Client Coverage
Client Coverage
 
News & Events

News Alerts

W2 Communications Sets Date and Location for Seventh Annual Run! Geek! Run!
5K Race Benefitting the Equal Footing Foundation will be on August 24, 2014
 
More News
Connect With Us
Client Coverage
  May 2, 2014
Behind The Blackphone: The Future Of Mobile Security
 
       
  May 2, 2014
Insider Threat Insights
 
       
  May 2, 2014
Reducing False Posititves When it Comes to Indicators of Compromise (IOCs)
 
       
  May 1, 2014
ZeroFOX Secures $10.7 Million to Tackle Social Threats
 
       
  April 30, 2014
ZeroFOX Grabs $10.7 Mln in round led by NEA
 
       
  April 30, 2014
Funding Daily: Very big private equity and very small microgadgets
 
       
  April 30, 2014
Emerging security technology: What's old is new again
 
       
  April 29, 2014
AOL Users Waiting to Exhale
 
       
  April 28, 2014
Privacy-centric Blackphone to run Nvidia Tegra 4i processor
 
       
  April 28, 2014
Geeksphone's versatile Revolution gets CyanogenMod 11 and another price cut
 
       
  April 28, 2014
Nvidia's Tegra chip powers ultrasecure Blackphone
 
       
  April 25, 2014
5 Things You Need to Know About Cybersecurity Insurance
 
 
       
  April 23, 2014
Cisco -- Recognized by NSS Labs and Very Serious About Cybersecurity
 
       
  April 23, 2014
Ultraprivate Smartphones: New models built with security and privacy in mind reflect the Zeitgeist of the Snowden era
 
       
  April 22, 2013
Secure data, not the device
 
       
  April 21, 2014
Protecting Critical Infrastructure
 
       
  April 21, 2014
Maybe the Cloud Can Help Secure the Internet
 
 
       
  April 18, 2014
The benefits of converged network security architecture
 
       
  April 17, 2014
Your repeat offenders aren't the insider threats
 
       
  April 17, 2014
Shaping the Threat Intelligence Market
 
       
  April 16, 2014
Encryption Services Protect Smartphones From Hackers
 
       
  April 16, 2014
Why security professionals need to get more creative with penetration testing (and how to do it)
 
       
 
April 15, 2014
Connecting the (Cloud) Dots
 
 
       
  April 15, 2014
Is SIEM up to the challenge?
 
       
  April 14, 2014
Here's What's on the Shelves of the Paranoia Market
 
       
  April 14, 2014
File access logs: Marcus Ranum surprised by NSA shortfall
 
       
  April 12, 2014
I think we've seen this before..."Why incident intelligence" is imperative
 
       
  March 28, 2014
Data breaches eroding usefulness of personal identification, argues new analysis
 
       
  March 27, 2014
Change Your Password? Fine. Change your SSN? Oh Dear...
 
       
  March 27, 2014
Locking More Than The Lock Screen: Top Security Apps For The Smartphone
 
       
  March 26, 2013
Study examines erosion of PII as massive breaches persist
 
       
  March 24, 2014
New products of the week: FactFinder v7 for Application-Aware Azure
 
       
  March 23, 2014
Give Me Back My Online Privacy
 
       
  March 21, 2014
What the Encryption King Thinks of NSA Spying
 
       
  March 21, 2014
APTs
 
       
 
March 20, 2014
Defense Firms Find Work Battling Corporate Hackers
 
       
  March 17, 2014
New methods for addressing insider threats: A roundtable discussion
 
       
  March 13, 2014
Taking Aim at the Energy Sector: Three Steps to Defend Against a Rising Number of Attacks
 
       
  March 13, 2014
Did Target Ignore Security Warnings?
 
       
  March 12, 2014
Can anti-virus technology morph into breach detection systems?
 
       
  March 12, 2014
Antivirus Software Not So Useless as People Say: Report
 
       
  March 12, 2014
A Call for a Highly Encrypted Future
 
       
     March 11, 2014
4 Govt. IT Trends From Mobile World Congress
 
 
       
  March 10, 2014
How will Cisco-Sourcefire security combo affect Cisco product roadmap?
 
       
  February 28, 2014
A Smartphone That Tries To Slip You Off The Grid
 
       
  February 28, 2014
Encryption Would Have Stopped Snowden From Using Secrets
 
       
  February 27, 2014
Video tutorial: What is Conficker?
 
       
  February 26, 2014
An NSA-proof phone?
 
       
  February 26, 2014
With Tech Outsourcing, The Internet Can Be 'A Scary Place'
 
       
  February 25, 2014
Security-driven Blackphone to sell for $629; will people pay the premium?
 
