COMPUTER NETWORK DEFENSE

Type: Keyphrase
Name: COMPUTER NETWORK DEFENSE
First reported Aug 28 2014 - Updated Aug 28 2014 - 1 reports

Global technology solutions provider Netswitch launches product to maximize network security for all businesses

PR Newswire Association LLCSAN FRANCISCO, Aug. 28, 2014 /PRNewswire/ -- When a computer virus infected the network at Crouse and Associates in San Francisco, the insurance services company ground to a halt during a weeklong outage — costing a significant ... [Published Insurance News Net - Aug 28 2014]
First reported Aug 26 2014 - Updated Aug 26 2014 - 1 reports

LOCKHEED MARTIN : New Leaders Installed at AFCEA

AFCEA International has announced two concurrent leadership changes. The association welcomes Lt. Gen. Robert M. "Bob" Shea , USMC (Ret.), as president and chief executive officer (CEO) and Linda Gooden as its new chair of the board of directors. Gen. ... [Published 4 Traders - Aug 26 2014]
First reported Aug 25 2014 - Updated Aug 25 2014 - 1 reports

Amazon Achieves DoD Cloud Authorization for Sensitive Workloads

Amazon Web Services has bumped its credentials with the Department of Defense . Following on a previous announcement in March in which Amazon received DoD Provisional Authorization under the DoD Cloud Security Model for Impact Levels 1-2, the cloud infrastructure-as-a-service ... [Published Talkin' Cloud - Aug 25 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

DISA sanctions AWS as initial commercial cloud approved vendor for delicate workloads

Amazon Web ServicesAmazon Web Services achieved initial Department of Defense (DoD) Provisional Authorization under the DoD Cloud Security Model's at security impact levels 3-5. This new Authorization covers AWS GovCloud and DoD customers can now move ... [Published Computer Technology Review - Aug 22 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Department of Defense Authorizes AWS

Amazon Web Services received the first Department of Defense Provisional Authorization under the DoD Cloud Security Model's at security impact levels 3-5.This enables DoD customers to implement a wide range of DoD requirements necessary to protect their ... [Published Converge! Network Digest - Aug 22 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

AWS Scores High-Level Federal Cloud Security Approval

News By 08/21/2014The U.S. Defense Information Systems Agency (DISA) has approved Amazon Web Services (AWS) to handle more sensitive data for the Department of Defense (DoD).AWS, via its GovCloud offering, is the first commercial cloud provider to receive ... [Published Virtualization Review - Aug 22 2014]
First reported Aug 21 2014 - Updated Aug 21 2014 - 1 reports

Contracting case studies, AWS security, CANES consolidation and more

OSTP, OMB offer examples of innovative contractingFollowing up on last week's launch of the U.S. Digital Service, the Office of Science and Technology Policy and the Office of Management and Budget released a collection of case studies -- " Buy What Works: ... [Published Federal Computer Week - Aug 21 2014]
First reported Aug 20 2014 - Updated Aug 20 2014 - 1 reports

Professionally Secure USB Flash Drive to Solve Computer Viruses and Online Privacy Issues

Professionally Secure LLC today announced the nationwide release of its product PC on a Stick. The small, portable bootable USB features its own operating system and provides users with a secure computing environment that keeps them safe from viruses ... [Published PR Urgent - Aug 20 2014]
First reported Aug 12 2014 - Updated Aug 12 2014 - 1 reports

North Carolina Guard joint team prepares for cyber threats

The North Carolina National Guard is 'Always Ready' against any threat including cyber attacks. These attacks can expose sensitive personal and business information and disrupt essential operations. Soldiers, Airmen and staff stand poised, ready and ... [Published United States Army - Aug 12 2014]
First reported Aug 12 2014 - Updated Aug 12 2014 - 1 reports

Triumfant Appoints Greg Wessel as Vice President of Operations

ROCKVILLE, MD -- (Marketwired) -- 08/12/14 -- "Triumfant's unique, precision-based monitoring, detection and remediation offering is revolutionizing endpoint security by providing unmatched defenses against today's most sophisticated and advanced attacks," ... [Published Pettinga Financial Advisors - Aug 12 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

North Carolina National Guard: Preparing Cyber Warriors for state and nation

RALEIGH, N.C. - What do major online and storefront retail giants, federal and state government agencies and national banks/financial institutions have in common? They all have suffered malicious cyber attacks over the past several years. Cyber intrusions ... [Published DVIDS - Aug 05 2014]
First reported Jun 03 2014 - Updated Jun 03 2014 - 2 reports

