Client Coverage
Client Coverage
News & Events

News Alerts

W2 Communications Sets Date and Location for Seventh Annual Run! Geek! Run!
5K Race Benefitting the Equal Footing Foundation will be on August 24, 2014
More News
Connect With Us
Client Coverage
June 17, 2014
ZeroFOX peels two from McAfee [Cybersecurity Roundup]
  June 13, 2014
Chrome Perfected: Fast, Massively Secure and Gloriously Private 
  June 12, 2014
Malwarebytes aims to stop zero-day exploits on Windows
  June 12, 2014
now Your Network 
  June 11, 2014
MegaPath Jumps Into Unified Communications 
  June 11, 2014
CounterPath, MegaPath partner to offer UC services 
  June 11, 2014 
P.F. Chang's the Latest Target?
  June 11, 2014
Evernote, Feedly Both Affected By Distributed Denial of Service Attack
  June 9, 2014
Digital Summit: Indoor Location Technologies Face Privacy Pushback 
  June 6, 2014
How the NSA can 'turn on' your phone remotely 
  June 5, 2014
A Privacy Capitalist Wins Big After Snowden 
  June 5, 2014
Security is a Journey, Not a Destination
  June 4, 2014
Facebook Couldn't Kill Snapchat. Can Apple?
  June 4, 2014
Security to Suffer Until Governments Get Their Acts Together
  June 4, 2014
Recent barrage of IE zero days highlights risk for enterprises
  June 4, 2014
Hyper-V Moves into the Fast Lane
  June 3, 2014
Social Media Dangers with ZeroFOX CEO James Foster
  June 3, 2014
Coolest Companies: Baltimore 
  June 3, 2014
Tech Start-Ups to Look Out For
  June 2, 2014
Following the framework: Government standards
  June 1, 2014
Be Vigilant About Protecting Sensitive Client Data With These Tools
  May 29, 2014
Anonymous, Inc: The Corporate Set Embraces Digital Ephemerality
  May 29, 2014
Iranian Hackers Targeted US Officials in Elaborate Social Media Attack Operation
  May 29, 2014
Feds grant five-year contract to Crofton's Force 3 [Cybersecurity Roundup]
  May 28, 2014
Why Silent Circle Moved its Headquarters to Switzerland
  May 28, 2014
Con Artist Harasses Aussie Apple Customers in Ransomware Attempt
  May 28, 2014
CryptoLocker Ransomware Competitor May Have Fatal Flow
  May 27, 2014
Did an undisclosed SMF 2.0.6 flow enable the AVAST forum breach?
  May 23, 2014
Survey Roundup: Compliance Effectiveness, Insider Threats
  May 22, 2014
Forget about fast lanes, who is worrying about secure lanes?
  May 20, 2014
Report: Companies more aware of insider threat, but lack policies, tools
  May 20, 2014
Enterprises Still Lax On Privileged User Access Controls
  MSN Logo May 18, 2014
NSA row sparks rush for encrypted email
  May 15, 2014
Android ransomware incident may be start of things to come
  May 12, 2014
New products of the week
  May 2, 2014
Behind The Blackphone: The Future Of Mobile Security
  May 2, 2014
Insider Threat Insights
  May 2, 2014
Reducing False Posititves When it Comes to Indicators of Compromise (IOCs)
  May 1, 2014
ZeroFOX Secures $10.7 Million to Tackle Social Threats
  April 30, 2014
ZeroFOX Grabs $10.7 Mln in round led by NEA
  April 30, 2014
Funding Daily: Very big private equity and very small microgadgets
  April 30, 2014
Emerging security technology: What's old is new again
  April 29, 2014
AOL Users Waiting to Exhale
  April 28, 2014
Privacy-centric Blackphone to run Nvidia Tegra 4i processor
  April 28, 2014
Geeksphone's versatile Revolution gets CyanogenMod 11 and another price cut
  April 28, 2014
Nvidia's Tegra chip powers ultrasecure Blackphone
  April 25, 2014
5 Things You Need to Know About Cybersecurity Insurance
  April 23, 2014
Cisco -- Recognized by NSS Labs and Very Serious About Cybersecurity
  April 23, 2014
Ultraprivate Smartphones: New models built with security and privacy in mind reflect the Zeitgeist of the Snowden era
  April 22, 2013
Secure data, not the device
  April 21, 2014
Protecting Critical Infrastructure
  April 21, 2014
Maybe the Cloud Can Help Secure the Internet
  April 18, 2014
The benefits of converged network security architecture
  April 17, 2014
Your repeat offenders aren't the insider threats
  April 17, 2014
Shaping the Threat Intelligence Market
  April 16, 2014
Encryption Services Protect Smartphones From Hackers
  April 16, 2014
Why security professionals need to get more creative with penetration testing (and how to do it)
April 15, 2014
Connecting the (Cloud) Dots
  April 15, 2014
Is SIEM up to the challenge?
