Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2016-11-10 12:15 AM

Trump

By Steve BittenbenderEditor, Government Security NewsDonald Trump’s victory in Tuesday’s Presidential election came to some as a surprise, and in the hours after the Republican businessman defeated...
Mon, 2016-11-07 05:22 AM

Dar

HAIFA, Israel, Nov. 6, 2016 Elbit Systems Ltd. (NASDAQ and TASE: ESLT) ("Elbit Systems"), announced today that its subsidiary, CYBERBIT Ltd. ("CYBERBIT"), was awarded a contract to supply its...
Fri, 2016-11-04 07:33 AM
By James Scott, Sr. Fellow, ICIT and Drew Spaniel, Fellow, ICIT‘Clunky as Heck’ and Security via Obscurity Create Only an Illusion of Secure Elections“Election Officials, consider your voting...
Fri, 2016-11-04 07:17 AM

Schneider

FRAMINGHAM, MA Nov. 1, 2016 CyberX, the industrial cybersecurity company protecting critical infrastructures worldwide, today announced that it has been named a SINET 16 Innovator Award winner.CyberX...
Fri, 2016-11-04 06:20 AM

Fant

FALLS CHURCH, VA Oct. 31, 2016 Noblis, Inc., a leading provider of science, technology, and strategy services, is pleased to announce that its subsidiary Noblis NSP has added two new Directors, John...
Tue, 2016-11-01 05:47 AM

Ackerman

FAIRFAX, VA Oct. 28, 2016 Disruptive incidents such as the recent distributed denial of service (DDoS) attack on Internet performance management company Dynamic Network Services Inc., (Dyn) that...
Mon, 2016-10-31 05:52 AM

Veith

MCLEAN, VA Oct. 27, 2016 Booz Allen has issued the following statement on its actions following the arrest of a former employee, from Craig Veith, Vice President, External Relations:
Thu, 2016-10-27 08:30 AM

Lynn

FAIRFAX, VA Oct. 26, 2016 From his earliest days as Defense Information Systems Agency director, Lt. Gen. Alan R. Lynn, USA, has emphasized the importance of the military partnering with industry to...
Wed, 2016-10-26 04:56 AM

Cummins

LONDON, Oct. 25, 2016 The future of cyber security in the rail industry will be discussed at the upcoming Rail Cyber Security Summit, taking place in London in March 2017.Now in its second year, the...
Tue, 2016-10-25 03:41 AM

Waddell

ALEXANDRIA, VA Oct. 24, 2016 (ISC)²® (“ISC-squared”) today announced a series of recommendations for the recently appointed federal chief information security officer (CISO) to consider in order to...
Mon, 2016-10-24 06:02 AM

York

By Steve BittenbenderEditor, Government Security NewsA New Hampshire company that helps control and direct traffic for numerous Internet sites was the target for Friday by cybercriminals, who...
Mon, 2016-10-24 04:02 AM

Carson

WASHINGTON and ATLANTA Oct. 21, 2016 Envistacom is opening an engineering and innovation center in Duluth, Georgia, to expand research and development for communications and counterterrorism...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
 

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...