Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-03-09 06:57 AM

Klein

BROOKVILLE, NY March 8, 2017 Long Island University’s Hornstein Center for Policy, Polling and Analysis released a new poll with information about the emerging global priorities of American voters....
Thu, 2017-03-02 09:58 AM

Sjouwerman

TAMPA BAY, FL Feb. 21, 2017 KnowBe4, provider of the most popular platform for security awareness training and simulated phishing, along with Cybersecurity Ventures, a leading research and marketing...
Thu, 2017-03-02 09:51 AM

Hegedus

SUFFOLK, VA March 1, 2017 Sera-Brynn, LLC, a top-ranked cybersecurity firm, today urged the Department of Defense (DoD) contracting community to immediately begin implementing the cybersecurity...
Thu, 2017-03-02 09:47 AM
CHEVY CHASE, MD March 2, 2017 When faced with an anticipated 1.8 million person cybersecurity shortage by 2022, the National Cyber League (NCL) has responded by closing the disparity of what is...
Thu, 2017-03-02 09:39 AM

Wyman

NEW YORK March 1, 2017 Summitas, an innovative wealth management portal for high net-worth families, individuals and advisors announced that it was named "Best Cyber Security Solution" by...
Thu, 2017-03-02 09:37 AM
ROCKVILLE, MD Feb. 28, 2017 Aronson LLC, a leading provider of assurance, tax and consulting services to government contractors in the mid-Atlantic region, today announced a highly customizable...
Thu, 2017-03-02 09:34 AM
HERNDON, VA Feb. 28, 2017 Exostar, whose cloud-based solutions help companies in aerospace and defense, life sciences, and healthcare mitigate risk and solve their identity and access challenges,...
Fri, 2017-02-24 08:08 AM

McNeely

KNOXVILLE, TN Feb. 23, 2017 Sword & Shield Enterprise Security, a leading national cybersecurity firm based in Knoxville, Tennessee, was named by CRN, a brand of The Channel Company, to the 2017...
Thu, 2017-02-23 09:11 AM

Kemp

SANTA CLARA, CA Feb. 14, 2017 Centrify, the leader in securing hybrid enterprises through the power of identity services, commissioned a new Forrester study that revealed the enterprise security...
Thu, 2017-02-23 09:04 AM

Moyanhan

AUSTIN, TX Feb. 21, 2017 Global cybersecurity leader Forcepoint™ today released a new study – "The Human Point: An Intersection of Behaviors, Intent & Critical Business Data." The study showed...
Thu, 2017-02-23 08:59 AM

Suby

SANTA CLARA, Calif., Feb. 21, 2017 The battle lines of cybersecurity have changed. Cyber attackers are not only penetrating perimeter defenses to gain access to enterprise networks, but on average...
Thu, 2017-02-23 08:55 AM
KOWLOON BAY, Hong Kong Feb. 22, 2017 Bureau Veritas, leader in testing, inspection/audit, advisory and certification services for the Smartworld, has announced they will be demonstrating their new,...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...