  April 14, 2014
Here's What's on the Shelves of the Paranoia Market
  April 14, 2014
File access logs: Marcus Ranum surprised by NSA shortfall
  April 12, 2014
I think we've seen this before..."Why incident intelligence" is imperative
  March 28, 2014
Data breaches eroding usefulness of personal identification, argues new analysis
  March 27, 2014
Change Your Password? Fine. Change your SSN? Oh Dear...
  March 27, 2014
Locking More Than The Lock Screen: Top Security Apps For The Smartphone
  March 26, 2013
Study examines erosion of PII as massive breaches persist
  March 24, 2014
New products of the week: FactFinder v7 for Application-Aware Azure
  March 23, 2014
Give Me Back My Online Privacy
  March 21, 2014
What the Encryption King Thinks of NSA Spying
  March 21, 2014
March 20, 2014
Defense Firms Find Work Battling Corporate Hackers
  March 17, 2014
New methods for addressing insider threats: A roundtable discussion
  March 13, 2014
Taking Aim at the Energy Sector: Three Steps to Defend Against a Rising Number of Attacks
  March 13, 2014
Did Target Ignore Security Warnings?
  March 12, 2014
Can anti-virus technology morph into breach detection systems?
  March 12, 2014
Antivirus Software Not So Useless as People Say: Report
  March 12, 2014
A Call for a Highly Encrypted Future
     March 11, 2014
4 Govt. IT Trends From Mobile World Congress
  March 10, 2014
How will Cisco-Sourcefire security combo affect Cisco product roadmap?
  February 28, 2014
A Smartphone That Tries To Slip You Off The Grid
  February 28, 2014
Encryption Would Have Stopped Snowden From Using Secrets
  February 27, 2014
Video tutorial: What is Conficker?
  February 26, 2014
An NSA-proof phone?
  February 26, 2014
With Tech Outsourcing, The Internet Can Be 'A Scary Place'
  February 25, 2014
Security-driven Blackphone to sell for $629; will people pay the premium?
  February 25, 2014
Threat Manager Claims 100% Flaws in Cyber Security
  February 24, 2014
RSAC: Your Bank May Be Secure, But Its Third-Party Vendors Aren't
  February 24, 2014
Cisco Integrates Sourcefire Advanced Malware Protection Into Web, Email Gateways
  February 7, 2014
Mobile Hacking Fears Beset Visitors to Sochi Olympics
  February 7, 2014
Increase in Russian cyber-crime activity detected near Sochi
  February 6, 2014
11 Ways to Improve Your IT Team's Productivity
  February 5, 2014
Rebranded RSA Silver Tail Adds 3rd-Party Website Visibility
    February 4, 2014
Eliminating Hiring Bottlenecks in the Federal Government
  February 4, 2014
Where Do You Land Along the Digital Privacy Spectrum
  February 3, 2014
A fine mess: Global data breach legislation
  February 3, 2014
The Open Source (R)evolution: From Great Technology to Greater Intelligence
  February 3, 2014
Corero Launches New DDoS Protection Appliances for Service Providers
  February 3, 2014
Tenable SecurityCenter Continuous View
  January 30, 2014
A Phone for the Age of Snowden
  January 28, 2014
Stumbling Blocks That Faceplant Security Analytics Programs
  January 28, 2014
DDoS Just Won't Die
  January 27, 2014
Bay Dynamics Unveils Big-Data-Based Fix for Insider Threats

January 27, 2014
Michaels Stores Investigating Attack Targeting Payment Cards
  January 24, 2014
NSS Labs Intrusion Prevention Tests: Did Your Vendor Partner Pass?
