Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-04-06 09:37 AM
WASHINGTON April 4, 2017 The National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) are encouraging consumers to get their online lives in good order by conducting a thorough...
Thu, 2017-04-06 09:31 AM
MCLEAN, VA March 29, 2017 Haystax Technology, a leading security analytics platform provider, today released an industry survey titled "Insider Attacks" that provides new data and insights into the...
Wed, 2017-04-05 03:48 PM
GENEVA April 3, 2017 Airbus and SITA have launched new Security Operations Center Services customized for the specific needs of the air transport industry. This new incident detection services will...
Mon, 2017-03-27 04:54 PM
WESTFORD, MA March 24, 2017 Tyco Security Products, part of Johnson Controls, introduces the latest release of the exacqVision VMS (8.4) which adds critical cybersecurity features demanded by IT...
Thu, 2017-03-23 04:35 PM

Packer

March 22, 2017 Druva, the leader in cloud data protection and information management, and Carahsoft Technology Corp., the trusted government IT solutions provider, today announced that Carahsoft will...
Thu, 2017-03-23 04:31 PM
AUSTIN, TX March 22, 2017 Today GFI Software launched GFI OneGuard and GFI OneConnect, two powerful platforms aimed at bringing enterprise-class IT management features to small and medium-sized...
Thu, 2017-03-23 04:28 PM
KNOXVILLE, TN March 22, 2017 EDGE2017, a national cybersecurity conference aimed at addressing complex business security problems with real-world solutions, is now accepting proposals for speakers...
Thu, 2017-03-23 04:24 PM

Wilson

LOWELL, MA March 21, 2017 UMass Lowell and itSM Solutions LLC announced today that they are launching a new workforce training program focused on cybersecurity.
Thu, 2017-03-23 04:18 PM

Wright

NEW YORK March 20, 2017 Leading non-profit behavioral design firm ideas42 today unveiled a unique approach to highlighting and resolving key behavioral problems in cybersecurity with the launch of an...
Thu, 2017-03-23 04:11 PM
WINSTON-SALEM, NC March 16, 2017 Starting in 2017, Threat Sketch will begin receiving real-time cybersecurity intelligence information from the Department of Homeland Security that will complement...
Fri, 2017-03-17 08:32 AM
More than 20 Historically Underutilized Business Zones (HUBZone) firms participated in a showcase hosted by the Defense Information Systems Agency’s Office of Small Business Programs (OSBP) at the...
Thu, 2017-03-16 09:04 AM

Sessions

March 15, 2017 A grand jury in the Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic...

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.
 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...