IT Security

Featured Videos

RedSeal Networks is both a Sponsor of the 2012 Awards Program and recipient of a Winner’s trophy in the IT Security Category of “Best Continuous Monitoring Solution”. According to Allan Thompson,...

News

Mon, 2014-09-01 02:26 PM
As the primary research and development arm of the Department of Homeland Security, the Science and Technology Directorate (S&T) is looking twenty to thirty years out, or even further, to define...
Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Thu, 2014-07-31 07:24 PM
The House has passed three bills that aim to protect critical infrastructure from cyber attack through the distribution of cyber threat information, the development and procurement of new...
Wed, 2014-07-30 06:25 PM
A new bill has been introduced by Rep. Bennie Thompson (D-MS) and Sen. Ron Wyden (D-OR) that aims to reduce U.S. government over-classification in order to improve information sharing, cut costs, and...
Mon, 2014-07-14 06:23 PM
http://www.nikeairmaxfreerun.com nike air max 2015 A law enforcement and industry partnership has taken measures against the Internet domains and servers that form an advanced cybercriminal...
Mon, 2014-07-07 04:38 PM
On Saturday, the U.S. Secret Service arrested Roman Valerevich Seleznev in France. Russian national Seleznev was indicted in the Western District of Washington in March 2011 for hacking into point of...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Tue, 2014-07-01 08:30 PM
Live from PortSecurity2014 -- Washington, D.C.-based Captain Andrew Tucci, U.S. Coast Guard chief of Ports and Facilities, Information Issues and Supply Chain Security, delivered a chilling...
Fri, 2014-06-27 03:16 AM
The Supreme Court on Wednesday ruled unanimously that police officers must obtain a warrant to search data on someone’s cell phone. Cell phone data has become an integral part of many criminal...
Thu, 2014-06-26 04:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 03:59 PM
Since the beginning of fiscal year 2014, U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations (HSI) has identified 585 victims of child sexual abuse and exploitation,...

Company News

Real-Time Technology Group (RTTG), a provider of secure and hosted identity management solutions for operations and incident response, has partnered with All Points Logistics, a Service Disabled Veteran Owned Small Business, to bring RTTG’s Real-Time Verification (RTV) technology platform to All Points’ state and federal customers.

Austin, TX-based Motion Computing has announced that The City of Brenham has achieved a 30% cost savings by replacing its old mobile communications and data technology throughout its police and fire vehicles with Motion’s Windows-based rugged tablets and RAM mounts.

With FICAM’s decision to approve McLean, VA-based ID.me as an accredited Credential Service Provider last Thursday, the company joins the likes of Symantec and Verizon by enabling American citizens to easily and securely access government services online through a trusted Single Sign On, ID.me says. The Federal Identity Credential Access Management (FICAM) Trust Framework Solutions program approved ID.me as a non-PKI Credential Service Provider (CSP) and Token Manager service operating at Assurance Levels 1, 2, and 3.

A strategic partnership to reduce lines and wait times at motor vehicle agencies (MVAs) and for other identity services has been announced by MorphoTrust USA (Safran) and QLess. The partnership will improve consumer convenience and organizational efficiency through the innovative use of technology. MorphoTrust, the provider of issuance solutions for approximately 80 percent of all U.S.

Ashburn, VA-based Telos Corporation, an information technology provider that delivers solutions that empower and protect the world’s most security-conscious enterprises, has announced the general availability of SE7EN: NetAlert, an interactive, Web-based network infrastructure monitoring tool to protect the physical security of fiber optic and copper cable networks.

San Mateo, CA-based Norse Corp., a provider of live attack intelligence, has announced the appointment of Jacinta Tobin to serve as the company’s first senior vice president of global sales.

Named in May 2013 as one of the top 50 most influential women in technology by Silicon Valley Global magazine, Tobin will spearhead all of Norse’s global growth initiatives.

The GSMA has announced its collaboration with the United Nations Children’s Fund (UNICEF) to promote industry guidelines to safeguard children online in Latin America and the Caribbean. The GSMA will promote the Guidelines for Industry on Child Online Protection within the Latin American mobile industry and will work closely with UNICEF to identify ways in which mobile operators can promote children’s rights and responsible digital citizenship.

Gallagher, an international provider of integrated access control, intruder alarm, and perimeter protection continues to grow operations with the appointment of Jim Saletta, new Business Development Manager for the western region of the U.S.

Working alongside Eddie Salinas, technical account manager, Jim will manage multiple relationships from distributors, business partners, and customers to drive Gallagher's end-to-end security solution.

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.

The collection of information generated from the online activities of citizens, by both private and public interests, has become so widespread and pervasive that it has prompted several social commentators to label today’s digital-defined culture as “The Surveillance Age.” The moniker is an apt one, in part given the fact that nearly every sovereign state with the means is conducting high-tech surveillance programs, a practice that is considered by most to be integral to national security and ensuring the safety of the state and its citizens.

 

Technology Sectors

Market Sectors

Essential Guides

Recent IT Security Videos

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

Jeff Horne explains that Denver, CO-based Accuvant , Inc has two different businesses – the Value Added Reseller (VAR) side, in which it is one of the largest resellers in the country, and the Accuvant Lab side, which provides research in IT Security and on risk and compliance management, vulnerability analysis and malware solutions. It does technical due diligence with the hardware and software it grabs from the VAR side of the business, evaluating products and incorporating them into new solutions, acting as a product agnostic, objective advisor.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...