Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Fri, 2016-12-09 04:11 PM
DALLAS Dec. 8, 2016 With all the recent data breaches in the news, cybersecurity has become a major concern for all organizations. To help them stay protected and be prepared, Zartech just launched...
Fri, 2016-12-09 04:08 PM
WARREN, NJ Dec. 8, 2016 Prevalent, Inc., the leader in Third-Party Risk Management and Vendor Threat Intelligence, and Churchill & Harriman, the recognized leader in enterprise risk management...
Fri, 2016-12-09 04:02 PM

Moskovitz

ARLINGTON, VA Dec. 2, 2016 In a move designed to extend its advanced cyber defense and response service capabilities in support of the U.S. federal government, Accenture (NYSE:ACN) has completed its...
Fri, 2016-12-02 08:41 AM
The aviation industry is under increased pressure from cyberattacks that are growing in size and complexity.To meet this challenge SITA is working with its members to develop the SITA Community Cyber...
Thu, 2016-12-01 11:36 AM

Cattanach

By Steve BittenbenderEditor, Government Security NewsAs December begins, so, too, does a new federal rule that allows government agents to access remotely an individual’s computer or mobile device to...
Thu, 2016-12-01 11:31 AM
COSTA MESA, CA Nov. 28, 2016 While many companies have data breach preparedness on their radar, it takes constant vigilance to stay ahead of emerging threats and increasingly sophisticated...
Thu, 2016-12-01 11:26 AM
HANOVER, MD Nov. 29, 2016 The federal government awarded Enlighten IT Consulting, Inc. a $40 million task order against a GSA schedule, for continued development of the Big Data Platform (BDP). The...
Thu, 2016-12-01 11:15 AM

Taylor

CINCINNATI, OH Nov. 28, 2016 The 2016 Ponemon Cost of Data Breach Study, sponsored by IBM estimates that there are 1.5 million cyber attacks every year or 4,000 every day. Users are more likely...
Thu, 2016-12-01 11:11 AM

Fennessy

CHESEAUX, Switzerland and PHOENIX Nov. 29, 2016 Kudelski Security, a trusted advisor and cybersecurity innovator for the world's most security-conscious organizations, today introduced Secure...
Thu, 2016-12-01 11:04 AM
BETHESDA, MD Nov. 30, 2016 SANS Institute today announced that they will offer 100% scholarship-based cybersecurity training in the DC Metro area as part of the VetSuccess Academy program.The SANS...
Wed, 2016-11-30 09:00 AM
FORT WAYNE, IN Nov. 28, 2016 Raytheon Company's (NYSE: RTN) Cyber and Electromagnetic Battle Management tool is the only electronic warfare planning and management tool to demonstrate...
Wed, 2016-11-30 07:31 AM
SAN FRANCISCO Nov. 28, 2016 Updated 5:22 p.m., Monday, Nov. 28:Thank you for your attention and patience as we restore our office computers from this weekend’s ransomware attack. We want to provide...

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.
 

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

June 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...