IT Security

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2015-06-25 03:14 PM
GSN is pleased to announce the Winners and Finalists in its 2015 annual Airport, Seaport, Border Security Awards Program, which once again demonstrates the spectacular scientific achievements and...
Thu, 2015-06-25 12:47 PM
Washington, June 24 – A multi-year cyber investigation, led by the U.S. Secret Service, has culminated in Brooklyn federal court with the arraignment of Ercan Findikoglu, (AKA “Segate”). Findikoglu,...
Tue, 2015-06-23 10:57 PM
Washington, June 22 – Internet Crimes Against Children (ICAC) Task Forces arrested 1,140 child predators from 41 states during a two-month, nationwide operation, the Office of Juvenile Justice and...
Wed, 2015-06-03 10:15 PM
Miami, FL, June  2 – The Coast Guard is warning the public that pointing handheld lasers at Coast Guard boat and aircrews is dangerous and illegal. There have been three instances of lasers...
Mon, 2015-06-01 02:06 AM
Washington, D.C., May 22 – The Federal Bureau of Investigation (FBI) has announced a reboot of its popular Child ID App, which provides parents with an easy way to electronically store their children...
Wed, 2015-05-27 09:35 PM
Haifa, Israel, May 21, 2015 – Elbit Systems Ltd. (the "Company") (NASDAQ and TASE: ESLT), has announced that it has signed an agreement to acquire  NICE Systems Ltd.’s (“NICE”) Cyber and...
Thu, 2015-05-21 10:18 PM
Washington D.C., May 16 – The Coast Guard released its first boating safety app last week as the kickoff to this year's National Safe Boating Week, May 16 – 22. The Boating Safety Mobile...
Thu, 2015-05-21 07:28 PM
Washington, D.C., May 20 – The Department of Homeland Security’s (DHS) Science and Technology (S&T) Directorate has announced the winners of S&T’s first innovation prize competition: The...
Tue, 2015-05-19 08:19 PM
Washington, May 19 – Pilots will be able to file flight plans and receive the latest weather information on-line, effective immediately, under two new Federal Aviation Administration (FAA) contracts...
Mon, 2015-05-11 10:41 PM
Washington, D.C., May 11 – Director James B. Comey has named Stephen Woolery the special agent in charge (SAC) of the Counterterrorism Division in Los Angeles. Woolery most recently served as chief...
Tue, 2015-05-05 10:51 PM
San Francisco, CA, May 5 – Ripple Labs has agreed to resolve a criminal investigation in exchange for a settlement agreement calling for a series of substantial remedial measures, including a...
Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...

Company News

When the content managers of a global technology company with a sterling reputation for delivering outstanding products and services learned that the corporate focus was shiftingto becoming green, in part through making content mobile, they quickly realized that a digitization strategy that scales to a global level would be an imperative.
Pittsburgh, PA, June 30 – Black Box Corporation, a technology solutions provider, has announced it is one of 20 industry partners awarded prime contractor status to provide information technology products and solutions to the United States Air Force through its Network-Centric Solutions 2 (NETCENTS-2) NetOps and Infrastructure Solutions Full and Open, Indefinite Delivery, Indefinite Quantity contract. NETCENTS-2 contracts provide the Air Force with a primary source of IT products, services and solutions.
Washington, June 25 – LexisNexis® Special Services Inc. (LNSSI) announced today that it is one of the recipients of the James S. Cogswell Outstanding Industrial Security Achievement Award for 2015. The award, which was presented by the Defense Security Service (DSS) during the National Classification Management Society (NCMS) 2015 Annual Conference, recognizes industrial security excellence by select large and small defense contractors that are subject to recurring assessments.
Aix-En-Provence, June 29 – INSIDE Secure (Euronext Paris:INSD), a leader in embedded security solutions for mobile and connected devices, today announced availability of SafeZone FIPS cryptographic module version 1.1—the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
London, June 26 – Advanced endpoint security vendor Malwarebytes has announced it has selected Blue Solutions as its first UK distributor, as part of a wider expansion into EMEA enterprise markets.
Hartford, CT, June 25 – Most midsize business leaders view a data breach among their top risks and a majority consider IT security “very important” when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives.
Paris, June 25 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cyber security provider, has released version 9.1 of Stormshield Data Security, its software suite dedicated to data protection. This new version allows users to exchange email messages securely on the cloud, to protect their data on tablets on the move and to take advantage of the latest trends in technology like working on the move or collaboratively.
Moonachie, NJ, June 26 – A global provider of IT solutions and ICT services, Samsung SDS America, Inc. (Samsung SDSA) has announced that the 

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent IT Security Videos

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

Sony has recently announced a hybrid line of cameras, according to Mark Collett, which allows customers to use or replace their analog cameras with a hybrid camera that simultaneously streams HD video along with traditional analog, enabling customers to integrate HP quality video into existing infrastructure without changing the control room or any of existing procedures. He also describes the company’s new line of IPELA engine products that offer a common integration platform.

Joe McDonald states that ASIS International, which has deep roots in federal government and law enforcement, has had a banner year in which membership increased from 37,000 to 38,000, with interesting new changes in membership demographics, accompanied by strong growth internationally. As a standards and training organization, ASIS has written and released a new organizational resilience standard and a code of conduct standard for provide security service providers, and is working on a new standard for the Department of Defense.

White Papers

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Abstract:

Network Access Control and 802.1x - Advantages, Constraints and Capabilities

Written by distinguished security industry analyst Pete Lindstrom of Spire Security

The industry has been blurring the differences between 802.1x and NAC. Some believe that 802.1x is sufficient and similar enough to a full NAC solution to start down the path of implementation. What organizations often find is that the 802.1x story seems fairly simple and easy, but the deployment is much more difficult. This paper examines the fully 802.1x and NAC details such as:

    * What is 802.1x?
    * What important features are missing from 802.1x?
    * What alternatives exist to 802.1x and why?
    * What are the hidden costs associated with rolling out NAC?
    * How can commercial enterprises and government organizations benefit from NAC?

Narus

Narus, a leader in real-time traffic intelligence for protecting governments, service providers and enterprises, just completed its 2010 annual cyber security survey focusing on the United States. Sponsored jointly with Converge Network Digest and Government Secuirty News, the survey queried a cross-section of security professionals in a variety of industries, and revealed compelling details relating to cyber security concerns, opinons and expectations for protection against attacks. More...

New Products

Millis, MA-based Kanguru Solutions, a manufacturer of secure IT storage solutions, has announced the ad...

Reston, VA-based Input, which specializes in government business, has unveiled new research detailing adoption trends for cloud computing, virtualization, service-oriented archi...

Rockville, MD-based Telvent reports that it is the first vendor selected to participate in a DHS superv...

Mobile Active Defense, LLC (M.A.D.) has announced the release of its patent-pending mobile firewall and contents filtering mecha...

GammaTech Computer Corp., a manufacturer of notebook and tablet computers, has introduced the newest member to its line of cost-effecti...