IT Security

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2015-03-03 02:44 AM
FBI Director James B. Comey has named Angela Byers special agent in charge of the FBI’s Cincinnati Division. Byers most recently served as chief of the Financial Crimes section in the Criminal...
Thu, 2015-02-26 08:53 PM
We are members of a non-partisan group of former government officials and policy experts in the fields of national security and counterterrorism. At a time when the threats to the homeland are...
Thu, 2015-02-26 12:39 AM
President Obama Wednesday directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be a national intelligence center...
Wed, 2015-02-25 06:37 PM
The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, has announced a reward of up to $3 million for...
Thu, 2015-02-19 07:26 PM
A multinational gang of cyber criminals has stolen up to $1 billion from about 100 international banks over the past two years, according to an announcement earlier this week from the Russian...
Tue, 2015-02-17 04:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Mon, 2015-02-16 09:27 PM
Director James B. Comey has named John S. Adams the special agent in charge of the FBI’s Norfolk Division. Adams most recently served as deputy assistant director of the Counterterrorism Division (...
Sun, 2015-02-15 07:55 PM
The White House has issued a Presidential Memorandum to promote economic competitiveness and innovation while safeguarding privacy, civil rights, and civil liberties in the domestic use of unmanned...
Fri, 2015-02-13 02:47 PM

Jim Langevin

Washington, DC -- Congressman Jim Langevin (D-RI), a senior member of the House Committee on Homeland Security, yesterday cosponsored H.R. 861, a clean funding bill for the Department of Homeland...
Tue, 2015-02-10 08:23 PM
Director James B. Comey has named Richard Frankel special agent in charge (SAC) of the FBI’s Newark Division. Frankel most recently served as SAC of the Criminal Division in the New York Field Office.
Sun, 2015-02-08 08:22 PM
Following a four-week trial, A California man was found guilty Wednesday in New York on all seven counts in connection with his operation and ownership of Silk Road, a hidden website designed to...
Mon, 2015-02-02 05:31 PM
The Department of Health and Human Services' (HHS) Office of the National Coordinator for Health Information Technology (ONC) has released Connecting Health and Care for the Nation: A Shared...

Company News

Frisco, TX -- The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused on understanding the challenges of healthcare organizations across varying levels of information protection maturity. The review also focused on identifying approaches and solutions to effectively and practically mitigate and defend against cyber threats and risks.
Rook Security, a provider of global IT security solutions protecting sensitive data against dynamic, emerging threats, has announced that Tom Gorup, Security Operations Leader, has been appointed as the Indiana InfraGard IT Sector Chief by the Federal Bureau of Investigation (FBI).
San Ramon, CA -- The Open Identity Exchange has announced that Barclays, ForgeRock and Timpson have joined the organization at the board level, and Escher Group, E-sign, Etive/Digital Log Book, KYCme, Morpho (SAFRAN) and Tricerion Limited have joined as general members.The broadening influence and impact of OIX members demonstrates the active engagement of these organizations in the markets where they operate and illustrates the pragmatism and focus of the support that OIX is uniquely able to provide across a wide-ranging set of Internet identity use cases.
Mobile World Congress 2015 -- ASSA ABLOY has announced that it will license its Seos platform for mobile credentials to the broad identity and access management community as well as application developers and consumers. This new platform will drive the development of a wide range of interoperable, secure and privacy protecting mobile applications, enabling secure access to physical and virtual resources for enterprises, governments and consumers around the world -- and it accommodates any smart device.
Manasses, VA-based CyTech Services (CyTech) CEO Ben Cotton has announced Michael Alexiou as Chief Operating Officer. CyTech is a supporter of government, commercial and legal community clients by turning data into action -- providing a timely and cost-effective solution to extract key information to both prevent and expose cyber attacks. CyTech’s revolutionary enterprise forensics and incident response tool, CyFIR, is changing the way cybercrime investigations are conducted.
As cyber security continues to hit the headlines, even smaller companies can expect to be subject to scrutiny and therefore securing their website is more important than ever. In response to this, Acunetix is offering the online edition of its vulnerability scanner at a new lower entry price. This new option allows consumers to opt for the ability to scan just one target or website and is a further step in making the scanner accessible to a wider market.
Arlington, VA-based Lookingglass Cyber Solutions, a provider of threat intelligence that transforms security operations, has announced that it has completed the acquisition of CloudShield, a secure Deep Packet Processing (DPP) platform provider. The acquisition strengthens Lookingglass’ ability to deliver a dynamic defense solution to large and vital businesses and government agencies.
Jackson, MI-based Consumers Energy, a provider of natural gas and electricity, is warning customers about a scam that includes a high-pressure demand for quick utility payments over the phone using a prepaid credit card.

Commentary and Opinions

By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
The following is a guest editorial provided by Michael D. Helm, the national commander of The American Legion:Most Americans do not know who Ali al-Marri is and it is my sincere hope that they never find out because of another horrendous attack. Nonetheless, it is extremely alarming that not only has our government released the convicted al-Qaeda operative from U.S. custody to Qatar, but that it has also gone largely unnoticed by the mainstream media.
National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger renewed the association’s push for national data security and breach notification standards for retailers amid news of a possible data breach at Chick-fil-A chain restaurants.
With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.
From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent IT Security Videos

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...