dark Thursday following a coordinated international law enforcement action. The seizure...
Sun, 2014-11-09 04:58 PM
Investigators have discovered a potential cyber security threat to the U.S. critical infrastructure. BlackEnergy is a trojan horse discovered within the software that controls oil and gas pipelines,...

Company News

Intelligent Video Surveillance (ISS), a Video Management Systems (VMS) vendor, and Agent Video Intelligence (Agent Vi), a provider of open architecture video analytics software, have announced the integration of ISS’ SecurOS video management platform with the real-time event detection capabilities of savVi, Agent Vi’s video analytics platform.

Carnegie Mellon University has selected Virtual Asset Tracker (VAT), Radiant RFID’s end-to-end asset management solution, to manage asset security and location visibility for the Electrical and Computer Engineering Department’s IT assets and test equipment.

Berkeley, CA-based Tanium, a provider of security and systems management, has announced the appointment of two key hires that will strengthen the executive bench and support the company through its next stages of hyper-growth. In newly created positions, Chad Fulgham, the former CIO of the FBI, joins Tanium as the company’s Chief Strategy Officer and Jennifer Johnson, recently a partner at the leading venture capital firm Andreessen Horowitz, has joined Tanium as Chief Marketing Officer.

McAfee, now part of Intel Security, and Europol's European Cybercrime Centre (EC3) have signed a Memorandum of Understanding (MoU) that brings together Intel Security expertise with EC3’s law enforcement skills in the war against cybercrime.

Dallas-based Zimbra, a provider of unified collaboration software, has announced the results of the Ponemon Institute’s “The Open Source Collaboration Study: Viewpoints on Security and Privacy in the U.S. and EMEA” report. The study surveyed 1,398 IT and IT security practitioners to learn about their companies’ involvement in the use of open source messaging and collaboration solutions, and their views on security and privacy.

San Mateo, CA-based Agari, a provider of data-driven security solutions that detect and prevent advanced email cyberthreats, has announced it has entered into an agreement with enterprise security company Palo Alto Networks. Per the agreement, Agari will provide email-based threat intelligence data to the Palo Alto Networks Threat Intelligence Cloud. This data will help enhance threat prevention of malware and advanced persistent threats (APTs) globally.

Sierra-Olympic, maker of infrared (IR) and thermal imaging components, cameras, and systems solutions for advanced imaging applications, has announced the first in a series of affordable, uncooled microbolometer thermal cameras for industrial, machine vision, and general purpose thermal imaging applications. The new Viento 320 features 320 x 240 pixel resolution with a 17-micron pixel pitch.

Columbia, MD-based Tenable Network Security, Inc., a provider of continuous network monitoring, has announced the release of Nessus v6, reducing customer exposure to security risks through advanced malware detection, compliance with system hardening policies, and enhanced security for mobile, virtualized and cloud environments.

Commentary and Opinions

With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.

From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.

 

Technology Sectors

Market Sectors

Essential Guides

Recent IT Security Videos

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...