Search

Search results

  1. MOUNTING A VIGOROUS DEFENSE IN DEPTH

    ... who are really good at external validation of enterprise security posture. There are some folks so good that nothing will totally stop ... there are steps you can take to dramatically enhance the security of your enterprise. I’ve reviewed some of these before, like ...

  2. 2009 Security Directory Update Underway

    ... The community of companies doing business in the security arena is as large and diverse as the products and services they offer. ... SIGNAL Magazine and AFCEA produce two security directories each year. The print version is published annually in the ...

  3. Homeland Security 2012: Mobility With Security Is a Must

    ... officers from throughout the U.S. Department of Homeland Security (DHS) had words of advice for companies that want to do business with ... day was sponsored by the U.S. Department of Homeland Security, which was  a prelude to AFCEA International’s Homeland ...

  4. SRC to Establish Cyber Security Operations Center for Homeland Security

    ... recently received a contract from the Department of Homeland Security's Immigration and Customs Enforcement (DHS-ICE) agency with a ... value of nearly $42 million to establish and maintain a Security Operations Center to help protect critical information technology ...

  5. Experts to Discuss Budget Constraints and Homeland Security

    ... topic during AFCEA International's 11th annual Homeland Security conference . Conference discussion topics include cloud computing, ... businesses' interaction with the U.S. Department of Homeland Security (DHS) also will be explored. Speakers and panelists include Jim ...

  6. Transportation Security Tackles Network Security

      Transportation Security Administration (TSA) personnel use technology to screen and share ... raised by inspector general report. The Transportation Security Administration is doing more than just making sure travelers have a ...

  7. Homeland Security Is a Critical Part Of the Defense and Security Fabric

    ... provide tighter coordination of defense, intelligence, and security planning and operations. In the United States, people refer to the security function as homeland security, while in other countries around the ...

  8. Debunking Information Security Myths

    ... information has some pitfalls of its own. Information security specialists are the front-line warriors in this battlespace, and they ... weapons to use based on misconceptions often promulgated by security product vendors. Industry experts have taken a closer look at some ...

  9. National Security on a Boot-String Budget

    ... it's affecting how nations procure and oversee their security measures and infrastructure. In fact, the economy is recognized as one of the major concerns for security provision. In " Aligning Acquisition Strategies With the Times " by ...

  10. Security Treasure Hunt Closer to Its Gems

    ... U.S. Cyber Challenge's (USCC's) Security Treasure Hunt wrapped up last week after more than a ... that presented players with a target system containing security vulnerabilities to assess and fix. (For more information, see the  ...

Pages