       
  February 25, 2014
Threat Manager Claims 100% Flaws in Cyber Security
 
       
  February 24, 2014
RSAC: Your Bank May Be Secure, But Its Third-Party Vendors Aren't
 
       
  February 24, 2014
Cisco Integrates Sourcefire Advanced Malware Protection Into Web, Email Gateways
 
       
  February 7, 2014
Mobile Hacking Fears Beset Visitors to Sochi Olympics
 
       
  February 7, 2014
Increase in Russian cyber-crime activity detected near Sochi
 
       
  February 6, 2014
11 Ways to Improve Your IT Team's Productivity
 
       
  February 5, 2014
Rebranded RSA Silver Tail Adds 3rd-Party Website Visibility
 
       
    February 4, 2014
Eliminating Hiring Bottlenecks in the Federal Government
 
 
       
  February 4, 2014
Where Do You Land Along the Digital Privacy Spectrum
 
       
  February 3, 2014
A fine mess: Global data breach legislation
 
       
  February 3, 2014
The Open Source (R)evolution: From Great Technology to Greater Intelligence
 
       
  February 3, 2014
Corero Launches New DDoS Protection Appliances for Service Providers
 
       
  February 3, 2014
Tenable SecurityCenter Continuous View
 
       
  January 30, 2014
A Phone for the Age of Snowden
 
       
  January 28, 2014
Stumbling Blocks That Faceplant Security Analytics Programs
 
       
  January 28, 2014
DDoS Just Won't Die
 
       
  January 27, 2014
Bay Dynamics Unveils Big-Data-Based Fix for Insider Threats
 
       
 


January 27, 2014
Michaels Stores Investigating Attack Targeting Payment Cards
 
       
  January 24, 2014
NSS Labs Intrusion Prevention Tests: Did Your Vendor Partner Pass?
 
       
  January 23, 2014
Homeland Security Makes Cybersecurity A Managed Service
 
       
  January 23, 2014
Civilian agencies can tap cross-domain info sharing tools
 
       
  January 23, 2014
Facebook gives bug bounty of $33.5K for Remote Code Execution flaw
 
 
       
  January 21, 2014
Washington area pops onto tech radar as alternative to Silicon Valley
 
       
  January 17, 2014
Citrix SalesIQ enablement platform goes live; plus more news
 
       
  January 15, 2014
Leaks detail NSA's arsenal for targeting disconnected computers
 
       
  January 15, 2014
5 Security Services To Consider in 2014
 
       
  January 11, 2014
Christie's staff should have used Snapchat
 
       
  January 10, 2014
Could Snapchat Have Saved Chris Christie
 
       
  January 10, 2014
Startups Often Focus On Data Security Too Late, If At All
 
       
  January 9, 2014
CNBC Explains: How to encrypt your email
 
       
  January 8, 2014
The case for forecasting cyberattacks
 
       
  January 8, 2014
Leaked NSA Hacking Tools, Tactics, In Focus
 
       
  January 8, 2014
Continuous auditing to fuel threat intelligence
 
       
  January 3, 2014
Snapchat to Target Breaches Show Holiday Season Vulnerability
 
       
  January 3, 2014
14 faces to watch in 2014: Chris Fedde
 
       
  January 2, 2014
Small tech best placed to take on Big Brother
 
 
       
 


January 1, 2014
French Contractors Jump Into Market for Secure Communications
 
       
  December 31, 2013
The security industry found its dream enemy in 2013. And new technical challenges, too
 
       
  December 31, 2013
Slide Show: 8 Effective Data Visualization Methods for Security Teams
 
       
 
December 24, 2013
The Top 10 Data Center Stories of 2013
 
 
         
  December 23, 2013
NSA Fallout in Europe Boosts Alternative to Google
   
         
  December 23, 2013
The Biggest Privacy Stories of 2013
 
       
  December 23, 2013
50 best Android apps of 2013
 
       
  December 23, 2013
Silent Circle Announces Silent Contacts 1.0 App For Android
 
       
  December 23, 2013
A growing threat: Privileged user abuse
 
       
  December 23, 2013
Does retail security take a backseat during the 'holiday IT lockdown'?
 
