2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

IT Security

Micronet Enertec wins $1.2M in aerospace and defense contracts

Top Priority Sector: 
military_force_protection
Image Caption: 

Lucatz

MONTVALE, NJ Jan. 12, 2017 Micronet Enertec Technologies, Inc. (NASDAQCM: MICT) announced today that its wholly-owned subsidiary, Enertec Systems 2001 Ltd. (Enertec), was recently awarded three purchase orders from two global aerospace & defense contractors, for an aggregate amount of more than $1,200,000. This includes a $250,000 continuous order for a mobile command and control center from a multinational aerospace & defense contractor. These command and control centers are used in rugged and difficult terrains for the control and monitoring of advanced weapons systems.

Homepage position: 
1

The chemistry behind the Flint Water Crisis: Corrosion of pipes, erosion of trust

Top Priority Sector: 
state_local_security

By George Lane
GSN Columnist

When Flint, Michigan changed its water supply in 2014, it initiated a cascade of chemical reactions inside decades-old water pipes that caused Lead to leach into its drinking water, triggering a major public health crisis. When Flint used its own river as a water supply, drinking water contained a staggering 13,200 parts per billion (ppb) Lead, almost 900 times higher than the 15 ppb regulatory limit set by the Environmental Protection Agency (EPA). Some water samples exceeded the EPA criteria for Lead concentration in hazardous waste, 5,000 ppb.

Homepage position: 
1

Partnership incorporates iSign biometic technology into AAEON rugged tablets

Top Priority Sector: 
it_security
Image Caption: 

Anderson

LACEY, WA Jan. 2, 2017 AAEON and iSign Announce Partnership Enabling Rugged Tablet Computers with Biometric Signature Technology

Homepage position: 
1

Crowley Government Services earns ISO/IEC certification

Top Priority Sector: 
it_security

JACKSONVILLE, FL Dec. 28, 2016 Crowley Maritime Corp.’s government services group has achieved worldwide ISO/IEC 27001:2013 information security certification for enhancements made to the security of accessing, transmitting, processing and storing covered defense information related to its management of Military Sealift Command’s T-AGOS/T-AGM and BOBO vessels. ISO/IEC 27001:2013 is the most rigorous and recognized international standard for implementing and managing security controls to protect information assets.

Homepage position: 
1

CACI earns ISO certification for IT infrastructure and security policies, practices

Top Priority Sector: 
it_security
Image Caption: 

Mengucci

ARLINGTON, VA Dec. 21, 2016 CACI International Inc (NYSE: CACI) announced today that it has been certified for the International Organization for Standardization (ISO) 27001 credential for information security policies and practices. The enterprise-wide certification is independent verification that CACI’s internal corporate information technology (IT) infrastructure and information security policies and practices adhere to the best practices defined in the ISO standard.

Homepage position: 
1

Red Hat earns nine federal certifications for Linux 7.1

Top Priority Sector: 
it_security
Image Caption: 

Smith

RALEIGH, NC Dec. 13, 2016 Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that Red Hat Enterprise Linux 7.1 has received nine Federal Information Processing Standard (FIPS) 140-2 security certifications from the U.S. federal government’s National Institute of Standards and Practices (NIST).

Homepage position: 
1

Zenoss wins IT software contract with U.S. Air Force

Top Priority Sector: 
military_force_protection
Image Caption: 

Stock

AUSTIN, TX Dec. 14, 2016 Zenoss Inc., the leader in hybrid IT monitoring and analytics software, today announced that the company has been awarded the multisite software contract for the United States Air Force Distributed Common Ground System (DCGS). Under the contract, Zenoss will also provide software and services for extensibility and integration with key technologies including Cisco, VMware, EMC and Windows.

What is the US Air Force DCGS?

Homepage position: 
1

Healthcare information organization chooses Prevalent Synapse, Churchill & Harriman to protect against cyber threats

Top Priority Sector: 
cyber_security

WARREN, NJ Dec. 8, 2016 Prevalent, Inc., the leader in Third-Party Risk Management and Vendor Threat Intelligence, and Churchill & Harriman, the recognized leader in enterprise risk management and third-party risk assessments, today jointly announced that NH-ISAC has chosen the purpose-built Prevalent Synapse™ platform and Churchill & Harriman's risk assessment services for the third-party risk management element of its mission to protect the nation's critical healthcare infrastructure from physical and cyber threats.

Homepage position: 
1

Iron Mountain, ITRenew offers secures technology equipment disposal for federal agencies

Top Priority Sector: 
it_security
Image Caption: 

Sharpe

BOSTON Nov. 30, 2016 As U.S. Federal agencies plan to replace outdated technology equipment, it becomes increasingly important to deploy IT asset disposition (ITAD) programs that ensure data security and provide e-waste recycling and value recovery services.

Homepage position: 
1

Israeli university researchers demonstrate malware that makes a computer become a spying device

Top Priority Sector: 
cyber_security
Image Caption: 

Elovici

BEER-SHEVA, Israel, Nov. 22, 2016 Researchers at Ben-Gurion University of the Negev (BGU) have demonstrated malware that can turn computers into perpetual eavesdropping devices, even without a microphone.

In the new paper, “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit,” the researchers explain and demonstrate how most PCs and laptops today are susceptible to this type of attack. Using SPEAKE(a)R, malware that can covertly transform headphones into a pair of microphones, they show how commonly used technology can be exploited.

Homepage position: 
1
 

Recent Videos

“Varian’s Imaging Components business has a 50 plus year history of dedication to the imaging industry.”—Sunny Sanyal, Senior Vice President and...
IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile...