Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Sat, 2016-02-06 11:53 AM


San Mateo, CA, February 2 - The Bay Area chapters of ISSA and InfraGard are pleased to extend an invitation for professionals interested in Internet security issues to attend the Cornerstones of...
Thu, 2016-02-04 12:22 PM
Tenafly, NJ, January 28 - Security Current, an information and collaboration company by CISOs for CISOs, has published a collection of leading Chief Information Security Officer's (CISOs) insights on...
Tue, 2016-02-02 01:46 PM
By Steve Bittenbender The Armed Forces Communications and Electronics Association has announced a new location for the Defensive Cyber Operations Symposium this year. For 2016, the annual event will...
Sun, 2016-01-24 08:21 PM
GSN is pleased to announce that its 2015 Digital Yearbook of Awards Winners has been released to the entire database of the company’s print, digital and newsletter subscribers. The Yearbook covers...
Fri, 2016-01-22 03:05 PM

Christos Dimitriadis, ISACA

Close to two-thirds (63%) of global IT professionals oppose giving governments backdoor access to encrypted information systems, and similar numbers (59%) feel that privacy is being compromised in an...
Tue, 2015-12-22 09:00 AM

Rep. Bennie G. Thompson 

Washington, DC, December 17 - Today, Rep. Bennie G. Thompson (D-MS), Ranking Member of the Committee on Homeland Security, released the below statement on the Cybersecurity Act of 2015, legislation...
Sun, 2015-12-20 03:10 PM

Rep. Bennie G. Thompson

Washington, DC, December 17 - Today, Rep. Bennie G. Thompson (D-MS), Ranking Member of the Committee on Homeland Security, released the below statement on the Cybersecurity Act of 2015, legislation...
Wed, 2015-12-09 01:53 PM

Congressmen Jim Langevin

Washington, DC, December 2 - Congressmen Jim Langevin (D-RI) and Randy Forbes (R-VA) today applauded passage of the Cybercrime Anti-Resale Deterrent and Extraterritoriality Revision (CARDER) Act by...
Tue, 2015-12-08 11:09 AM
Washington, DC, December 3 - The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) today announced the award of five contracts totaling $7.8 million for research on...
Tue, 2015-11-17 11:46 PM
Government Security News is pleased to announce the Winners and Finalists in its seventh annual Homeland Security Awards. As in previous years, the awards program was divided into three basic...
Tue, 2015-11-17 01:21 PM
November 17, 2015 — 17 months after successfully launching its first virtual career fair, the SANS CyberTalent Fair (SCTF) is back and poised to launch its fourth online nationwide...
Sun, 2015-11-08 02:40 PM
Washington, DC, November 5 - In 2011, a small group of university researchers working on securing embedded devices caught the attention of the Department of Homeland Security (DHS) Science and...

Commentary and Opinions

Fairfax, VA, Jan. 27 - As much as 80 percent of the cyber threats the American public faces today stem from poor or non-existent computer hygiene. U.S. adversaries are using this malady to their strategic advantage and systematically degrading the national infrastructure. They are subverting U.S. economic and military superiority; eroding citizens' confidence in the government's ability to protect and defend the nation; and, ultimately, turning back the clock on American prosperity.
By Wallace Sann, public sector Chief Technology Officer, ForeScout Technologies, Inc.
Washington, DC, December 22 - As many Americans get ready to ring in the New Year, they are also setting goals for health, happiness and professional success in 2016. With the average adult spending more than 11 hours each day connected to electronic media – watching TV, listening to the radio or using smartphones and other connected devices – setting resolutions to safeguard our digital lives is an important and necessary step in our shared responsibility to protect the Internet.[1]
Washington, DC, December 10 - Content theft sites pose a serious and growing threat to Internet users by exposing them to harmful malware that can lead to identity theft, financial loss and computers being taken over by hackers, according to Digital Bait - a new research report commissioned by the Digital Citizens Alliance.
Portland, OR, December 10 - In hoping to never become a breach victim, organizations never prepare for the inevitable breakdown and overlook a very basic solution – capturing and retaining all network data. Cybersecurity equipment is tasked with keeping the bad packets out, but the challenge is how to do this in a fraction of a second. It is a costly folly to expect 100% accuracy, given the minimal time available for inspection. If organizations could gain more time for packet examination, they can turn the tables.

Company News

Boise, ID, February 3 - Cybercrime is the fastest growing area of crime in the world. The demand for cyber security professionals is higher than ever. To help solve these critical issues, Richard Plummer, CEO of Cyber Crime Forensics, LLC is launching the Cybercrime Forensics Training Center in Boise Idaho, to train a new breed of cyber warriors. CCFTC provides the world's best digital forensics and cyber security training to produce the most advanced digital forensics experts in computer forensics, incident response and media exploitation.
Cleveland, OH, January 25 - Certified Security Solutions, Inc. (CSS), a global leader in enabling secure digital identity and access solutions for the Internet of Things (IoT) and the enterprise announced that it has gained its 150th Fortune 500 ranked client.
Redwood Shores, CA, January 27 - iSheriff, a leading cloud security company, today announced the release of iSheriff Complete, a comprehensive cyber security platform designed to provide 360-degree protection of an organization’s devices and communication channels. iSheriff Complete is the industry’s first comprehensive cloud security platform that provides fully-integrated endpoint, Web and email security, delivered through a single Web-based management console with a single set of enforceable security policies.
January 25 - CYBERBIT, Elbit Systems’ wholly-owned subsidiary, announced today that it uncovered for the first time, the Dridex malware’s advanced and sophisticated persistency mechanism, allowing organizations to detect and remove the malware.
Columbus, OH, January 21 - Battelle will continue to support key Department of Defense (DoD) priorities having been awarded the Defense Technical Information Center (DTIC) Cyber Security and Information Systems Technical Area Tasks (CS TAT) five-year, $5 billion Indefinite Delivery, Indefinite Quantity (IDIQ) contract. The new contract, awarded last month, is a successor contract of the Software Networks Information Modeling and Simulation $2 billion DTIC IDIQ contract and will include work similar in scope.
Irvine, CA, January 19 - Cylance, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, today announced that it has retained RiceHadleyGates LLC to advise the company on a range of strategic cybersecurity issues related to global deployment of its highly sophisticated cybersecurity solutions.
Herndon, VA, January 13 - Sotera Defense Solutions (Sotera), a provider of mission-critical, technology-based systems, solutions and services for national security agencies and programs of the U.S. government, was recently awarded a $89 million Task Order by the U.S. Army's Intelligence and Security Command (INSCOM) Headquarters and 1st Information Operations (IO) Command for Information Operations Support.
Boulder, CO, January 12 - LogRhythm, The Security Intelligence Company, today announced that its LogRhythm v6.3.4 SIEM platform has been awarded the National Information Assurance Partnership (NIAP) Common Criteria Certification # 10645 against the U.S. Government approved Protection Profile for Network Devices Version 1.1. As a result, it meets the strict security requirements of all government agencies, which can now deploy LogRhythm to detect, defend against and respond to increasingly sophisticated cyber threats.
 

The GSN 2015 Digital Yearbook of Awards

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Digital Version of November/December 2015 Print Edition

 

Click Here

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Market Sectors

Technology Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.