Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-01-19 07:04 AM

Deaver

SAN DIEGO Jan. 16, 2017 Certitude Digital, Inc. announced today the release of a proof of concept application demonstrating their patent-pending, keyless, asset-centric, digital security AMULET...
Thu, 2017-01-19 07:00 AM

Skerly

PHOENIX Jan. 16, 2017 Threats from hackers and insiders who want access to precious data from companies are too many to mention. That’s why CyberTrails has built a team of cyber security...
Thu, 2017-01-19 06:55 AM
HERNDON, VA Jan. 17, 2016 According to Deltek's new GovWin IQ report – Defense IT: Priorities and Strategies, 2017 and Beyond – rapidly shifting cyber threats are driving the Department of Defense's...
Thu, 2017-01-19 06:51 AM
ALEXANDRIA, VA Jan. 17, 2017 – (ISC)²® has appointed Leo F. Scanlon, CISSP, as co-chair of the (ISC)² U.S. Government Advisory Council (USGAC). Mr. Scanlon is the Deputy CISO, U.S. Department of...
Wed, 2017-01-18 08:31 AM

Manning

By Steve BittenbenderEditor, Government Security NewsPresident Obama saved one of his most controversial decisions for one of his last, commuting the sentence Tuesday of a soldier convicted of...
Thu, 2017-01-12 06:50 AM

Cummings

WASHINGTON, D.C.—Jan 6, 2017, Rep. Eric Swalwell (CA-15), the Ranking Member of the CIA Subcommittee of the House Permanent Select Committee on Intelligence, and Rep. Elijah Cummings (MD-07), the...
Thu, 2017-01-12 06:35 AM

Pappas

COLUMBIA, MD Jan. 10, 2017 Chiron Technology Services, Inc. ("Chiron") pronounced 'Kai-ron', an infosec engineering and training firm based in Columbia, Maryland, today announced it has been awarded...
Thu, 2017-01-12 06:32 AM

Hibbert

PHOENIX Jan. 11, 2017 BeyondTrust, the leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced the Retina IoT (RIoT) Scanner. Powered...
Thu, 2017-01-12 06:24 AM

Misenar

BETHESDA, MD Jan. 9, 2017 SANS Institute, the global leader in information security training, today announced cyber security expert, Seth Misenar will present at SANS San Jose 2017 taking place March...
Thu, 2017-01-12 06:15 AM

Doherty

SAN JOSE, CA Jan. 10, 2017 Silicon Valley analytic software firm FICO today announced a strategic alliance with enterprise security firm TSC Advantage that will help companies better assess their...
Thu, 2017-01-12 06:12 AM

Cullina

SCOTTSDALE, AZ and PROVIDENCE, RI Jan. 11, 2017 Today IDT911 has changed its name to CyberScoutTM (www.cyberscout.com/), reaffirming its mission to keep a watchful eye over its clients in a dangerous...
Fri, 2017-01-06 07:23 AM

McCain

By Steve BittenbenderEditor, Government Security NewsOn Thursday, members of the Senate Armed Services Committee met for the first time since the presidential election to gather testimony regarding...

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...