security

  • Harris Corporation has introduced a highly customizable USB thumb drive that quickly extracts targeted data from computers. The BlackJack™ is designed for military, intelligence, and law enforcement cyber security missions, where speed, stealth and accuracy are paramount considerations.

    October 01, 2010
  • IT experts\' two main concerns are consolidation and security, according to a blog from CSO Security and Risk.

    September 17, 2010
  • The new, border-wide use of the Predator aircraft marks an unprecedented amount of resources directed to the southwest. Michael Kostelnik, the Assistant Commissioner of the Office of Air and Marine for Customs and Border Protection explains.

    September 14, 2010
  • September 22nd at 11 AM Data Loss Prevention (DLP) is receiving significant attention within the information security community as individuals and organizations realize the importance of managing and protecting sensitive information. The impact of a data breach can be significant, resulting in lost productivity, failed audits, and negative press exposure. This session will review the benefits of identity-aware Data Loss Prevention and how these integrated solutions can help reduce IT risk, automate key security processes and enhance overall compliance posture.

    September 07, 2010
  • Woody Talcove, CEO of government business for LexisNexis, details the benefits of using public records to meet your agency\'s mission.

    September 02, 2010
  • DHS is releasing gases and fluorescent particles into Boston\'s subway tunnels today to study how toxic chemicals and lethal biological agents could spread through the nation\'s oldest subway system in a terrorist attack. Details from program manager, Teresa Lustig

    August 20, 2010
  • The federal government is losing its edge when it comes to being able to read the fingerprints of a nuclear bomb. Details from Peter Huessy, an expert in nuclear terrorism.

    August 03, 2010
  • August 11th at 11:05am The DoD GIG IA Portfolio Management Office (GIAP) has learned through experience that mission critical networks are contested, violated, infiltrated and penetrated, leading to significant risks to US interests. The U.S. critical infrastructure has evolved from a ‘network enabled\' position to one that is now ‘network dependent.\' No aspect of the national critical infrastructure operates without extensive use of information technology, and it is this very fact that makes our networks such a high priority target for adversaries. The need for secure, self-aware, proactively managed defense mechanisms has never been more critical. Commercially available technologies, when combined with research and development done by both the government and the private sector, represent the best possible approach for combating the types of threats our critical infrastructure is facing today.

    August 02, 2010
  • You\'ve probably heard about improvised explosive devices, but what about an improvised nuclear device? What\'s the best way to save lives if one exploded in the U.S.? More from Weapons of Mass Destruction Center CEO Randy Larsen and Dr. Tom Inglesby, Center for Biosecurity at the University of Pittsburgh Medical Center

    July 26, 2010
  • Jerry Davis, the widely respected chief information security officer at NASA, is leaving that agency to join the Department of Veterans Affairs, the DorobekINSIDER has confirmed. The move had been widely rumored for months, but…

    July 26, 2010
  • Pledging to increase trust with Congress, retired Air Force Lt. Gen. James R. Clapper said Tuesday he would be candid with lawmakers if confirmed as the next director of national intelligence. We get more from Susan Crabtree,senior editor for The Hill.

    July 21, 2010
  • More of the flying public will be seen at more airports than ever before.

    July 20, 2010
  • Has the intelligence community become too big for its own good? For analysis, we spoke with Federal News Radio national security correspondent, J.J. Green.

    July 20, 2010
  • The Department of Homeland Security has completed the second phase of a long-term planning and review program. The so-called \"Bottom-up Review\" picks up where the ground-breaking Quadrennial Homeland Security Review left off earlier this year, and paves the way for the possibility of major changes in DHS programs to better fit the agency\'s mission.

    July 19, 2010
  • It appears that the effort to pass a cyber-security bill is going to get a bit more tough then expected. Late last month, officials from Cisco, IBM and Oracle sent a letter to the main…

    July 07, 2010