“Every cutter, boat or aircraft these days has not only embedded navigation and command and control and communications systems, but even for example, on a Coast Guard cutter, the whole machinery and equipment that operates the main propulsion depends on networked technology that we must harden and protect from cyberspace threats,” Lunday told the Federal Drive with Tom Temin.

USCG Cyber Command ‘As Important as Cutters & Aircraft’ (Multi-Video)

By David Thornton, Federal News Radio The U.S. Coast Guard has a split-identity – it’s a military service, but it falls under the purview of the Homeland Security Department, not the Defense...
Autopsy—an open-source, digital forensics platform used by law enforcement agencies worldwide to determine how a digital device was used in a crime and recover evidence—is being enhanced with the addition of several new capabilities requested by law enforcement.

S&T Enhancing the Autopsy Digital Forensics Tool

Nearly every crime committed today involves digital media, such as computers and cell phones. In most cases, these devices contain vital evidence, including call logs, location information, text and email messages,...

Guilty Pleas in Computer Crime Cases Involving Massive DDoS Attacks (Videos)

The Justice Department have announced today the guilty pleas in three high-profile cybercrime cases.  In the District of Alaska, defendants pleaded guilty to creating and operating two botnets, which targeted “Internet of...
Rishi Bhargava, co-founder and vice president of marketing at Demisto.

Demisto Enterprise Wins Two 2017 ‘ASTORS’ Homeland Security Awards

Demisto, an innovator in Security Automation and Orchestration technology, has won two awards in the 2017 'ASTORS' Homeland Security Awards Program from American Security Today, (AST). The Demisto Enterprise Security Operations Platform...

Executive Order Holds Agency Heads Responsible for Cyber Risks

Guest editorial by Richard Smith, CACI Vice President for Enterprise IT and Dabney Kern, CACI Senior Vice President for Homeland and National Defense  The recently released 2018 federal budget includes an Executive...

Mass Shooting Alerts Transmitted by TerrorMate Globally (See Video)

TerrorMate, the world’s first terror alert app, and 2017 Platinum ‘ASTORS’ Award Winner for Best Video Data Storage Solution, is expanding its user alert capabilities to include mass shootings. The real-time intelligence system with well-established terror...
Office of the Director of National Intelligence (ODNI)

News on Superconducting Computing Tech for Intel Community (Learn…)

A Raytheon BBN Technologies-led team is developing prototype cryogenic memory arrays and a scalable control architecture under an award from the Intelligence Advanced Research Projects Activity (IARPA) Cryogenic Computing Complexity (C3)...
The rise in the threat level clearly requires a concerted response.  In response SWIFT and BAE Systems have produced a detailed report for SWIFT customers that outlines attack techniques and counter measures.

The Evolving Cyber Threat to the Banking Community (Multi-Video)

Groups behind attacks on the financial services industry are deploying ever more creative techniques to access critical infrastructure. Our adversaries are prepared to invest considerable time in planning and preparing for...
Bill Mann, chief product officer at Centrify

Centrify Innovations Embraces Zero Trust Security (Learn More, Videos)

Centrify, the leader in securing hybrid enterprises through the power of identity services, and the 2017 Platinum ‘ASTORS’ Award Winner for Best Cyber Security for ID Mgmt & Access Control, has announced its Zero Trust approach to security....

Antiquated Fed Procurement Regs Stifles Innovation (Learn More, Video)

By Cory Crowley, Innovative Engineering Solutions of America (IESA) In an age of innovation and enlightenment, entrepreneurs are rapidly changing the product landscape. Breakthrough advances in science and technology continue to shape future life,...