Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...


Tue, 2016-12-20 06:09 AM


SUNNYVALE, CA Dec. 13, 2016 RedSeal (, a leader in the cybersecurity analytics market, today released the results of a CEO study, which surveyed perceptions of – and confidence in –...
Tue, 2016-12-20 05:51 AM


CHANTILLY, VA Dec. 19, 2016 Vencore, Inc. announced today that its applied research organization, Vencore Labs, was awarded a $3.4 million contract by the U.S. Defense Advanced Research Projects...
Mon, 2016-12-19 11:36 AM
By Steve BittenbenderEditor, Government Security NewsChristmas came early for people worried about their online vulnerabilities as a leading cybersecurity firm launched a free solution Monday...
Mon, 2016-12-19 11:08 AM


ALEXANDRIA, VA Dec. 16, 2016 (ISC)²® is seeking speakers for the 5th annual (ISC)² CyberSecureGov, to be held May 9-11, 2017, at the Marriott Wardman Park in Washington, D.C. Themed "Educating the...
Fri, 2016-12-16 07:30 AM


FAIRFAX, VA Dec. 15, 2016 Salient CRGT, Inc., a leading provider of Agile software development, data analytics, mobility, cyber security, and infrastructure solutions, today announced that it is...
Thu, 2016-12-15 04:56 AM


NEW YORK Dec. 13, 2016 Headlines about hacking and malware prove that traditional security methods are not up to the task of protecting organizational infrastructures and data from theft and...
Thu, 2016-12-15 04:49 AM


BROOKLYN Dec. 9, 2016 When electronic voting machines came into use in the early 1990s, they made voting cheaper, easier, and more accessible to the electorate, but few programmers gave thought to...
Thu, 2016-12-15 04:37 AM


BOSTON, Dec. 14, 2016 Morphisec, leading developer of Moving Target Defense (MTD) cybersecurity products, today announces rapid global expansion including the opening of its U.S. operations located...
Thu, 2016-12-15 04:29 AM
HERNDON, VA Dec. 14, 2016 The MACH37 Cyber Accelerator has officially announced it will begin accepting applications from information security product startups and security entrepreneurs for its...
Thu, 2016-12-15 04:26 AM


IRVINE, CA Dec. 14, 2016 The year 2016 was definitely not the best year for cybersecurity. A series of headline-making breaches like those at MySpace, LinkedIn, Friend Finder Network and Mossack...
Thu, 2016-12-15 04:17 AM


By Steve BittenbenderEditor, Government Security NewsFor the second time in less than three months, Internet giant Yahoo revealed Wednesday evening that hackers had successfully intruded its systems...
Tue, 2016-12-13 05:31 AM


By Steve BittenbenderEditor, Government Security NewsSenate Majority Leader Mitch McConnell on Monday added his name to the list of Washington lawmakers saying an investigation into Russia’s...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition


Click Here

June 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers


Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...