Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

By RyanKamauff Here are the top cyber news and stories of the day. Gartner: Cloud security growth to overtake on-premise by 2015 - Gartner believes that over the next three years, the cyber security market will change significantly. The analysts believe that 10% of enterprise security capabilities will be delivered via cloud computing by 2015. “Cost reduction, flexibility of deployment across multiple IT environments, and fast implementation and product updates [are] among major factors driving demand,” said Gartner in a statement. Via Cloud Pro, more here. Issa: Federal government needs ‘IT revolution’ - The House Committee on Oversight and Government Reform extended its campaign on federal government technology spending to YouTube with a new video that calls for an “IT revolution.” The video claims 80 percent of federal IT projects are over budget or never compl... (more)

Mobility News Weekly – Week of January 26, 2014

The Mobility News Weekly is an online newsletter made up of the most interesting news and articles related to enterprise mobility that I run across each week.  I am specifically targeting information that reflects market data and trends. Also read Enterprise Mobility Asia News Weekly Also read Field Mobility News Weekly Also read M2M News Weekly Also read Mobile Commerce News Weekly Also read Mobile Cyber Security News Weekly Also read Mobile Health News Weekly Looking for an enterprise mobility solution?  Read the Mobile Solution Directory Here! Apple sold 51 million iPhones during the last three months of 2013, up from 47.8 million a year earlier. But Wall Street analysts were expecting closer to 57 million iPhones, after Apple launched its new iPhone 5S and 5C smartphones in China simultaneously with the United States and Western Europe for the first time this fall. Re... (more)

Info-Tech Research Group Recognizes Sensage as an Industry "Champion" in 2012 SIEM Vendor Landscape Report for the Second Consecutive Year

REDWOOD SHORES, CA -- (Marketwire) -- 06/18/12 -- Sensage, Inc., the leading provider of advanced Security Information and Event Management (SIEM) and founder of Open Security Intelligence, today announced that Info-Tech Research Group named the company a "Champion" in its 2012 SIEM Vendor Landscape report. Out of ten vendors that offer broad capabilities across multiple platforms, Sensage was recognized for its solid technology and reputational presence. "Internal and external threats don't care about organizational size. As IT teams are tasked with staying ahead of attacks with limited resources, they simply don't have the time to search through logs or react to real-time alerts every day," said Joe Gottlieb, President and CEO of Sensage. "This recognition from the Info-Tech Research Group is a testament to our ability to deliver sophisticated security analytics ... (more)

Black Friday Through Cyber Monday On CNET: Google Nexus 7, Apple iPhone 5 And Apple iPad Mini Are Among The Top 10 Most-Viewed Gadgets

SAN FRANCISCO, Nov. 27, 2012 /PRNewswire/ -- More than 8.1 million people turned to CNET from Black Friday through Cyber Monday to research and learn about this holiday season's most-wanted tech gadgets before they made their purchases.  This is an 11% increase in traffic compared to last year. The two most popular categories were tablets and smartphones.  Nearly 13% of users viewed tablets, while 10% viewed smartphones.  According to CNET, the top 10 most-researched products were: Google Nexus 7 (16GB)      Apple iPhone 5        Lenovo IdeaPad Yoga 13    Google Nexus 10    Apple iPad Mini      Samsung Chromebook Series 3       Samsung Galaxy S III - 16GB - Pebble Blue (T-Mobile)      Amazon Kindle Fire HD 8.9            Apple iPad (4th generation) Samsung Galaxy Note 2    "Tablets and smartphones continue their march to the top on CNET and beyond," said Lindsey Tur... (more)

RedSeal Networks Delivers for U.S. Postal Service With MeriTalk's Best Practices and Implementation Award

SAN MATEO, CA -- (Marketwired) -- 08/07/13 -- RedSeal Networks, the leader in network infrastructure security management, is proud to announce that the United States Postal Service (USPS) was recognized for its leadership in Federal cyber security at the annual MeriTalk Cyber Security Confidence Awards, where it was honored with the "Best Practice and Implementation" award. Given to the organization that best exemplifies its devotion to improving cyber infrastructure, the USPS was praised for its work with RedSeal Networks to manage the security posture of one of the nation's most complex networks. The USPS is currently the third largest computing network and one of the largest intranets. Supporting over 35,000 retail locations, including over 47,000 point of sale terminals, 4,000 business partners, and over 500,000 computing endpoints, it is the largest Federal Ag... (more)

New Sony QX100 and QX10 "Lens-Style Cameras" Redefine the Mobile Photography Experience