  January 23, 2014
Homeland Security Makes Cybersecurity A Managed Service
  January 23, 2014
Civilian agencies can tap cross-domain info sharing tools
  January 23, 2014
Facebook gives bug bounty of $33.5K for Remote Code Execution flaw
  January 21, 2014
Washington area pops onto tech radar as alternative to Silicon Valley
  January 17, 2014
Citrix SalesIQ enablement platform goes live; plus more news
  January 15, 2014
Leaks detail NSA's arsenal for targeting disconnected computers
  January 15, 2014
5 Security Services To Consider in 2014
  January 11, 2014
Christie's staff should have used Snapchat
  January 10, 2014
Could Snapchat Have Saved Chris Christie
  January 10, 2014
Startups Often Focus On Data Security Too Late, If At All
  January 9, 2014
CNBC Explains: How to encrypt your email
  January 8, 2014
The case for forecasting cyberattacks
  January 8, 2014
Leaked NSA Hacking Tools, Tactics, In Focus
  January 8, 2014
Continuous auditing to fuel threat intelligence
  January 3, 2014
Snapchat to Target Breaches Show Holiday Season Vulnerability
  January 3, 2014
14 faces to watch in 2014: Chris Fedde
  January 2, 2014
Small tech best placed to take on Big Brother

January 1, 2014
French Contractors Jump Into Market for Secure Communications
  December 31, 2013
The security industry found its dream enemy in 2013. And new technical challenges, too
  December 31, 2013
Slide Show: 8 Effective Data Visualization Methods for Security Teams
December 24, 2013
The Top 10 Data Center Stories of 2013
  December 23, 2013
NSA Fallout in Europe Boosts Alternative to Google
  December 23, 2013
The Biggest Privacy Stories of 2013
  December 23, 2013
50 best Android apps of 2013
  December 23, 2013
Silent Circle Announces Silent Contacts 1.0 App For Android
  December 23, 2013
A growing threat: Privileged user abuse
  December 23, 2013
Does retail security take a backseat during the 'holiday IT lockdown'?
