Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-02-16 09:59 AM

Chambers

HOUSTON, Feb. 15, 2017 An overwhelming majority (89%) of power and utility executives say their cybersecurity function does not fully meet their organization's needs, according to the EY Global...
Thu, 2017-02-16 09:55 AM

Reitinger

SAN FRANCISCO Feb. 14, 2017 – There is a fix that can prevent a great amount of email-born attacks on consumers and businesses. Unfortunately, the vast majority of public and private organizations...
Thu, 2017-02-16 09:51 AM
SAN RAMON, CA Feb. 14, 2017 ONVIF®, the leading global standardization initiative for IP-based physical security products, announced today that it will be presenting at TechSec Solutions 2017,...
Thu, 2017-02-16 09:47 AM

Hyman

WASHINGTON Feb. 15, 2017 CompTIA, the world's leading technology association, has named New Jersey Senator Cory Booker, Texas Representative Will Hurd, and North Carolina businessman Ron Culler the...
Thu, 2017-02-16 09:40 AM

Raz

TEL AVIV Feb. 12, 2017 CyKick Labs Ltd. reveals itself and its behavioral analytics-based web application security technology. CyKick Labs’ premier solution, Telepath, uses big data and proprietary...
Tue, 2017-02-14 08:16 AM
By Tom O’KeefeAs the federal government begins to incorporate mobile devices and the Internet of Things (IoT), security must be “baked in,” not “sprinkled on” as an afterthought to avoid hacking.That...
Fri, 2017-02-10 03:49 AM
PACIFIC GROVE, CA Feb. 7, 2017 Security Mentor, pioneer of innovative security awareness training that drives real behavior change, will be showcasing its industry-leading offerings at the RSA...
Fri, 2017-02-10 03:40 AM

Trzeciak

PITTSBURGH Feb. 8, 2017 The CERT Division of the Software Engineering Institute (SEI) at Carnegie Mellon University today announced the release of the fifth edition of the Common Sense Guide to...
Thu, 2017-02-09 02:49 PM

Brooks

Chuck Brooks, Vice President at Sutherland Government Solutions, and Chairman of The New Emerging Technologies Committee for CompTIA, was named winner of Cybersecurity Marketer of The Year at the...
Thu, 2017-02-09 02:46 PM
RA’ANANA, Israel Feb. 6, 2017 – Cyberbit, whose cybersecurity solutions protect the world’s most sensitive systems, and Ni Cybersecurity, the Japanese cybersecurity service provider, today announced...
Thu, 2017-02-09 02:43 PM
DULLES, VA Feb. 8, 2017 Raytheon Company (NYSE: RTN) and Utilidata have formed a strategic alliance to help power utilities proactively detect, defend against and respond to cyber threats.The effort...
Thu, 2017-02-09 02:37 PM
CAMBRIDGE, MA Feb. 7, 2017 Akamai Technologies, Inc. (NASDAQ: AKAM) today unveiled both a new product, Web Application Protector, and important new capabilities in its existing Kona Site Defender...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...