TORONTO, ON--(Marketwired - September 04, 2013) - Merging the creative power of a premium compact camera with the convenience and connectivity of today's smartphones, Sony today introduced two "lens-style" QX series cameras that bring new levels of fun and creativity to the mobile photography experience.  The innovative Cyber-shot™ QX100 and QX10 models utilize Wi-Fi® connectivity to instantly transform a connected smartphone into a versatile, powerful photographic tool, allowing it to shoot high-quality images and full HD videos to rival a premium compact camera. It's an entirely new and different way for consumers to capture and share memories with friends and family. With a distinct lens-style shape, the new cameras utilize the latest version of Sony's PlayMemories™ Mobile application (available for iOS™ and Android™ devices, version 3.1 or higher required) to ... (more)

Belkin Receives Double Win in the 10th Annual Security Industry's Global Excellence Awards

Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named two Belkin products as winners of the 2014 Global Excellence Awards. Belkin's Secure KM Switch and Secure Windowing KVM Switch were named bronze winners in the New Security Products and Services Excellence category. These prestigious global awards recognize security and IT vendors with advanced, ground-breaking products and solutions that are helping set the bar higher for others in all areas of security and technologies. Cyber threats are on the rise for businesses of all types, with confidential data and computer systems serving as prime targets for cyber criminals. One of the least understood and most under-utilized p... (more)

Cloud Expo New York Speaker Profile: Jill T. Singer – Federal CIO Emeritus

With Cloud Expo New York | 12th Cloud Expo [June 10-13, 2013] starting next Monday, here's a look at one the distinguished individuals in our incredible Speaker Faculty for the technical and strategy sessions at the conference coming up June 10-13 at the Jacob Javits Center in New York City. We have technical and strategy sessions for you all four days dealing with every nook and cranny of Cloud Computing and Big Data, but what of those who are presenting? Who are they, where do they work, what else have they written and/or said about the Cloud that is transforming the world of Enterprise IT, side by side with the exploding use of enterprise Big Data – processed in the Cloud – to drive value for businesses...? 12TH CLOUD EXPO SPEAKER NAME: Jill Tummler Singer TWITTER: @jilltsinger ORGANIZATION: Tummler Singer Associates 12TH CLOUD EXPO SESSION TITLE: Time to Mission @ the... (more)

Don’t forget to register for FOSE 2013

By Ryan Kamauff FOSE is the nation’s premier event for government technology professionals who need tools, resources, and best practices to transition to the cloud, mitigate cybersecurity threats, and achieve the goals of the DGS while managing uncertainty and the critical need to make it all happen on-time and on-budget. “The heavy impact of sequestration and across the board budget cuts has put stress on agency training opportunities,” said Mike Eason, Vice President, Public Sector Events, 1105 Media, Inc. “We are responding by offering high-level training and educational programs for free. We hope to help advance agency missions by providing these opportunities to all government attendees.” Government attendees will receive FREE access to FOSE’s FULL educational program, including the executive-level conference featuring five tracks and over 40 comprehensive s... (more)

Sofia's Abduction to Syria: Interview with Diane Macedo of Fox News

Diane Macedo of Fox News worked on Sofia's story for more than a month, studying documents, interviewing more than a dozen people, and fact-checking before publishing her news story on Monday and airing our interview. Here is the link to the Fox News on-camera interview. This morning, on Monday, she also published a detailed article on Sofia: ▸ Fox News Story on Sofia's Abduction to Syria When Sofia returns safely home, she will pay her first visit to Diane at Fox News headquarters in New York City. ▸ US Leaves Its Youngest Citizen Behind Syria I already wrote two blog posts on Sofia's status in Syria. Both posts were read by Washington, by our Embassy in Damascus, Syria, as well as the Syrian government both here in DC and in Damascus. ▸ Open Letter to the President of Syria Bashar al-Assad ▸ Open Letter to the First Lady of Syria Asma al-Assad Following the Syrian p... (more)

Cloud Computing: The Dawn of Maneuver Warfare in IT Security

The lead topic of every information technology (IT) conversation today is cloud computing. The key point within each of those conversations is inevitably cloud computing security.  Although this trend is understandable, the sad part is that these conversations will tend to focus on all the standard security pros, cons and requirements. While protecting data from corruption, loss, unauthorized access, etc. are all still required characteristics of any IT infrastructure, cloud computing changes the game in a much more profound way. Until now, IT security has been akin to early 20th century warfare.  After surveying and carefully cataloging all possible threats, the line of business (LOB) manager and IT professional would debate and eventually settle on appropriate and proportional risk mitigation strategies. The resulting IT security infrastructures and procedures t... (more)