Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-05-18 11:04 AM

Verint

MELVILLE, NY May 18, 2017 Verint® Systems Inc. (Nasdaq: VRNT), a leading provider of security and intelligence data mining software, today announced that it won a multimillion dollar project for a...
Thu, 2017-05-18 10:58 AM
TOKYO May 12, 2017 Fujitsu announces its high-speed forensic technology to identify the extent of damage targeted cyberattacks cause to an organization's intranet. The new technology, developed by...
Tue, 2017-05-16 08:32 AM

Good

RESTON, VA May 15, 2017 Leidos (NYSE: LDOS), a global science and technology company, announced that Meghan Good, Leidos Cyber Solutions Lead, was recognized as a winner by the Women in Technology (...
Mon, 2017-05-15 04:05 PM

Smith

By Steve Bittenbender Editor, Government Security NewsThe ransomware attack that plagued the globe on Friday must serve as a “wake-up call” to both industry and government leaders that the time for...
Fri, 2017-05-12 07:28 AM

Risley

By Steve BittenbenderEditor, Government Security NewsPresident Donald Trump on Thursday signed a long-anticipated executive order calling for the federal government to ramp up its cybersecurity...
Thu, 2017-05-11 09:50 AM

Gyde

NEW YORK May 8, 2017 New research reveals that cyberattacks on the government sector doubled in 2016, hiking to 14 percent from seven percent of all cybersecurity attacks in 2015. Attacks on the...
Thu, 2017-05-11 09:42 AM

Waddell

WASHINGTON May 9, 2017 According to the Center for Cyber Safety and Education™ Global Information Security Workforce Study (GISWS), sponsored by (ISC)²®, Booz Allen Hamilton and Alta Associates,...
Thu, 2017-05-11 09:26 AM

Ben-Efraim

MENLO PARK, CA May 9, 2017 Menlo Security today announced it has been selected by Internet Initiative Japan Inc. (IIJ), one of Japan's leading internet access and comprehensive network solutions...
Thu, 2017-05-11 09:21 AM

Bay

SAN DIEGO May 10, 2017 Security On-Demand Inc., (SOD) the leading provider of advanced managed security and threat detection capability announced today that Steven Bay has joined the company as the...
Thu, 2017-05-11 09:18 AM

Stegall

NORTHBROOK, IL May 10, 2017 UL, a global safety science organization, has received a grant from the U.S. Defense Advanced Research Projects Agency (DARPA) for cybersecurity testing of Internet...
Thu, 2017-05-11 09:15 AM
Forum Systems announced on Wednesday that it will be exhibiting at AFCEA’s upcoming Defensive Cyber Operations Symposium.The conference will be held June 13-15 at the Baltimore Convention Center in...
Fri, 2017-05-05 08:57 AM
WASHINGTON May 2, 2017 The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded $9.7 million to 12 small businesses for 13 Phase II contracts through the...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
 

2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...