Search

Search results

  1. Homeland Security Chief Talks Cybersecurity at Major Conference

    ... couldn’t be in California today for Department of Homeland Security (DHS) Secretary Jeh Johnson’s address at the largest cybersecurity ... Cyber Tags:  Department of Homeland Security ...

  2. Association Launches Website for Careers in Security

    April 14, 2015 The Electronic Security Association (ESA), a professional trade association that represents the electronic life safety and security industry, launched a website geared at connecting people interested in ...

  3. DOD's New Cyber Strategy Concedes Offensive Ops

    ... challenged,” Mike Lloyd, chief technology officer for the security analytics company RedSeal, said of the department’s strategy. ... but that represented a steady back pressure on prosperity, security and trade. Eventually, military means had to be used—cracking down ...

  4. Webinars

    ... On-Demand Webinars M2M Cyber Security: Protecting Mission-Critical Systems at the Edge Recorded: April ...

  5. Exhibitor Discount Package

    ... Identity Summit (September) Intelligence and National Security Summit (September) MILCOM (October) TechNet Europe (October) ... Air Force ISR Industry Day (February) Homeland Security Conference (TBD) NGA Industry Day (March) TechNet Air (March) ...

  6. A Three-Pronged Attack Against Cybersecurity Threats

    ... deployed, and work together, to ensure lock-down security. Technology With the number of devices and users rapidly ... access management, intrusion prevention and detection, and security incident and event management or log management as “top tier” ...

  7. AFCEA Leadership Series: Five Questions

    ... Lt. Gen. Kenneth Minihan , USAF (Ret.), director, National Security Agency and Central Security Service. Gen. Anthony Zinn i, USMC (Ret.), ...

  8. The President's Next Cellphone

    ... with two senior technical executives from the National Security Agency (NSA) to discuss classified mobility. We initially focused on ... and helps with attestation because there are significant security techniques implemented in a virtualized cloud environment that cannot ...

  9. Improved Security Slipping Through the Video Vortex

    ... leveraging the information to achieve the goal—improved security. An overwhelming 99 percent of survey participants said video ... data asset across agencies, which is where physical security and information technology need to get on the same screen, survey ...

  10. MOUNTING A VIGOROUS DEFENSE IN DEPTH

    ... who are really good at external validation of enterprise security posture. There are some folks so good that nothing will totally stop ... there are steps you can take to dramatically enhance the security of your enterprise. I’ve reviewed some of these before, like ...

Pages