Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

IT Security

BlackBerry acquiring AtHoc to enable secure mass communication and collaboration

Top Priority Sector: 
communications

Waterloo, Ontario, July 22 – BlackBerry Limited, a global leader in secure mobile communications, today announced that it has entered into a definitive agreement to acquire AtHoc. Terms of the transaction were not disclosed. 

Homepage position: 
1

Northrop Grumman demonstrates open mission systems architecture across manned and unmanned systems

Top Priority Sector: 
airport_aviation_security

PALMDALE, Calif., July 20, 2015 - Northrop Grumman Corporation, demonstrated in recent test flights that the U.S. Air Force's Open Mission Systems (OMS) architecture standards can be successfully integrated across multiple systems and platforms. These flights have paved the way for new capabilities to be integrated rapidly and affordably across advanced manned and unmanned aircraft.

Homepage position: 
10

Lockheed purchase of Sikorsky Aircraft may lead to spin off or sale of IT services

Top Priority Sector: 
airport_aviation_security
Image Caption: 

Marillyn Hewson

By Steve Bittenbender

Primed by its $9 billion purchase of Sikorsky Aircraft from United Technologies Corp., Lockheed Martin announced Monday it also would begin a strategic review of its information technology solutions offerings, saying it could break off the part of the company that handles IT for the civilian government sectors.

Homepage position: 
10

Avwatch MANET surveillance solution allows law enforcement air and ground vehicles to view capture of felon from 40 miles away

Top Priority Sector: 
law_enforcement_first_responders

Plymouth, MA, Issued July 17, 2015… Avwatch, Inc.’s (www.avwatch.us) proven network communications technology, which has supported the efforts of firefighters in the West for the past six years, was recently deployed by a Western state law enforcement agency, allowing law enforcement officials to view, remotely and in real-time, the capture of a felon from as far as 40 miles away.

Homepage position: 
10

Varonis Systems software now available on DHS/GSA contract

Top Priority Sector: 
cyber_security

NEW YORK, July 20, 2015 - Varonis Systems, Inc., a leading provider of software solutions for unstructured, human-generated enterprise data, today announced that it has been added to the U.S.

Homepage position: 
1

Protection against IRS and OPM-type hacks available to government agencies but not always used

Top Priority Sector: 
cyber_security

Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.

Homepage position: 
1

New Norse Live Attack Map opens window Into global cyber attacks in real time

Top Priority Sector: 
cyber_security

Foster City, CA, July 16 – Norse, a provider of live attack intelligence, has announced the next-generation version of its popular 

1

How the military is utilizing online, interactive training

Top Priority Sector: 
military_force_protection
Image Caption: 

Austin Martin

By Austin Martin

If you’ve ever wondered whether or not the Army is just like World of Warcraft, the answer is: kinda. It turns out that all branches of the military are experimenting with some special form of LMS or virtual training – with ever-increasing complexity and capabilities.

Here are just a few examples:

Battlefield Visualization

Homepage position: 
1

IOActive joins the Institute for Critical Infrastructure Technology

Top Priority Sector: 
cyber_security

Seattle, WA, July 15 – IOActive, Inc., the worldwide provider of research-driven security services, has announced that it has become a member of the Institute for Critical Infrastructure Technology (ICIT).

IOActive will be instrumental in helping the ICIT strengthen its advisory services in areas related to Smart Cities, including cyber security around Internet of Things (IoT), including vehicles, smart grids, and devices.

Homepage position: 
1