  December 19, 2013
Podcast: The Idea Behind a Global Bug Bounty Program
  December 18, 2013
Researchers propose international vulnerability purchase plan
  December 16, 2013
Cybercrime shopping list study points to falling prices
  December 12, 2013
Companies Unprepared for DDoS Attaches
  December 11, 2013
The continuing DDoS innovation trajectory
  December 10, 2013
'Mystery' Malware Files Often Missed in Cleanup
  December 10, 2013
Zero-day exploits: Separating fact from fiction
  December 10, 2013
Your Network's Been Hacked: Get Used to It
  December 10, 2013
Bug Bounty Flaws Remain Unpatched for 151 Days: Study
  December 10, 2013
Defending against APTs: Looking for the big picture
  December 9, 2013
Hacking The Zero-Day Vulnerability Market
  December 9, 2013
Real-Time Big Data Security Analytics Incident Detection
  December 6, 2013
Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates
  December 5, 2013
Study finds zero-day vulnerabilities abound in popular software
  December 5, 2013
Technology Can Drive Federal Hiring Reform
  December 2, 2013
World War Z: Security Solutions Treat Symptoms, Not Causes
  December 1, 2013
New Zealand companies set up shop in Arlington
  November 26, 2013
Survey: DDoS is Hot, Planning is Not
  November 22, 2013
Treatment options for device split personality
  November 21, 2013
Many organizations struggle to define mobile work/play boundries
  November 18, 2013
History of Computer Viruses, Part 1: The Early Days
  November 15, 2013
Cyber security insurance grows in popularity
  November 11, 2013
Sourcefire's founder's advice on building a company that sells for $2.7billion
  November 6, 2013
After Sale to Cisco, Sourcefire Founder Roesch Strives to Keep Things Unchanged
  November 6, 2013
SDN Market to Surge as Cloud Computing Grows, Research Firm Says
  November 4, 2013
Managing Server Performance? Stop Using Server Management Tools
  November 1, 2013
Study: Among top browsers, IE catches most socially engineered attacks
  November 1, 2013
How Dark Mail Plans to Build an Open, Secure Email Platform
  October 30, 2013
Lavabit And Silent Circle Join Forces To Make All Email Surveillance-Proof
  October 28, 2013
Internet Explorer vastly superior at defeating social engineering attacks
  October 21, 2013
Security tool keeps data safe across collaboration systems
  October 15, 2013
The Keys to the Data Security Analytics Solutions: Algorithms, Visualization, Context, and Automation (AVCA)
  October 11, 2013
Commercial tools playing extended role in cyberops
  October 8, 2013
KEYW Subsidiary launches new cyber defense product
  October 4, 2013
NPR's Science Friday: "Cracking Open Encryption Standards"
  October 1, 2013
Understanding the Written Foreign Language
September 30, 2013
The Next Wave of Cloud Computing
  September 16, 2013
20 essential business apps for iPhone and iPad
  September 15, 2013
Encryption goes mainstream
  September 13, 2013
What's in Our ITaaS Shopping Cart?
  September 12, 2013
MegaPath Offers Cloud Capacity Assessment Service
  September 7, 2013
How the N.S.A. Cracked the Web
  August 18, 2013
China Video Tools for U.S. Help Spurs Spy Anxiety
  August 16, 2013
Researchers Seek Better Ways to Track Malware's Family Tree
  August 14, 2013
NPulse adds full indexing to 10g packet capture appliance
  August 12, 2013
Zimmermann's Law
  August 8, 2013
State Governments Must Think Critically About Cybersecurity
  July 28, 2013
Sourcefire founder: Cisco deal is 'a good match'
  July 24, 2013
Internet Explorer Protects Your Privacy Better than Chrome. Really!
  July 19, 2013
Mastering Big Data
   July 16, 2013
MegaPath battles cable with asymmetric 50/10 Mbps Ethernet offering
  July 10, 2013
Enterprise IT Ops with BlueStripe and Microsoft Systems Center
  July 1, 2013
How to Keep Your Apps Running Optimally: 10 Best Practices 
  June 28, 2013
HR Can't Ignore Big Data
  June 17, 2013
Securing the Internet in a Post 9/11 World
  June 14, 2013
Hiding Your Calls and Texts From Big Brother
  June 3, 2013
Op-ed: Six Ways to Reach Millenial Job Seekers
  May 31, 2013
Cyber Attacks Mean Big Business for Small Security Firms
  May 16, 2013
The Year of the Hybrid Cloud
  April 18, 2013
Building a Hackproof Network
  April 4, 2013
How to Overcome SharePoint Performance Headaches
March 25, 2013
Who has responsibility for cloud security? A Network World roundtable

March 20, 2013
Next-generation firewalls are actually getting better
  March 7, 2013
Accellion Launches Global Partner Program
  February 5, 2013
Security Pioneer Creates Services to Encrypt Phone Calls & Text Messages
  February 4, 2013
Roesch: Media Hackings Politically Motivated