IT Security

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Mon, 2013-06-10 02:19 PM

Waylon Krush

Cyber security company, Lunarline, Inc., announced on June 10 that it has been awarded a prime contract with the Federal Transit Administration (FTA), a division of the U.S. Department of...
Mon, 2013-06-10 11:29 AM
DHS announced on June 7 the awards of six more contracts under its Enterprise Acquisition Gateway for Leading Edge Solutions II --  better known as the EAGLE II program – in Functional Category 1 (...
Sat, 2013-06-08 04:56 PM

Sen. Claire McCaskill

U.S. Senator Claire McCaskill (D-MO), chairman of the Senate Subcommittee on Financial & Contracting Oversight, who began investigating wasteful spending by the General Services Administration (...
Fri, 2013-06-07 02:33 PM

Forensic Revovery of
Evidence Device (FRED)

The U.S. Secret Service intends to procure 50 Forensic Recovery Evidence Devices, nicknamed FRED, which will be delivered to the agency’s National Forensics Crime Institute, in Hoover, AL, and enable...
Wed, 2013-06-05 01:20 PM
According to new research conducted by Unisys Corporation, a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should...
Wed, 2013-06-05 11:20 AM

Rep. Mike Rogers

The TechAmerica Foundation announced on June 5 that House Intelligence Committee Chairman, Rep. Mike Rogers (R-MI), has been selected as the 2013 Legislator of the Year for the U.S. House of...
Tue, 2013-06-04 05:35 PM

General Keith Alexander

Gen. Keith B. Alexander, director of the National Security Agency and commander of the U.S. Cyber Command, wants to combine forces from the military communications and intelligence communities to...
Mon, 2013-06-03 05:22 PM
To help push federally-funded cybersecurity research into the commercial marketplace, the Science and Technology Directorate at DHS is planning to hold a one-day conference in Manhattan on August 15...
Mon, 2013-06-03 08:43 AM
In a move to counter the growing cybersecurity threats and risks to confidential data, the Texas Department of Information Resources (DIR) recently deployed a software solution from Encryptics, which...
Thu, 2013-05-30 04:07 PM
The FBI has seen an increase in cyber-criminals who use online photo-sharing programs to perpetrate scams and harm victims’ computers, says an “intelligence note” published by the Internet Crime...
Tue, 2013-05-28 03:21 PM
Global Information Assurance Certification (GIAC), an IT Security certification body, announced on May 28 a new certification for mobile device security, the GIAC Mobile Device Security Analyst (GMOB...
Thu, 2013-05-16 11:35 AM
The President’s National Security Telecommunications Advisory Committee will meet in both closed and open sessions in Washington, DC, on May 22 to discuss nation-state capabilities and strategic...

Pages

Commentary and Opinions

Recently, attacks on our government and corporate infrastructure have been occurring with more regularity, compromising corporate, personal and classified information. No longer is the task of cyber-...
By Michael MarkluecBrowsing the daily news headlines, it is not surprising to read that yet another organization has suffered an IT security breach resulting in the theft of sensitive data. In fact,...
Recently, I was asked the most interesting questions I have been asked for over a decade.  The complex question came in two parts. One, is the right to bear ‘cyber arms’ covered under the Second...
By Ed Granstedt and Dr. Troy NolanA successful cyber security strategy starts and ends with the mission -- we don’t protect our information for its own sake, but for the sake of the mission. Business...
By Dr. Van Parunak Earlier this year, DARPA announced the “Cyber Genome Program” for new cyber-defense technologies to support the Department of Defense, law enforcement, counter intelligence and...

Pages

 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the addition of USB device control to its Kanguru Remote Management Console (KRMC). The company calls...
Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented architecture (SOA), open...
Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS supervisory control and data acquisition (SCADA) testing project to ensure critical IT security and...
Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mechanisms that enforce controls based upon the physical location of the...
GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effective, high-performance rugged convertible notebook computers, the...