Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-02-02 06:28 AM

Mirzayanov

BARCELONA Jan. 30 The next generation of programming minds is set to gather for the first bootcamp of its kind held in Europe. Working in collaboration with the Moscow Physics and Technology...
Wed, 2017-02-01 07:28 AM

Neve

KENNEDY SPACE CENTER, FL Jan. 31, 2017 The Maritime & Port Security Information Sharing & Analysis Organization (MPS-ISAO) convenes its inaugural conference “Maritime & Port Cyber...
Tue, 2017-01-31 07:24 AM
WASHINGTON Jan. 30, 2017 The Aspen Institute Homeland Security Group is pleased to endorse nine areas critical to the continued improvement of the Department of Homeland Security making further...
Thu, 2017-01-26 10:18 AM

Johnson

NEW YORK Jan. 23, 2017 Paul, Weiss, Rifkind, Wharton & Garrison LLP announced today that former Secretary of Homeland Security Jeh Johnson is rejoining the firm as a partner in its Litigation...
Thu, 2017-01-26 10:13 AM
IRVINE, CA Jan. 24, 2017 Netwrix Corporation, the first vendor to introduce a visibility and governance platform for hybrid cloud security, extracted data about government agencies from its 2016...
Thu, 2017-01-26 09:51 AM

Thibodeaux

WASHINGTON Jan. 24, 2017 CompTIA, the world's leading technology association, has launched the CompTIA Advisory Council on Cybersecurity (CACC) to address many of the most pressing cybersecurity...
Thu, 2017-01-26 09:48 AM

Pandey

WESTFORD, MA Jan. 24, 2017 Seceon, the only threat detection and management company to visualize, detect, and eliminate cyber threats in real-time, today announced a strategic partnership with...
Thu, 2017-01-26 09:43 AM

Sternfeld

BOSTON Jan. 19, 2017 On the heels of its successful launch of RansomFree, the free anti-ransomware product that blocks 99 percent of ransomware variants from encrypting files, Cybereason today...
Thu, 2017-01-26 09:38 AM
TROY, NY Jan. 24, 2017 GreyCastle Security (greycastlesecurity.com) is the winner of the inaugural Cyber Security Award presented by the Albany Business Review, the leading business publication in...
Fri, 2017-01-20 01:08 PM
PORTLAND, OR Jan. 19, 2017 Galois announced today that it has been awarded a $750,000 grant from the Air Force Research Lab (AFRL) to develop a new, advanced network cyber deception technology:...
Thu, 2017-01-19 08:13 AM

Temske

NEW YORK Jan. 17, 2017 Since the starting point for all enterprise connectivity is the Domain Name System (DNS), doesn't it make sense to secure the DNS when providing enterprise cybersecurity? It's...
Thu, 2017-01-19 08:06 AM

Letsov

WOBURN, MA Jan. 12, 2017 Kaspersky Lab today announced the global availability of Kaspersky Threat Lookup – a security intelligence service aimed at enhancing enterprise incident response and...

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...