List/Grid Tag Archives: Cybersecurity

Tech Association Responds to Proposed Cyber Requirements for Gov’t Contractors

Tech Association Responds to Proposed Cyber Requirements for Gov’t Contractors

The Telecommunications Industry Association has submitted comments to the General Services Administration on a proposal to adopt cybersecurity standards for the federal acquisition and contracting process, FCW reported Tuesday. Mark… Read more »

SafeNet: Global Data Breaches Up 200% in Q1 2014

SafeNet: Global Data Breaches Up 200% in Q1 2014

SafeNet‘s Breach Level Index report indicates that hackers stole more than 200 million records in the first quarter of 2014, a 233 percent increase as compared to the same period… Read more »

FireEye’s Darien Kindlund: New Tactics Needed Amid Changing Threat Landscape

FireEye’s Darien Kindlund: New Tactics Needed Amid Changing Threat Landscape

Darien Kindlund, director of research science at FireEye, says that today’s changing threat landscape needs a flexible cybersecurity defense to match. “As attackers shift their strategies, the cyber defense industry… Read more »

Cisco Unveils Malware Detection Service; Bryan Palma Comments

Cisco Unveils Malware Detection Service; Bryan Palma Comments

Cisco has rolled out a cybersecurity service meant to help customers detect advanced persistent threats and protect extended networks from malware intrusions. The Managed Threat Defense offering is comprised of… Read more »

Boeing, root9B Offer Updated Cyber Training Tool; Per Beith Comments

Boeing, root9B Offer Updated Cyber Training Tool; Per Beith Comments

Boeing has integrated its simulation and intelligence training platform with root9B‘s cybersecurity training content to help users develop new cyber tools. The Boeing Cyber Range-in-a-Box is built to contain virtual scenarios from… Read more »

MarketsandMarkets: Cloud Adoption, Wireless Communication to Drive Cyber Market’s Growth Through 2019

MarketsandMarkets: Cloud Adoption, Wireless Communication to Drive Cyber Market’s Growth Through 2019

A new five-year forecast from research firm MarketsandMarkets says cloud computing adoption and wireless communications will be among the forces that will drive growth in the global cybersecurity market through… Read more »

Tina Kuhn on Northrop’s Cyber Work with NATO and Intl Customers, the Budget Environment as a Catalyst for Change & Building Cyber Defenses From the Ground Up

Tina Kuhn on Northrop’s Cyber Work with NATO and Intl Customers, the Budget Environment as a Catalyst for Change & Building Cyber Defenses From the Ground Up

ExecutiveBiz recently spoke with Tina Kuhn, a top cybersecurity executive with Northrop Grumman Information Systems, on Northrop’s international expansion, opportunities for transformation within the government budget environment, how to “build-in”… Read more »

Carlos Fernandes on Salient Fed’s ‘Precognitive Capabilities’ in Cyber, the IPv6 Transition, and the Paradigm Shift Necessary to Protect American Networks

Carlos Fernandes on Salient Fed’s ‘Precognitive Capabilities’ in Cyber, the IPv6 Transition, and the Paradigm Shift Necessary to Protect American Networks

Carlos Fernandes joined Salient Federal Solutions in January to serve as director of its Cyber Security Center of Excellence and develop and implement the Fairfax, Va.-based IT, training and engineering… Read more »

Dell SecureWorks Launches Managed Threat Detection Service; Tyler Winkler Comments

Dell SecureWorks Launches Managed Threat Detection Service; Tyler Winkler Comments

Dell SecureWorks has added a new managed cybersecurity offering to its advanced threat services portfolio that works to help organizations block malicious programs. The Advanced Endpoint Threat Detection service is… Read more »

FireEye IDs Malware Evasion Tactics; Abhishek Singh Comments

FireEye IDs Malware Evasion Tactics; Abhishek Singh Comments

FireEye has updated a report that outlines techniques some malware authors use to evade a network infrastructure’s traditional defenses. The latest release of “Hot Knives Through Butter: Evading File-Based Sandboxes”… Read more »

Vormetric Enters Australia, New Zealand Cybersecurity Markets; Damian Harvey Comments

Vormetric Enters Australia, New Zealand Cybersecurity Markets; Damian Harvey Comments

Vormetric has extended its data protection technology business into the Australian and New Zealand markets in an effort to help more government and enterprise clients avoid cybersecurity problems. Damian Harvey,… Read more »

Deltek: Federal, State, Local CIOs Prioritize Cybersecurity

Deltek: Federal, State, Local CIOs Prioritize Cybersecurity

Cybersecurity has taken a higher place on the agendas of federal chief information officers in 2014 against a backdrop of emerging technologies, threat landscapes and IT workforce rosters, the Washington… Read more »

FireEye’s Greg Day: Knowing the Source of an Attack is Key to Finding Cybersecurity Solution

FireEye’s Greg Day: Knowing the Source of an Attack is Key to Finding Cybersecurity Solution

Greg Day, FireEye vice president and chief technology officer, said knowing the source of a cyberattack, what type of data is being compromised and how the security threat landscape is evolving over… Read more »

Rob Zitz on Leidos’ Transition to a Standalone Business, Cyber Trends and Infrastructure Support for DHS

Rob Zitz on Leidos’ Transition to a Standalone Business, Cyber Trends and Infrastructure Support for DHS

Rob Zitz joined Leidos in August 2011 — when it was known as Science Applications International Corp. — as senior vice president and chief ISR systems architect after a three-decade government career that culminated… Read more »

Raytheon Launches Updated Govt Cyber Monitoring Software; Steven Hawkins Comments

Raytheon Launches Updated Govt Cyber Monitoring Software; Steven Hawkins Comments

Raytheon has refreshed its cybersecurity software product that is intended to help federal agencies safeguard networks from insider threats and manage data privacy at the same time. The SureView platform works… Read more »

© 2014 ExecutiveBiz. All rights reserved.