Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Wed, 2015-03-11 12:29 AM
Next Tuesday, port executives, government leaders and other key stakeholders will meet at Port Canaveral, FL, to discuss the threat of nuclear materials in ship cargo containers and other pressing...
Sun, 2015-03-08 01:21 PM
An indictment was unsealed last week against two Vietnamese citizens who resided in the Netherlands, for their roles in hacking email service providers throughout the U.S. The guilty plea of one of...
Tue, 2015-03-03 02:44 AM
FBI Director James B. Comey has named Angela Byers special agent in charge of the FBI’s Cincinnati Division. Byers most recently served as chief of the Financial Crimes section in the Criminal...
Thu, 2015-02-26 08:53 PM
We are members of a non-partisan group of former government officials and policy experts in the fields of national security and counterterrorism. At a time when the threats to the homeland are...
Thu, 2015-02-26 12:39 AM
President Obama Wednesday directed the Director of National Intelligence (DNI) to establish the Cyber Threat Intelligence Integration Center (CTIIC). The CTIIC will be a national intelligence center...
Wed, 2015-02-25 06:37 PM
The Federal Bureau of Investigation (FBI), in partnership with the U.S. Department of State’s Transnational Organized Crime (TOC) Rewards Program, has announced a reward of up to $3 million for...
Thu, 2015-02-19 07:26 PM
A multinational gang of cyber criminals has stolen up to $1 billion from about 100 international banks over the past two years, according to an announcement earlier this week from the Russian...
Tue, 2015-02-17 04:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Mon, 2015-02-16 09:27 PM
Director James B. Comey has named John S. Adams the special agent in charge of the FBI’s Norfolk Division. Adams most recently served as deputy assistant director of the Counterterrorism Division (...
Sun, 2015-02-15 07:55 PM
The White House has issued a Presidential Memorandum to promote economic competitiveness and innovation while safeguarding privacy, civil rights, and civil liberties in the domestic use of unmanned...
Tue, 2015-02-10 08:23 PM
Director James B. Comey has named Richard Frankel special agent in charge (SAC) of the FBI’s Newark Division. Frankel most recently served as SAC of the Criminal Division in the New York Field Office.
Sun, 2015-02-08 08:22 PM
Following a four-week trial, A California man was found guilty Wednesday in New York on all seven counts in connection with his operation and ownership of Silk Road, a hidden website designed to...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

Company News

Reston, VA, September 21 - Qbase, LLC, a leading provider of essential IT and data analytics services to federal and commercial clients announced today that, as the performing member of the SBD Alliant Joint Venture, it has been selected by the United States' Department of State to provide critical CRM software and integration services to support the agency's Bureau of Consular Affairs as it modernizes and consolidates its existing operational environment (including US passport and visa processing) under a common technology platform.
Anaheim, CA, September 21 - Christie® is showcasing its latest control room solutions at ASIS 2015 in Anaheim, California from September 28-30.  Displaying the newest and most innovative technology for security professionals, Christie will demonstrate the new Christie Phoenix® Quad-T processor, Christie Entero™ HB 70-inch HD front access cube and LCD solutions including the Christie FHD552-X 55-inch, ultra-narrow bezel flat panel and the new FHQ981-L 98-inch UHD flat panel.
Annapolis, MD, September 23 - TeleCommunication Systems today announced that it has been named the awardee of a competitive five-year contract extension (a base plus five option periods) valued at approximately $68 million to provide the Department of Defense's (DoD's) personnel with critical curriculum development and training delivery services to support the government's cybersecurity workforce development. 
Reston, VA, September 17 - Ardent Management Consulting (ArdentMC) announced today that it was awarded the Border Patrol GIS task order under the Geospatial Service Center in coordination with the United States Customs and Border Protection (CBP) and United States Border Patrol (USBP). The 4.5 year Period of Performance provides geographic information by planning, coordinating, and implementing GIS services, standards, and programs to support the unique business needs of CBP and USBP.  
Boston, MA, September 21 - Battery Ventures, a global technology investment firm, announced today that it has successfully completed the acquisition of Physical Security Business Unit (PSBU), formerly part of the security division of publicly listed NICE Systems. Through the acquisition, which was originally announced in August, Battery Ventures has established an independently operating business named Qognify. 
McLean, VA, September 17 - Researching and developing new technologies to ensure military ground systems can perform at optimum levels and meet emerging threats is an ongoing challenge. To assist, Alion Science and Technology, a global engineering, technology and operational solutions company, has been named an awardee of a $634 million indefinite delivery/indefinite quantity contract by the Army’s Tank-automotive and Armaments Command (TACOM).
Torrance, CA, September 16, 2015 - AMAG Technology announces the integration of their Symmetry™ Access Control and Video Management system with ASSA ABLOY’s IP-enabled locks.   The integration allows the expansion of Symmetry to doors not normally included in a traditional security system via a facility’s network infrastructure.
Ridgefield, CT, September 15 - Owl Computing Technologies, Inc., a network cyber security solutions provider, is pleased to announce the deployment of the Owl Cross Domain Solution - Small Form Factor (OCDS-SFF) to securely transfer full motion video from air and ground based assets into secure analyst enclaves for rapid interpretation and action.
 

The GSN 2015 Digital Yearbook of Awards

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Digital Version of November/December 2015 Print Edition

 

Click Here

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Market Sectors

Technology Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

Recent Cyber Security Videos

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John Bartolac relates that Axis invented the first IP Video camera in 1996 and is now the world’s largest provider of IP Video products, releasing about 30 products per year. In the government world, there is a higher threat level, requiring a very high frame rate with IP Video cameras, which led Axis to produce its Q 60 model that offers up to 1.5 kilometers of viewing.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

Entrust, Inc is an identity-based security company that focuses on government and enterprises, according to Bill Conner. The company had a big night at GSN’s 2011 Awards Program, being named Winner in “Best Certificate Management Solution”, “Best Smart Card Solution” and “Best Integrated Systems for HSPD-12/FIPS 201 Compliance”.  In the same week, Conner reports, the company also won a four-year GSA contract for PKI capability estimated at $4.5 million.