-
H7 Security Systems, Lincasia in strategic partnership
H7’s Silent Soldier, and intelligent monitoring and surveillance system designed for critical infrastructure, military installations, border crossings, and more, received the prestigious Frost & Sullivan 2006 product innovation award, and has been contracted to deploy it in India and China; the company has entered into a strategic partnership with Lincasia, and will incorporate the latter’s technology into the system
-
-
Probaris helps SSA to come into HSPD-12 compliance
Federal agencies and contractors working with these agencies have until 27 October to comply with various HSPD-12 mandates, chief among them FIPS-201; the SSA is no exception, and it is relying on Probaris for help
-
-
SafeNet delays filing Form 10-Q, risking delisting
IT security behemoth delayed filing Form 10-Q at the end of June as required, resulting in a pointed note from NASDAQ that the company risked delisting unless it came into compliance, and an equally pointed note from Citibank that that failure also cast a pall over the issuance of its $250 million 2.5 percent convertible subordinated notes due 2010
-
-
Government and private sector to meet 16 August in Atlanta
The Georgia Tech Information Center hosts the inaugural GFIRST-USSS/ECTF-Infragard meeting
-
-
SafeNet and By Light announce partnership to deliver encryption services
Two companies, one expert in encryption, the other in engineering, team up to deliver turn-key encryption services to the Department of Defense.
-
-
Blue Lane Technologies announces inline patch for Windows server vulnerability
Blue Lane today announced the imediate availability of an inline patch that eliminates a critical RPC protocol vulnerability in the Windows Server Service.
-
-
CipherTrust up 400 percent in second quarter
Webmail, and messaging security solutions provider is up 400 percent this second quarter over last year during the same period owing to important contracts and a special certification; this could be a company you might want to keep an eye on
-
-
Avamar a partner in Sun Microsystems’ program for ISVs
Avamar is selected as a principal partner in Sun’s Partner Advantage Program
-
-
InfoZen awarded CMMI Maturity Level 2
Its all about process and control, and InfoZen, a developer of software solutions which help organizations monitor their operations and make them more efficient, wins important recognition
-
-
Trend: Government demand for data-mining applications grows
The NSA’s wire snooping on Americans is but the tip of the iceberg; the government’s voracious appetite for ever-greater amounts of information for the battle against terrorism offer an opportunity for companies which develop data-mining solutions
-
-
Fighting Illini to work on data processing technology for DHS
DHS awards University of Illinois a contract to develop data-mining software
-
-
IEEE calls for increased investment in cybersecurity
The leading electronic engineering organization warns of vulnerability of U.S. IT infrastructure, and calls for more investment in it
-
-
Better protection against wireless leaks of information
With more and more sensitive government and corporate information being transmitted wirelessly, there is a growing need to thwart and mitigate the unauthorized wireless leaking of information; A California company has something to offer
-
-
Hackers ply their trade for financial gain
Hackers used to be introverted, angry young men with acne who felt misunderstood and sought compensation in beating the system; many of them are still young and angry, but they have become more money-oriented in their activities
-
-
Promisec, corporate security specialist, raises $2.4 million
More damage is done to companies by disgruntled or malicious employees, and Promisec offers a solution which may alleviate this particular problem
-
More headlines
The long view
Political Violence Offers Extremist “Trigger Events” for Recruiting Supporters
Extremists are exploiting political violence by using online platforms to recruit new people to their causes and amplify the use of violence for political goals. High-profile incidents of political violence are useful trigger events for justifying extremist ideologies and calls for retaliation.
Fake survey Answers from AI Could Quietly Sway Election Predictions
Public opinion polls and other surveys rely on data to understand human behavior. New research reveals that artificial intelligence can now corrupt public opinion surveys at scale—passing every quality check, mimicking real humans, and manipulating results without leaving a trace.
Building Trust into Tech: A Framework for Sovereign Resilience
Governments are facing a critical question: who can be trusted to build and manage their countries’ most sensitive systems? Vendor choices, for everything from cloud infrastructure to identity platforms, are no longer just commercial; they are strategic.
Researchers Unveil First-Ever Defense Against Cryptanalytic Attacks on AI
Security researchers have developed the first functional defense mechanism capable of protecting against “cryptanalytic” attacks used to “steal” the model parameters that define how an AI system works.