Introducing the Digital Security Strategy Series

This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ... [Published Security Bloggers Network - Jun 03 2014]

Quotes

Gooden describes herself as a "forward thinking" and "decisive" leader. "I'd like to think I'm very fair," she says. "The underlying foundation of all that is ethics-making decisions that are ethical and fair to everyone that's involved."
"As part of the Level 3-5 Authorization, our partners and DoD customers will be able to implement a wide range of DoD requirements necessary to protect their data at these levels, including AWS Direct Connect routing to the DoD's network, comprehensive computer network defense coverage, and Common Access Card (CAC) integration" wrote Jeff Barr, chief evangelist for Amazon Web Services, in a blog post
"Simply put, DoD agencies can now use AWS GovCloud's compliant infrastructure for all but level 6 (classified) workloads" said Chad Woolf, director of risk and compliance at AWS, in a separate post
"This is the most stringent reusable authorization the government has issued to date, and we are very excited to continue to innovate on behalf of the government community" Steve Spano, general manager of defense and national intelligence, AWS Worldwide Public Sector, said in the statement

More Content

All (23) | News (14) | Reports (0) | Blogs (9) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Global technology solutions provider Netswitch ... [Published Insurance News Net - Aug 28 2014]
LOCKHEED MARTIN : New Leaders Installed at AFCEA [Published 4 Traders - Aug 26 2014]
Amazon Achieves DoD Cloud Authorization for Sen... [Published Talkin' Cloud - Aug 25 2014]
DISA sanctions AWS as initial commercial cloud ... [Published Computer Technology Review - Aug 22 2014]
Department of Defense Authorizes AWS [Published Converge! Network Digest - Aug 22 2014]
AWS Scores High-Level Federal Cloud Security Ap... [Published Virtualization Review - Aug 22 2014]
Contracting case studies, AWS security, CANES c... [Published Federal Computer Week - Aug 21 2014]
Professionally Secure USB Flash Drive to Solve ... [Published PR Urgent - Aug 20 2014]
North Carolina Guard joint team prepares for cy... [Published United States Army - Aug 12 2014]
Triumfant Appoints Greg Wessel as Vice Presiden... [Published Pettinga Financial Advisors - Aug 12 2014]
North Carolina National Guard: Preparing Cyber ... [Published DVIDS - Aug 05 2014]
Cybercom Chief: Cyberspace operations key to fu... [Published North Texas e-News - Aug 02 2014]
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
ICF International providing services to Army to... [Published News About Cyber Warfare - May 30 2014]
ShowMeCon 2014 - Hacking To Get Caught: A Conce... [Published SecurityTube.Net - May 09 2014]
Book Review: Secrets and Lies: Digital Security... [Published Security Bloggers Network - May 05 2014]
Global CyberLympics, the International Cybersec... [Published PRWeb - May 05 2014]
EC-Council, creator of the world famous Certifi... [Published PRWeb - Feb 24 2014]
5 Favorite Security Reads of the Week [Published Lenny Zeltser on Information Security - Sep 03 2011]
Cyberwar - história e a evolução a longo dos úl... [Published Forense Digital - Mar 13 2011]
Edição 68 - 15.08.09 [Published i sh0t the sheriff - Aug 19 2009]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Introducing the Digital Security Strategy Series [Published Security Bloggers Network - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community … Continue reading → ...
Introducing the Digital Security Strategy Series [Published FireEye Blog - Jun 03 2014]
This is the first in a monthly series of blog posts I will write on strategic digital security. My goal is to introduce, or reinforce, concepts that are not often emphasized in the field of computer network defense. Our community is dominated by discussions ...
On the Twenty Years Since My USAFA Graduation [Published TaoSecurity - Jun 02 2014]
Twenty years ago today, on 1 June 1994, 1024 of us graduated from the United States Air Force Academy , commissioned as brand new second lieutenants. As of September 2012, over 600 members of the class of 1994 were still in uniform. I expect that ...
ICF International providing services to Army to... [Published News About Cyber Warfare - May 30 2014]
Fairfax, Va. (UPI) May 27, 2013 -The U.S. Army Research Laboratory has selected ICF International to provide cyber network defense research and services, the company announced Tuesday. The contract covers analytical and engineering services in core ...
ShowMeCon 2014 - Hacking To Get Caught: A Conce... [Published SecurityTube.Net - May 09 2014]
It’s 2014 and most of us accept that there are well resourced actors who are after the wealth that live on our information systems. In light of this fact, how do we understand our ability to defend a network against these well resourced actors and use ...
1 2
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.