Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Sun, 2015-11-08 03:40 PM
Washington, DC, November 5 - In 2011, a small group of university researchers working on securing embedded devices caught the attention of the Department of Homeland Security (DHS) Science and...
Thu, 2015-10-29 03:24 PM

Dr. Greg Shannon

Washington, DC, October 29 - Dr. Greg Shannon, an IEEE senior member and cybersecurity expert from Carnegie Mellon University (CMU), recently began an assignment in the White House Office of...
Thu, 2015-10-22 10:27 AM

Jeh Johnson, DHS

Washington, DC, October 8 - “Chairman Johnson, Senator Carper, and members of the Committee, thank you for the opportunity to be here. I welcome the opportunity to appear before you with Directors...
Wed, 2015-10-21 10:49 AM

Gen. Carlisle, commander of Air Combat Command

Hill Air Force Base, UT, - Base officials and the Top of Utah community officially welcomed the F-35 Lightning II at a ceremony here Oct. 14, an event that formally marked the beginning of F-35...
Tue, 2015-10-20 07:52 PM

RDML Paul Thomas

Written testimony of USCG Assistant Commandant for Prevention Policy RDML Paul Thomas titled “Protecting Maritime Facilities in the 21st Century: Are Our Nation’s Ports at Risk for a Cyber-Attack?”
Mon, 2015-10-19 11:06 AM

Xiaokui Shu and Daphane Yao

Blacksburg, VA, Octobeer 15 - Imagine millions of lines of instructions. Then try and picture how one extremely tiny anomaly could be found in almost real-time and prevent a cyber security attack. A...
Mon, 2015-10-19 10:55 AM
Washington, DC, October 12 - The Library of Congress has released a Request for Information (RFI) in support of reviewing and potentially expanding its advanced threat detection and response...
Wed, 2015-10-14 11:12 PM

2010 Keynote Speaker: Ret. 4-Star General Barry McCaffrey

GSN announced today that in response to a number of requests to stretch the closing date for entries in its 2015 Homeland Security Awards Program, the deadline has been extended to Friday, October 23...
Wed, 2015-10-14 01:52 PM
Miami, FL, October 12 - Researchers from FIU's College of Engineering and Computing have teamed up with four other universities and a utility company to help safeguard the nation's power utilities...
Sat, 2015-10-10 01:22 PM

Tim Rains, Microsoft

New York, NY, October 8 - On October 14, the New York Metro Joint Cyber Security Conference (NYMJCSC) will hold its 2nd annual cybersecurity conference at the Microsoft Technology Center, 11 Times...
Thu, 2015-10-08 06:53 PM

Muneeb and Sohaib Akhter

October 2 - Twin brothers Muneeb and Sohaib Akhter, 23, of Springfield, Virginia, were sentenced today for conspiracy to commit wire fraud, conspiracy to access a protected computer without...
Thu, 2015-10-08 12:26 AM
By Cheryl Pellerin  Washington, DC, September 29 - Defense and deterrence are two of the highest priorities for bolstering the nation’s cybersecurity capabilities, top officials from the Defense...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
 

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

 

Click Here

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

August 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...