HID Global Predicts Top Trends in ID Technology for 2017 (Video)
HID Global, forecasts a shift in the use of identity technology that will lead to increased adoption of mobile devices and the latest smart card technology, a greater emphasis and reliance on...
Winners of ONC App Challenge for Health Info Access Selected
The Department of Health and Human Services’ Office of the National Coordinator for Health Information Technology (ONC) has announced the Phase 2 winners for the Consumer Health Data Aggregator Challenge and...
USAF Selects Diligent for Transition of COMSEC Tracking to Joint Program
Diligent Consulting, has been awarded the Air Force Communications Secure (COMSEC) and Controlled Cryptographic Items (CCI) Accountability and Tracking (COMSEC/CCI) Tool program, a $1,576,455 contract under the NETCENTS-2 Application Services Small...
Vencore to Work With DARPA to Optimize Airborne Communications
Vencore's innovative research arm, Vencore Labs, has been awarded a prime contract on the U.S. Defense Advanced Research Projects Agency’s (DARPA) Dynamic Network Adaptation for Mission Optimization (DyNAMO) program. The 17-month...
BeyondTrust Offers Free Retina IoT Vulnerability Scanner (Infographic)
BeyondTrust, a 2016 'ASTORS' Homeland Security Awards Program winner, and a leading cyber security company dedicated to preventing privilege misuse and stopping unauthorized access, today announced the Retina IoT (RIoT) Scanner.
Powered...
New iCommand 2.5 Delivers Improved Performance & Scalability (Video)
Textron Systems Advanced Information Solutions, an operating unit of Textron Systems, has released the new version of its iCommand® integrated command suite, iCommand 2.5.
iCommand 2.5 collates and collapses previously disparate data...
Security & Privacy in Context: Enigma – a USENIX Conference (Video)
Enigma, a USENIX Conference features current and emerging threats and defenses in the growing intersection of society and technology.
Join a diverse mix of experts and enthusiasts from industry, academia, and government for...
Mosaic451 Awarded Cyber Security Contract for State of Arizona
Mosaic451, a cybersecurity services provider and consultancy, announced today that the company was awarded a master agreement by the State of Arizona to provide cybersecurity services including monitoring, management and administration...
Botnet-Powered IoT Devices Create New Avenues of Attack (Learn More)
The leading cybercrime trend this year is botnets powered by compromised Internet-of-Things (IoT) devices according to the new report by cyber threat intelligence provider SurfWatch Labs.
In 2016, the amount of data...
DOD Cyber Contractor EITC Acquired by MacAulay-Brown
Enlighten IT Consulting (EITC) has been acquired MacAulay-Brown, Inc. (MacB), an advanced engineering, cyber security, and product solutions company that serves the Defense, Intelligence, and Homeland Security markets.
EITC will become a...