Cyber Security

Featured Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-...

News

Thu, 2017-01-05 07:31 AM

Fuchs

LINTHICUM, Md., Jan. 3, 2017 /PRNewswire/ -- Enlighten IT Consulting (EITC) has been acquired MacAulay-Brown, Inc. (MacB), an advanced engineering, cyber security, and product solutions company...
Thu, 2017-01-05 07:25 AM

Heilbronn

TEL-AVIV, Israel Jan. 3, 2017 Argus Cyber Security, the world's largest independent automotive cyber security company, announced today a new integrated solution to enhance security capabilities of...
Thu, 2017-01-05 07:20 AM

Fennessy

CHESEAUX-SUR-LAUSANNE, Switzerland and PHOENIX Jan. 3, 2017 The Kudelski Group (SIX:KUD.S) launched today its Internet of Things (IoT) Security Center of Excellence, building on the expertise of...
Fri, 2016-12-30 07:02 AM

Obama

By Steve BittenbenderEditor, Government Security NewsIn response to claims the Russian government waged cyberattacks to interfere with last month’s presidential election, President Obama on Thursday...
Fri, 2016-12-30 04:21 AM

Cooper

WASHINGTON Dec. 29, 2016 The American Insurance Association (AIA) is encouraged by the New York Department of Financial Services (DFS) revised cyber security regulation. Announced yesterday in the...
Fri, 2016-12-30 03:57 AM

Cosoi

BUCHAREST, Romania, Dec. 29, 2016 Bitdefender, the innovative security software solutions provider, joined the No More Ransom initiative supported by Europol contributing to the global fight against...
Wed, 2016-12-28 09:19 PM
SACRAMENTO, CA Dec. 27, 2016 IDdriven, Inc. (OTCQB: IDDR), developer of the new breed of Identity and Access Management ("IAM") solutions, today announced it has published a White Paper on enterprise...
Wed, 2016-12-28 09:09 PM

Mehan

RESTON, VA Dec. 27, 2016 MetroStar Systems, Inc. continues to expand their Cybersecurity capabilities and thought leadership by appointing Dr. Julie E. Mehan as Director of Cyber Security Strategy...
Wed, 2016-12-28 09:06 PM

Trump

PALM BEACH, FL Dec. 27, 2016  President-elect Donald J. Trump today announced his selection of Thomas P. Bossert to serve as Assistant to the President for Homeland Security and Counterterrorism. In...
Wed, 2016-12-28 09:02 PM

Burger

WASHINGTON Dec. 21, 2016 The Security and Software Engineering Research Center at Georgetown University (S2ERC ) announced today that Farsight Security, Inc., provider of the world’s only real-time...
Wed, 2016-12-28 08:59 PM
SANTA BARBARA, CA Dec. 22, 2016 Green Hills Software and INTEGRITY Security Services (ISS) will showcase their industry-leading technology for automotive electronics and secure IoT devices at CES...
Wed, 2016-12-28 08:52 PM
NEW YORK Dec. 21, 2016 illusive networks today announced that its pioneering Deceptions Everywhere® cybersecurity was selected by SC Magazine as a Next-Generation Security Monitoring and Analytic...

Commentary and Opinions

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
Among federal executive agencies, continuous diagnostics and mitigation (CDM) is not only essential to ensuring cybersecurity, but also to ease the burden of complying with the Federal Information Security Management Act (FISMA) and to establish appropriate budgeting levels for information security.
 

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Aug 2016 Digital Edition

Click Here

July 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...