       
  December 19, 2013
Podcast: The Idea Behind a Global Bug Bounty Program
 
       
  December 18, 2013
Researchers propose international vulnerability purchase plan
 
       
  December 16, 2013
Cybercrime shopping list study points to falling prices
 
       
  December 12, 2013
Companies Unprepared for DDoS Attaches
 
       
  December 11, 2013
The continuing DDoS innovation trajectory
 
       
  December 10, 2013
'Mystery' Malware Files Often Missed in Cleanup
 
       
  December 10, 2013
Zero-day exploits: Separating fact from fiction
 
       
  December 10, 2013
Your Network's Been Hacked: Get Used to It
 
       
  December 10, 2013
Bug Bounty Flaws Remain Unpatched for 151 Days: Study
 
       
  December 10, 2013
Defending against APTs: Looking for the big picture
 
       
  December 9, 2013
Hacking The Zero-Day Vulnerability Market
 
       
  December 9, 2013
Real-Time Big Data Security Analytics Incident Detection
 
       
  December 6, 2013
Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates
 
       
  December 5, 2013
Study finds zero-day vulnerabilities abound in popular software
 
       
  December 5, 2013
Technology Can Drive Federal Hiring Reform
 
       
  December 2, 2013
World War Z: Security Solutions Treat Symptoms, Not Causes
 
 
       
  December 1, 2013
New Zealand companies set up shop in Arlington
 
       
  November 26, 2013
Survey: DDoS is Hot, Planning is Not
 
       
  November 22, 2013
Treatment options for device split personality
 
       
  November 21, 2013
Many organizations struggle to define mobile work/play boundries
 
       
  November 18, 2013
History of Computer Viruses, Part 1: The Early Days
 
       
  November 15, 2013
Cyber security insurance grows in popularity
 
       
  November 11, 2013
Sourcefire's founder's advice on building a company that sells for $2.7billion
 
       
  November 6, 2013
After Sale to Cisco, Sourcefire Founder Roesch Strives to Keep Things Unchanged
 
       
  November 6, 2013
SDN Market to Surge as Cloud Computing Grows, Research Firm Says
 
       
  November 4, 2013
Managing Server Performance? Stop Using Server Management Tools
 
       
  November 1, 2013
Study: Among top browsers, IE catches most socially engineered attacks
 
       
  November 1, 2013
How Dark Mail Plans to Build an Open, Secure Email Platform
 
       
  October 30, 2013
Lavabit And Silent Circle Join Forces To Make All Email Surveillance-Proof
 
         
  October 28, 2013
Internet Explorer vastly superior at defeating social engineering attacks
   
         
  October 21, 2013
Security tool keeps data safe across collaboration systems
 
       
  October 15, 2013
The Keys to the Data Security Analytics Solutions: Algorithms, Visualization, Context, and Automation (AVCA)
 
       
  October 11, 2013
Commercial tools playing extended role in cyberops
 
       
  October 8, 2013
KEYW Subsidiary launches new cyber defense product
 
       
  October 4, 2013
NPR's Science Friday: "Cracking Open Encryption Standards"
 
       
  October 1, 2013
Understanding the Written Foreign Language
 
       
 
September 30, 2013
The Next Wave of Cloud Computing
 
 
       
  September 16, 2013
20 essential business apps for iPhone and iPad
 
       
  September 15, 2013
Encryption goes mainstream
 
       
  September 13, 2013
What's in Our ITaaS Shopping Cart?
 
       
  September 12, 2013
MegaPath Offers Cloud Capacity Assessment Service
 
       
  September 7, 2013
How the N.S.A. Cracked the Web
 
       
  August 18, 2013
China Video Tools for U.S. Help Spurs Spy Anxiety
 
       
  August 16, 2013
Researchers Seek Better Ways to Track Malware's Family Tree
 
       
  August 14, 2013
NPulse adds full indexing to 10g packet capture appliance
 
  August 12, 2013
Zimmermann's Law
 
  August 8, 2013
State Governments Must Think Critically About Cybersecurity
 
       
  July 28, 2013
Sourcefire founder: Cisco deal is 'a good match'
 
       
  July 24, 2013
Internet Explorer Protects Your Privacy Better than Chrome. Really!
 
       
  July 19, 2013
Mastering Big Data
 
       
   July 16, 2013
MegaPath battles cable with asymmetric 50/10 Mbps Ethernet offering
 
       
  July 10, 2013
Enterprise IT Ops with BlueStripe and Microsoft Systems Center
 
 
       
  July 1, 2013
How to Keep Your Apps Running Optimally: 10 Best Practices 
 
       
  June 28, 2013
HR Can't Ignore Big Data
 
       
  June 17, 2013
Securing the Internet in a Post 9/11 World
 
       
  June 14, 2013
Hiding Your Calls and Texts From Big Brother
 
       
  June 3, 2013
Op-ed: Six Ways to Reach Millenial Job Seekers
 
       
  May 31, 2013
Cyber Attacks Mean Big Business for Small Security Firms
 
       
  May 16, 2013
The Year of the Hybrid Cloud
 
       
  April 18, 2013
Building a Hackproof Network
 
       
  April 4, 2013
How to Overcome SharePoint Performance Headaches
 
       
 
