Quantcast
Channel: information security – Techsource
Browsing latest articles
Browse All 25 View Live

Image may be NSFW.
Clik here to view.

The Graying of Black Hat, DEFCON and InfoSec Industry

This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...

View Article



PODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...

With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...

View Article

PODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...

This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...

View Article

Image may be NSFW.
Clik here to view.

McAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...

Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...

View Article

The Changing Face of InfoSec

Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...

View Article


Image may be NSFW.
Clik here to view.

Effective Security Strategy Requires a Lifecycle Approach

A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep...

View Article

Best of Security in 2013

It’s hard to believe that 2013 is already coming to a close. Before we head into 2014, we want to take a moment and reflect on some of our most read content on TechSource this year. The first in this...

View Article

CryptoLocker, Heartbleed and the Next Cybersecurity Threat

Although new security threats and vulnerabilities are constantly being discovered, three major security issues were recently exposed that can threaten virtually every citizen and corporation. The first...

View Article


Image may be NSFW.
Clik here to view.

The Benefits and Considerations of Big Data Implementations

With the proliferation of devices and sensors that generate data, today’s federal government agencies are faced with the difficult task of storing, managing and sharing a mountain of data and...

View Article


Is the Government Ready for FedRAMP Ready?

To ensure that the cloud solutions and services being implemented by government agencies are secure and meet an established set of standards, experts from multiple federal agencies, including GSA,...

View Article
Browsing latest articles
Browse All 25 View Live




Latest Images