Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2013-05-16 10:35 AM
The President’s National Security Telecommunications Advisory Committee will meet in both closed and open sessions in Washington, DC, on May 22 to discuss nation-state capabilities and strategic...
Thu, 2013-05-16 08:42 AM

Scott Stevens

When Dell began nearly 30 years ago, it built its initial reputation as a lean-and-mean supplier of personal computers. Over the years, it expanded its portfolio to include desktops, laptops, servers...
Fri, 2013-05-10 04:16 PM
Recognizing that the free availability of various chunks of federal government data can spur the development of new, job-producing entrepreneurial ventures -- just as the availability of government...
Wed, 2013-05-08 02:48 PM
The Internet Crime Complaint Center, a partnership between the FBI and the National White Collar Crime Center, announced on May 8 that it has received numerous reports of phishing attacks targeting...
Mon, 2013-05-06 10:22 AM
The U.S. Secret Service wants to extend by two or three months a contract it currently has with EMW, Inc., of Herndon, VA, for the company to continue providing mainframe and helpdesk support...
Thu, 2013-05-02 01:51 PM

Sen. Tom Carper

The chairman of the Senate Homeland Security and Governmental Affairs Committee has written a 9-page letter to the chairman and ranking member of the Senate Appropriations subcommittee on homeland...
Wed, 2013-05-01 06:03 PM
Sunnyvale, CA-based Objectivity, Inc., a provider of object and graph databases, has announced that Georgetown University has selected its technologies to power big data analytics for addressing...
Wed, 2013-05-01 05:47 PM
As TSA makes the transition from its current OASIS blanket purchase agreement, for which the sole incumbent contractor is IBM Corp., to its new OASIS II blanket purchase agreement, on which IBM, BAE...
Tue, 2013-04-30 10:56 AM

Michelle Obama

Speaking at the White House Forum on Military Credentialing and Licensing, First Lady Michelle Obama announced on April 29 the “IT Training and Certification Partnership,” a new public-private...
Tue, 2013-04-30 09:42 AM

Meeting space at
U.S. Access Board

NIST’s information security and privacy advisory board, which advises the secretary of commerce and NIST director about security and privacy issues related to federal computer systems, will hold a...
Thu, 2013-04-25 03:59 PM
Following up on a record number of entries and a rousing awards dinner at the Washington, DC Convention Center in 2012, Government Security News has announced that its 2013 Homeland Security Awards...
Wed, 2013-04-24 11:44 AM
Symantec has been identified as the only possible software supplier and GTSI, of Herndon, VA, has been named as the only installation contractor that can provide “continuity of the services requested...

Commentary and Opinions

Federal, state and local government agencies are increasingly under pressure to satisfy information security requirements for multiple regulatory mandates, including FISMA, FIPS, HIPAA and others. One of the thorniest compliance issues facing agencies is maintaining continuous data protection for laptops in the field.
The Department of Homeland Security recently announced plans to hire 1,000 cyber security experts over the next three years. The decision signals the seriousness with which DHS takes the cyber threat. But there is a problem. DHS stands no chance of meeting its goal.
On Friday, May 29, 2009, President Barack Obama made a landmark decision, announcing he will create a Cybersecurity Coordinator, reporting to both the National Security Council (NSC) and the National Economic Council (NEC), and he also released the Cyberspace Policy Review. This decision was an outcome of the 60-day review conducted by Melissa Hathaway, acting senior director for cyberspace at the NSC, after countless interviews and requests for comments from public and private sector entities. This is the first administration to designate cybersecurity as a key management priority.
 

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...