March 25, 2013
Who has responsibility for cloud security? A Network World roundtable

 
       
 
March 20, 2013
Next-generation firewalls are actually getting better
 
 
       
  March 7, 2013
Accellion Launches Global Partner Program
 
       
  February 5, 2013
Security Pioneer Creates Services to Encrypt Phone Calls & Text Messages
 
       
  February 4, 2013
Roesch: Media Hackings Politically Motivated
 
       
 
November 16, 2012
Xceedium’s Glenn Hazard performing a post-Sandy ‘balancing act’
 
       
  October 16, 2012
2013: The Next Frontier of Cloud
 
       
  October 3, 2012
Securing Enterprise Data Inside Mobile Devices: 10 Way sto Keep it Safe
 
       
  October 2, 2012
See it, protect it, control it: A roundtable discussion
 
 
       
 

September 27, 2012
Internet Explorer Blocks More Malware Than Firefox, Chrome, Safari

 
       
 

September 27, 2012
You might be surprised at which Web browser aced this security test

 
       
 

September 27, 2012
Internet Explorer Shines in NSS Labs Browser Security Test

 
       
  September 26, 2012
Integration is the Name of the Game
 
       
 

September 19, 2012
Military Intelligence Demands More Mobile + Flexible SCIF

 
       
 

September 13, 2012
KEYW to acquire Sensage in deal worth up to $34.5M

 
       
 

September 13, 2012
KEYW Agrees To Acquire Privately Held Sensage Inc. - Quick Facts

 
       
 

September, 13, 2012
KEYW Corporation (KEYW) Acquires Sensage for $18 Million Cash Plus Stock

 
       
  September 13, 2012
MegaPath serves up set of new cloud hosted services
 
       
 

September 10, 2012
Can the cloud really keep a (government) secret?

 
       
  September 19, 2012
People: David Mountain
 
       
  September 13, 2012
Trailer Technologies Offers Capabilities Beyond Simple Asset Management
 
       
 

September 9, 2012
Why are companies so bad at responding to data breaches?

 
       
  September 4, 2012
Husqvarna Group Selects BlueStripe’s FactFinder for Transaction Management
 
       
 

September 4, 2012
MTN, Jetstream Partner to Launch Maritime HD Streaming Video Service

 
       
    September 4, 2012
Inconsistent Measurement, Coordination Stunting Security Management Progress
 
       
 

August 31, 2012
Using Personal File-Sharing Sites for Corporate Data

 
       
    August 29, 2012
Survey says: Your security measuring stick stinks
 
       
    August 29, 2012
Key challenges in proactive threat management
 
       
 

August 28, 2012
M2M Transportation: Tracking Assets for the Enterprise

 
       
 

August 28, 2012
MTN Worldwide TV is now available to more ships

 
       
    August 28, 2012
Survey Tracks Security’s "Bad Mood" Trend, Need for Improvement
 
       
  August 28, 2012
Security Management Challenged by Inconsistent Measurement, Survey Finds
 
       
  August 28, 2012
Survey Tracks Security’s ‘Bad Mood’ Trend, Need for Improvement
 
       
 

August 27, 2012
Husqvarna’s e-commerce app to unify workflow with business partners, factories

 
       
 

August 27, 2012
The Importance of Transaction Monitoring in the Cloud

 
       
 

August 27, 2012
Fleets Expect More from Asset-Tracking Systems

 
       
   

August 27, 2012
Vendors roll out new tools for securing VMware environments

 
       
 

August 23, 2012
Readers' Votes Determine Top 50 Channel Programs of 2012

 
       
 

August 24, 2012: Strategy
18 Mobile Productivity Apps

 
       
 

August 22, 2012
People: Gregory Burnell

 
       
 

August 21, 2012
Even More Security Pros Discuss US Cybersecurity Laws

 
       
 

August 20, 20212
CCSi, Foreground Security Win $30M to Support Medicare & Medicaid Services; David Amsler Comments

 
       
 

August 17, 2012
MegaPath Opens New Sales Office in Phoenix

 
       
 

August 16: 2012
Executive Profile: Lisa Brown, President of Raytheon Trusted Computer Solutions

 
       
  August 13, 2012
Leaky Buckets: The IT Risks From File-Sharing Services
 
       
 

August 13, 2012
Cybersecurity Experts Blast US IT Security Legislation

 
       
  August 10, 2012
MegaPath Moves Back to Pleasanton
 
       
 

August 10, 2012
Raytheon Developing Secure Redisplay Client For Its Trusted Thin Client System

 
       
 

August 9, 2012
Raytheon unveils broadened cross domain strategy

 
       
   

August 8, 2012