Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2015-05-21 10:18 PM
Washington D.C., May 16 – The Coast Guard released its first boating safety app last week as the kickoff to this year's National Safe Boating Week, May 16 – 22. The Boating Safety Mobile...
Mon, 2015-05-11 10:41 PM
Washington, D.C., May 11 – Director James B. Comey has named Stephen Woolery the special agent in charge (SAC) of the Counterterrorism Division in Los Angeles. Woolery most recently served as chief...
Tue, 2015-05-05 10:51 PM
San Francisco, CA, May 5 – Ripple Labs has agreed to resolve a criminal investigation in exchange for a settlement agreement calling for a series of substantial remedial measures, including a...
Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...
Wed, 2015-04-29 07:35 PM
­Fort George G. Meade, MD – The U.S. Naval Academy has won the 2015 Cyber Defense Exercise (CDX), capturing its third trophy since the annual competition began in 2001, the National Security Agency (...
Fri, 2015-04-24 12:01 AM

Robert Bonner

Editor’s Note: On April 21, the first day of the 9th Border Security Expo, held in Phoenix, AZ, Robert C. Bonner, as a member of the Expo’s advisory board, was prepared to present the prestigious...
Tue, 2015-04-21 08:14 PM
Las Vegas, NV, April 21 – Artificial intelligence, which has been used to entertain through toys such as Tamagotchi, as well as to reap profit from picking investments, is now being used by Houston-...
Sun, 2015-04-19 06:53 PM
The same ultrasound technology that allows expectant parents to look at their offspring in utero has been showcased in fingerprint biometrics by Sonovation at ISC West, the spring trade show of...
Fri, 2015-04-17 12:13 AM
Sydney, Australia, April 15 – The Ministry of Interior for the United Arab Emirates was selected this week as the next chair of the Virtual Global Taskforce (VGT), an international alliance of law...
Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “Carder.su” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...

Commentary and Opinions

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
 

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Digital Version of November/December 2015 Print Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...