Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...


Sat, 2015-10-10 01:22 PM

Tim Rains, Microsoft

New York, NY, October 8 - On October 14, the New York Metro Joint Cyber Security Conference (NYMJCSC) will hold its 2nd annual cybersecurity conference at the Microsoft Technology Center, 11 Times...
Thu, 2015-10-08 06:53 PM

Muneeb and Sohaib Akhter

October 2 - Twin brothers Muneeb and Sohaib Akhter, 23, of Springfield, Virginia, were sentenced today for conspiracy to commit wire fraud, conspiracy to access a protected computer without...
Thu, 2015-10-08 12:26 AM
By Cheryl Pellerin  Washington, DC, September 29 - Defense and deterrence are two of the highest priorities for bolstering the nation’s cybersecurity capabilities, top officials from the Defense...
Tue, 2015-10-06 01:09 PM
Lyon, France – Interpol and the US Federal Bureau of Investigation (FBI) are to forge closer ties in combating organized crime and terrorism in the face of an ever-increasing number and range of...
Thu, 2015-10-01 05:01 PM

Alejandro Mayorkas

Washington, DC, October 1 - The Department of Homeland Security (DHS) today announced the kick-off of National Cyber Security Awareness Month 2015. During this month, outreach efforts will aim to...
Thu, 2015-10-01 04:46 PM

Christos Dimitriadis

Rolling Meadows, IL, September 24 - A survey of more than 900 cybersecurity experts shows that an overwhelming majority (87%) expect to see an increase in mobile payment data breaches over the next...
Wed, 2015-09-16 11:47 AM
The accountant for a U.S. company recently received an e-mail from her chief executive, who was on vacation out of the country, requesting a transfer of funds on a time-sensitive acquisition that...
Tue, 2015-09-15 05:04 PM
Washingston, DC, September 1 - The U.S. Office of Personnel Management (OPM) and the U.S. Department of Defense (DoD) today announced the award of a $133,263,550 contract to Identity Theft Guard...
Sun, 2015-09-13 12:07 PM

Dr. Andy Ozme

Dr. Andy Ozment, Asst. Sec. Cybersecurity and Communications
Thu, 2015-09-10 12:19 PM
FBI Director James B. Comey has named Aristedes Mahairas as the special agent in charge of the Special Operations/Cyber Division of the New York Field Office. Mr. Mahairas most recently served as the...
Wed, 2015-09-02 11:49 AM
San Francisco, CA, September 2 - Today, Black Hat, the world's leading family of information security events, highlights the first 20 high-intensity Briefings selected for Black Hat Europe 2015...
Wed, 2015-09-02 11:35 AM
Washington, DC, September 1 - October 1 marks the start of the 12th annual National Cyber Security Awareness Month (NCSAM), led by the National Cyber Security Alliance (NCSA), the nation's leading...

Commentary and Opinions

By Jason Hart, Vice President and CTO for Data Protection at Gemalto
Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.
By Austin MartinIf you’ve ever wondered whether or not the Army is just like World of Warcraft, the answer is: kinda. It turns out that all branches of the military are experimenting with some special form of LMS or virtual training – with ever-increasing complexity and capabilities. Here are just a few examples: Battlefield Visualization
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.

Company News

McLean, VA, October 7 - To help Federal agencies stay ahead of evolving Cyber security threats, the Department of Homeland Security (DHS) and the General Services Administration’s Federal Systems Integration and Management Center (GSA FEDSIM) have selected Booz Allen Hamilton to fulfill Task Order 2D of the Continuous Diagnostics and Mitigation program (CDM Task Order 2D). The contract – valued at $82.9 million over three years – is the second CDM Task Order award for Booz Allen under the DHS CDM Program.
San Diego, CA, October 12 - The cybersecurity partnership of CyberUnited LIFARS has announced a new agreement with the London-based global risk management firm of red24 to provide a full complement of cybersecurity business intelligence, digital forensics, and incident response capabilities.
New York, NY, October 1 -Nativeflow, a market leader in mobile application protection, announced today that mobile app owners who use AppDome, its dynamic application security wrapper, can consider their mobile app immune to the XcodeGhost attack vector.
McLean, VA, September 23 - In combat, warfighters rely on intelligence, surveillance and reconnaissance (ISR) systems for situational awareness, tactical communications and target tracking. To support the need for more advanced ISR capabilities, Alion Science and Technology, a global engineering, technology and operational solutions company, has been awarded an indefinite delivery/indefinite quantity contract valued at $49 million by the Naval Surface Warfare Center (NSWC) Crane for its Surveillance and Reconnaissance Systems Division (SRSD).
Augsburg, Germany, September 24 – Kontron, a global market leader for embedded computing technology (ECT) today announced that several commercial airlines and business jet customers plan to deploy the company’s next-generation avionics products.  Kontron’s recent launch of its ACE Flight Server 4600 featuring a 4G LTE modem for enhanced ground connectivity and its Cab-n-Connect™ A100 wireless access point (CWAP) that forms the backbone of onboard Wi-Fi systems has resulted in multiple planned aircraft installations.  These advanced products are backed by Kontron’s more
Arlington, VA – September 24, 2015 – ThreatConnect, Inc., creator of the most widely adopted Threat Intelligence Platform (TIP), and open source cyber intelligence company Defense Group Inc. (DGI) today unveiled a report attributing a sophisticated cyber espionage campaign, orchestrated by an Advanced Persistent Threat (APT) group known as “Naikon,” with interests in the South China Sea to a Chinese People’s Liberation Army (PLA) unit.
Austin, TX, September 23 - Raytheon|Websense, a global leader in protecting organizations from the latest cyber-attacks and data theft, today announced the findings of the Websense Security Labs™ 2015 Healthcare Drill-Down Report, examining the current state of cyber threats and data-stealing attacks against an increasingly digital healthcare industry. The report reveals that healthcare is highly-targeted and increasingly vulnerable as the next wave of connected devices hits an already complex technology environment. 
Reston, VA, September 24, 2015 - NCI, Inc., a leading provider of information technology (IT) and professional services and solutions to U.S. Federal Government agencies, announced today it was awarded a cost-plus-fixed-fee task order valued at $14.5 million to provide a diverse range of engineering, architecture, integration and readiness support services to the U.S. Army Central Technical Support Facility at Fort Hood, Texas.

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition

Click Here

Digital Version of May/June 2015
Print Edition


Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers


Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.