Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...


Wed, 2015-03-11 09:39 PM
Washington, March 11 -- The Federal Bureau of Investigation (FBI) is commemorating its Ten Most Wanted Fugitives program, created 65 years ago.
Wed, 2015-03-11 01:29 AM
Next Tuesday, port executives, government leaders and other key stakeholders will meet at Port Canaveral, FL, to discuss the threat of nuclear materials in ship cargo containers and other pressing...
Sun, 2015-03-08 02:21 PM
An indictment was unsealed last week against two Vietnamese citizens who resided in the Netherlands, for their roles in hacking email service providers throughout the U.S. The guilty plea of one of...
Tue, 2015-03-03 03:44 AM
FBI Director James B. Comey has named Angela Byers special agent in charge of the FBI’s Cincinnati Division. Byers most recently served as chief of the Financial Crimes section in the Criminal...
Thu, 2015-02-26 09:53 PM
We are members of a non-partisan group of former government officials and policy experts in the fields of national security and counterterrorism. At a time when the threats to the homeland are...
Thu, 2015-02-26 01:39 AM
President Obama Wednesday directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be a national intelligence center...
Wed, 2015-02-25 07:37 PM
The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, has announced a reward of up to $3 million for...
Thu, 2015-02-19 08:26 PM
A multinational gang of cyber criminals has stolen up to $1 billion from about 100 international banks over the past two years, according to an announcement earlier this week from the Russian...
Tue, 2015-02-17 05:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Mon, 2015-02-16 10:27 PM
Director James B. Comey has named John S. Adams the special agent in charge of the FBI’s Norfolk Division. Adams most recently served as deputy assistant director of the Counterterrorism Division (...
Sun, 2015-02-15 08:55 PM
The White House has issued a Presidential Memorandum to promote economic competitiveness and innovation while safeguarding privacy, civil rights, and civil liberties in the domestic use of unmanned...
Tue, 2015-02-10 09:23 PM
Director James B. Comey has named Richard Frankel special agent in charge (SAC) of the FBI’s Newark Division. Frankel most recently served as SAC of the Criminal Division in the New York Field Office.

Commentary and Opinions

The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

Company News

Gaithersburg, MD, August 10 - The Department of Homeland Security (DHS) has accredited Lockheed Martin as a Commercial Service Provider (CSP) under DHS’ Enhanced Cybersecurity Services (ECS) program. The accreditation allows DHS to share sensitive and classified cybersecurity threat information with Lockheed Martin to support its efforts in defending public and private entities against cyber attacks. The Lockheed Martin ECS system will quarantine compromised e-mail and block malicious DNS requests based on DHS supplied cyber threat intelligence.
San Francisco, CA, Aug. 10 - Black Hat, one of the world's leading family of information security events, today highlights some of the special events and initiatives that helped make Black Hat USA 2015 a record-breaking show. In its 18th year, the event welcomed more than 11,000 of the most security-savvy professionals across the InfoSec spectrum – spanning academia, world-class researchers, and leaders in the public and private sectors.
Alexandria, VA, Aug. 4 - BitVoyant LLC, a leading-edge provider of proactive cyber defense solutions, announced today that it has appointed Jared Novick as CEO of the company. Novick comes to BitVoyant from the National Security community with a unique track record in transitioning sensitive technologies from the government world to the private sector. With his experience in managing public-private partnerships, he is the perfect addition to the organization to help bring BitVoyant technology to the commercial market from the government sector.
St. Petersburg, FL, - In a new development for the General Services Administration (GSA) government buyers have begun implementing a new way to evaluate a contractor’s performance on active contracts. The GSA has started using what they like to call “Objective Scorecards” in order to increase the speed and efficiency of the way contractors are graded for their work. Every scorecard allows each contractor to grade themselves based on a variety of criteria. This score is then incorporated to the overall evaluation conducted by the government buyer who awarded the contract.
Washington, DC, July 28 – Clarion Events announces today the acquisition of two events, Border Security Expo and the US/Canada Border Conference, FROM Eagle Eye Expositions, effective immediately.  
Melville, NY, July 20, 2015 - Comtech Telecommunications Corp. announced today that its Maryland-based subsidiary, Comtech Mobile Datacom Corporation, received an additional $5.3 million of funding for its previously announced three-year sustainment contract to support the U.S. Army's Force XXI Battle Command Brigade and Below - Blue Force Tracking ("BFT-1") program, a battle command real-time situational awareness and control system. “We are pleased to receive this additional funding and the opportunity to continue to provide our support for the U.S. Army.”
Waterloo, Ontario, July 22 – BlackBerry Limited, a global leader in secure mobile communications, today announced that it has entered into a definitive agreement to acquire AtHoc. Terms of the transaction were not disclosed. 
PALMDALE, Calif., July 20, 2015 - Northrop Grumman Corporation, demonstrated in recent test flights that the U.S. Air Force's Open Mission Systems (OMS) architecture standards can be successfully integrated across multiple systems and platforms. These flights have paved the way for new capabilities to be integrated rapidly and affordably across advanced manned and unmanned aircraft.

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition

Click Here

Digital Version of May/June 2015
Print Edition


Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers


Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.