From the Fall 2013 Issue

CYBERMARYLAND: Making Connections for Business

Author(s):

Erika Butler, , United States Cybersecurity Magazine

Ten years ago, information security meant installing Norton on a laptop. Today it has evolved into a much broader concept, an entire industry aimed at protecting information. “Now it’s that times 100,000” said Ursula Powidzki, Assistant Secretary of Business and Enterprise Development for the Maryland Department of Business and Economic Development, “because increasingly everything is … Read more

From the Fall 2013 Issue

Northrop Grumman Foundation Furthers CyberPatriot Growth With Renewed Three-Year Commitment

Author(s):

Northrop Grumman, ,

Multiyear grant to support cyber competitions through 2016 Program expands to middle schools and internationally  Northrop Grumman Foundation announced this year it will continue as presenting sponsor of CyberPatriot, the national high school cyber defense competition, with a $4.5 million, three-year grant to the Air Force Association (AFA). As the largest contributor to the program since … Read more

From the Fall 2013 Issue

Threats and Opportunities Growing in Cybersecurity

Author(s):

Tim Larkins, , ImmixGroup, Inc.

The federal government will spend about $10 billion on Cybersecurity in fiscal year 2013. That number could grow to $13 billion in fiscal year 2014. For most federal agencies, Cybersecurity is one hot-button issue that will not soon disappear. Determining what to defend against will play a large role in how much money the government … Read more

From the Fall 2013 Issue

Maryland The Epicenter for Cybersecurity

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

As a neighbor of Washington DC, the state of Maryland is the headquarters for many businesses that provide services to the federal government. In fact, many federal agencies are located in the Maryland suburbs around Interstate 495, commonly known as the Capital Beltway. The government contractors have located in Maryland, close to their government clients. … Read more

From the Fall 2013 Issue

NSA creates partnership with North Carolina State University

Author(s):

National Security Agency/Central Security Service, ,

New Laboratory Focuses on Big Data Analysis  The National Security Agency and North Carolina State University have partnered to establish the Laboratory for Analytic Sciences (LAS) on NC State’s Centennial Campus in Raleigh. Located near Research Triangle Park, the laboratory will be a cornerstone of the emerging advanced data innovation hub at NC State, bringing … Read more

From the Fall 2013 Issue

Biography: General Keith B. Alexander, United States Army

Author(s):

National Security Agency/Central Security Service, ,

General Keith B. Alexander, USA, is the Commander, U.S. Cyber Command (USCYBERCOM) and Director, National Security Agency/Chief, Central Security Service (NSA/CSS), Fort George G. Meade, MD. As Commander, USCYBERCOM, he is responsible for planning, coordinating and conducting operations and defense of DoD computer networks as directed by USSTRATCOM. As the Director of NSA and Chief … Read more

From the Fall 2013 Issue

NSA Announces Four New Schools for Cyber Initiative

Author(s):

National Security Agency/Central Security Service, ,

NSA Announces Four New Schools for Cyber Initiative  Four new schools have been selected for the National Security Agency’s National Centers of Academic Excellence in Cyber Operations Program, which was designed to cultivate more U.S. cyber professionals in an ever-changing global environment. After a rigorous application and screening process, NSA selected the following schools to … Read more

From the Fall 2013 Issue

Look Out Palo Alto – Here Comes Howard County! The New Epicenter within a Federal Contracting Valley…

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, Maryland) Howard County-based businesses are providing the newest form of triage for security hungry customers who just can’t get enough – Cybersecurity. Customers include health-care providers, major mainframe computer manufacturers, mobile device makers, telecommunication businesses and oil companies. With predictions of a major cyber-attack ever looming, and daily press reports of attacks on both … Read more

From the Fall 2013 Issue

Operating with Privacy in the Wild, Wild West of Wireless Technologies

Author(s):

Ronald J. Waranowski, ,

Look at the current state of the mobile wireless landscape. iPads used both at home and the office, smartphones with GPS tracking on in the background, business laptops automatically connecting to the local coffee shop’s wi-fi network, and personal and business applications running on the same smart devices, all connected and transmitting private information via … Read more

From the Fall 2013 Issue

Location, A Must for Mobile Security

Author(s):

Sage Osterfeld, , AirPatrol Corp.

The smartphone isn’t much of a phone anymore. According to a recent study from O2 research, the smartphone, which is 80% of all the phones sold over the past couple of years, is used for phone calls a paltry 9% of the time. Email, games, music and social media are all more popular uses. More … Read more