Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Tue, 2015-01-13 07:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Mon, 2015-01-12 07:59 PM
Director James B. Comey has named Scott Bean special agent in charge of the FBI’s Administrative Division of the Washington Field Office (WFO). Bean most recently served as section chief for the...
Thu, 2015-01-08 03:59 PM
The Federal Aviation Administration (FAA) has issued a final rule that requires most U.S. commercial airlines to have Safety Management Systems (SMS) in place by 2018. The rule aims to build on the...
Tue, 2015-01-06 02:30 AM

Timothy DeFoggi

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison Monday for engaging in a child exploitation enterprise and...
Wed, 2014-12-24 12:21 AM

Lawrence Dietz

Cyber security is an all-engulfing term that has different meanings depending on the context. For example: cyber security in the utility industry is not like cyber security in the legal profession,...
Tue, 2014-12-23 07:10 PM

Sarah Saldana

In comments made following the confirmation of former U.S. Attorney Sarah R. Saldana of the Northern District of Texas as Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE), DHS...
Tue, 2014-12-23 05:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Mon, 2014-12-22 06:51 PM
Attorney General Eric Holder announced last week that the number of people in the adult correctional systems in the United States has fallen to its lowest level since 2003. The finding is highlighted...
Sun, 2014-12-21 10:19 PM
The U.S. Secret Service has supported Ugandan authorities in an operation in Kampala, Uganda, in which Ryan Gustafson, aka “Willy Clock,” a U.S. citizen currently residing in Uganda, was arrested and...
Thu, 2014-12-18 07:57 PM

Diego G. Rodriguez

Director James B. Comey has named Diego G. Rodriguez the assistant director in charge (ADIC) of the FBI’s New York Field Office. In this role, he will oversee all operations and personnel in the five...
Tue, 2014-12-16 07:18 PM
U.S. Customs and Border Protection (CBP) Tuesday launched the Border Wait Time app, aiming to make it easier for travelers to plan their trip across the border. The app provides estimated wait times...
Tue, 2014-12-09 06:33 PM
The FBI Monday released Hate Crime Statistics, 2013, the Uniform Crime Reporting (UCR) Program’s first publication to present data collected under the Matthew Shepard and James Byrd, Jr. Hate Crime...

Company News

San Francisco & Milpitas, June 3 – Visa Inc. (NYSE:V) and FireEye, Inc. (NASDAQ:FEYE) have announced their intention to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data. The first of its kind Visa and FireEye Community Threat Intelligence (CTI) offering will bring together threat information from both companies, allowing merchants and issuers to quickly detect and respond to attacks against their IT and payment infrastructure.
Los Altos, CA, Ramat Gan, Israel, June 4 – LightCyber, a provider of Active Breach Detection solutions, has announced that network security business luminary Shlomo Kramer has joined its board of directors. Kramer is best known as the co-founder of Check Point Software, founder and CEO of Imperva, early investor and board member of Palo Alto Networks from 2006 to 2012, and early investor in Trusteer (recently acquired by IBM). Kramer also made an equity investment in LightCyber.
London, June 2 – Infosecurity Europe – Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today.
Dallas, June 3 – Zix Corporation (ZixCorp), (NASDAQ: ZIXI), brings awareness to the insecurity of email by showcasing an email hack by former blackhat and world famous hacker Kevin Mitnick. During the recording, Mitnick will demonstrate one method used by hackers to intercept email and steal valuable company or personal data, leveraging resources available for just a few hundred dollars. “Hackers want to get access to email. They can intercept your email all the time, and you’re clueless,” said Mitnick. “The only way to protect your communications is encryption.”
Fairfax, VA, June 3 – Logos Technologies has announced its new compact, ultra-lightweight, wide-area motion imagery (WAMI) sensor system, 
Newton, MA, June 2 – CyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, has announced an independent study from Nucleus Research on customer return on investment (ROI).
Zug, June 2 – Allied World Assurance Company Holdings, AG announced today that Allied World North America has launched Allied World // FrameWRX℠ (“FrameWRX”), a prescriptive and proactive cyber risk management solution designed to empower companies to address this challenging area of exposure head on.
Parsippany, NJ, June 1 – Vanderbilt Industries, a global provider of technologies that help organizations ensure safety and security, has announced that it has completed the acquisition of the Security Products business from Siemens.

Commentary and Opinions

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...