IT Security

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Tue, 2015-11-24 12:59 PM
Washington, DC, November 20 - Officials from U.S. Immigration and Customs Enforcement (ICE) and U.S. Customs and Border Protection (CBP) are advising shoppers this holiday season to be aware of...
Tue, 2015-11-17 11:46 PM
Government Security News is pleased to announce the Winners and Finalists in its seventh annual Homeland Security Awards. As in previous years, the awards program was divided into three basic...
Tue, 2015-11-17 01:21 PM
November 17, 2015 — 17 months after successfully launching its first virtual career fair, the SANS CyberTalent Fair (SCTF) is back and poised to launch its fourth online nationwide...
Sun, 2015-11-08 02:40 PM
Washington, DC, November 5 - In 2011, a small group of university researchers working on securing embedded devices caught the attention of the Department of Homeland Security (DHS) Science and...
Fri, 2015-11-06 09:20 AM
Rowley, MA, November 2 - In response to the ongoing epidemic of gun violence in our nation's schools, noted artist Greg Bokor, and Chris Connors, CEO of Shooter Detection Systems (SDS), today joined...
Tue, 2015-11-03 06:37 PM
Bingen, WA, October 28 - Launching at a tower site near Vaughn, New Mexico, Insitu accomplished the first commercial beyond visual line of sight operation with an Unmanned Aerial System (UAS) in the...
Tue, 2015-11-03 12:23 PM

Derek Brown, Wynyard

Arlington, VA, October 28 - When crime fighting software provider Wynyard Group surveyed U.S. law enforcement officials on their use of crime analytics software, 88 percent of respondents felt that...
Thu, 2015-10-29 02:24 PM

Dr. Greg Shannon

Washington, DC, October 29 - Dr. Greg Shannon, an IEEE senior member and cybersecurity expert from Carnegie Mellon University (CMU), recently began an assignment in the White House Office of...
Thu, 2015-10-22 09:27 AM

Jeh Johnson, DHS

Washington, DC, October 8 - “Chairman Johnson, Senator Carper, and members of the Committee, thank you for the opportunity to be here. I welcome the opportunity to appear before you with Directors...
Wed, 2015-10-21 09:49 AM

Gen. Carlisle, commander of Air Combat Command

Hill Air Force Base, UT, - Base officials and the Top of Utah community officially welcomed the F-35 Lightning II at a ceremony here Oct. 14, an event that formally marked the beginning of F-35...
Mon, 2015-10-19 10:06 AM

Xiaokui Shu and Daphane Yao

Blacksburg, VA, Octobeer 15 - Imagine millions of lines of instructions. Then try and picture how one extremely tiny anomaly could be found in almost real-time and prevent a cyber security attack. A...
Mon, 2015-10-19 09:55 AM
Washington, DC, October 12 - The Library of Congress has released a Request for Information (RFI) in support of reviewing and potentially expanding its advanced threat detection and response...

Commentary and Opinions

Frisco, TX, October 28 - The Health Information Trust Alliance (HITRUST), the leading organization supporting the healthcare industry in advancing the state of information protection, announced today that it continues to fully support S.754, the Cybersecurity Information Sharing Act (CISA) of 2015, because it formalizes the process for information sharing, encouraging private entities to share amongst themselves and with the government.
Palo Alto, CA, October 16 - Just as with any news, the more you hear about it, the more complacent you may become and start to tune out the warnings. With frequent reports about massive data breaches, you may think it won't happen to you, or since it hasn't happened yet, you don't need to worry. Some experts say such "complacency is strangling our cyber initiatives."
Rolling Meadows, IL, October 14 - Is the Internet of Things safe? A new survey from global cyber security association ISACA suggests a major confidence gap about the security of connected devices between the average consumer and cyber security and information technology professionals.
New York, NY, September 28 - The vast majority of executives recognize the value of mobile apps for their business (87 percent), but very few are well prepared to successfully deploy and maintain those apps, finds a new Accenture study.
By Jason Hart, Vice President and CTO for Data Protection at Gemalto

Company News

Sunnyvale, CA, November 30 - Sierraware, a pioneer in virtualization and security, today introduced VMI-in-a-Box, which allows small businesses to easily and affordably secure their mobile apps. This new, consolidated solution makes it easy for organizations to securely host mobile apps in the cloud and keep sensitive data off of mobile devices. VMI-in-a-Box simplifies the deployment of SierraVMI Virtual Mobile Infrastructure by providing an integrated and tested hardware appliance or a virtual appliance for KVM, Xen, and VMware ESX hypervisors.
Paramus, NJ, November 16 - Qognify, formerly NICE Security, today announced that one of the world's largest transit agencies is now more secure than ever after expanding its investment in Qognify security solutions. With that investment, the agency adds Suspect Search and mobility solutions to better detect, manage, and analyze incidents, amplifying its use of Situator, NiceVision, and Qognify intrusion detection.
Tarrytown, NY, November 16 - Westcon, the leading IT distributor with worldwide practices focused on security, UCC, networking, data center, cloud, global deployment and services, has signed an agreement to offer ForeScout Technologies Inc. automated security control platform to solution providers in North America.
San Francisco, November 13 - Today, Black Hat, the world's leading family of information security events, announced the record-breaking results of Black Hat Europe 2015, the 15th year of the show. Additionally, Black Hat is pleased to announce that Black Hat Europe will be held in London, England next year, November 1 – 4, 2016. For more information including news out of the event and to download available whitepapers and presentations, please visit:
San Francisco, November 13 - Today, Black Hat, the world's leading family of information security events, announced the record-breaking results of Black Hat Europe 2015, the 15th year of the show. Additionally, Black Hat is pleased to announce that Black Hat Europe will be held in London, England next year, November 1 – 4, 2016. For more information including news out of the event and to download available whitepapers and presentations, please visit:
Alexandria, VA., November 13 - SBG Technology Solutions, one of the fastest growing and leading engineering and information technology service providers in the United States, is delighted to announce Vice Admiral (Ret.) Derwood "DC" Curtis has joined SBG as Vice President of Intelligence, Cybersecurity Services and Special Programs.
San Jose, CA, November 12 - Vormetric, a leader in enterprise data security for physical, virtual, big data and cloud environments, today announced a major expansion of the Vormetric Data Security Platform, with new capabilities that expand protections for sensitive data within datacenter, cloud, big data and application environments.
Toronto, SOTI SYNC Conference, November 4 - SOTI, one of the world's leading provider of Enterprise Mobility Management (EMM), announced that it has joined the Cisco® Solution Partner Program as a Solution Partner. The Internet of Everything (IoE) continues to bring together people, processes, data and things to enhance the relevancy of network connections. As a member of the Cisco Solution Partner Program, SOTI is able to quickly create and deploy solutions to enhance the capabilities, performance and management of the network to capture value in the IoE.

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition

Click Here

Digital Version of May/June 2015
Print Edition


Click Here

Technology Sectors

Market Sectors

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...

White Papers

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.


Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?


Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

Recent IT Security Videos

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.