Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Wed, 2015-10-21 10:49 AM

Gen. Carlisle, commander of Air Combat Command

Hill Air Force Base, UT, - Base officials and the Top of Utah community officially welcomed the F-35 Lightning II at a ceremony here Oct. 14, an event that formally marked the beginning of F-35...
Tue, 2015-10-20 07:52 PM

RDML Paul Thomas

Written testimony of USCG Assistant Commandant for Prevention Policy RDML Paul Thomas titled “Protecting Maritime Facilities in the 21st Century: Are Our Nation’s Ports at Risk for a Cyber-Attack?”...
Mon, 2015-10-19 11:06 AM

Xiaokui Shu and Daphane Yao

Blacksburg, VA, Octobeer 15 - Imagine millions of lines of instructions. Then try and picture how one extremely tiny anomaly could be found in almost real-time and prevent a cyber security attack. A...
Mon, 2015-10-19 10:55 AM
Washington, DC, October 12 - The Library of Congress has released a Request for Information (RFI) in support of reviewing and potentially expanding its advanced threat detection and response...
Wed, 2015-10-14 11:12 PM

2010 Keynote Speaker: Ret. 4-Star General Barry McCaffrey

GSN announced today that in response to a number of requests to stretch the closing date for entries in its 2015 Homeland Security Awards Program, the deadline has been extended to Friday, October 23...
Wed, 2015-10-14 01:52 PM
Miami, FL, October 12 - Researchers from FIU's College of Engineering and Computing have teamed up with four other universities and a utility company to help safeguard the nation's power utilities...
Sat, 2015-10-10 01:22 PM

Tim Rains, Microsoft

New York, NY, October 8 - On October 14, the New York Metro Joint Cyber Security Conference (NYMJCSC) will hold its 2nd annual cybersecurity conference at the Microsoft Technology Center, 11 Times...
Thu, 2015-10-08 06:53 PM

Muneeb and Sohaib Akhter

October 2 - Twin brothers Muneeb and Sohaib Akhter, 23, of Springfield, Virginia, were sentenced today for conspiracy to commit wire fraud, conspiracy to access a protected computer without...
Thu, 2015-10-08 12:26 AM
By Cheryl Pellerin  Washington, DC, September 29 - Defense and deterrence are two of the highest priorities for bolstering the nation’s cybersecurity capabilities, top officials from the Defense...
Tue, 2015-10-06 01:09 PM
Lyon, France – Interpol and the US Federal Bureau of Investigation (FBI) are to forge closer ties in combating organized crime and terrorism in the face of an ever-increasing number and range of...
Thu, 2015-10-01 05:01 PM

Alejandro Mayorkas

Washington, DC, October 1 - The Department of Homeland Security (DHS) today announced the kick-off of National Cyber Security Awareness Month 2015. During this month, outreach efforts will aim to...
Thu, 2015-10-01 04:46 PM

Christos Dimitriadis

Rolling Meadows, IL, September 24 - A survey of more than 900 cybersecurity experts shows that an overwhelming majority (87%) expect to see an increase in mobile payment data breaches over the next...

Pages

Commentary and Opinions

How long can your business operations be down until irreparable damage occurs? At what point does company survivability become a concern? How much is it worth to you that your external Internet...
The intelligence agencies and military branches of the U.S. Government need to operate live “Red Teams” for use against physical structures and Red Teams that are separate from the planners for the...
 Every day, people and organizations hand over their most valuable and vital personal information to government agencies. It is then up to the recipient – a federal or state agency, or another...
Attacking systems for sensitive information for the purpose of espionage or monetization is certainly not new. In fact, it's a predictable aspect of crime because in our modern cyber era, digital...
Government agencies are more dependent than ever on computer systems to carry out their missions. From providing citizens access to public information over the Web to processing and accounting for...

Pages

 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the addition of USB device control to its Kanguru Remote Management Console (KRMC). The company calls...
Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented architecture (SOA), open...
Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS supervisory control and data acquisition (SCADA) testing project to ensure critical IT security and...
Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mechanisms that enforce controls based upon the physical location of the...
GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effective, high-performance rugged convertible notebook computers, the...