 
                    
                                        
		            
                    The government recognizes the need to increase security for cyber and physical assets so counter measures to reduce, mitigate and eliminate external and internal terrorist threats have been, and remain, paramount. 
                    
			            - By Mark  Steffler
- Nov 01, 2013
 
            
    
                
	                 
                    
                                        
		            
                    Grant valued at more than $1.5 million is one of four being awarded this year through the National Strategy for Trusted Identities in Cyberspace (NSTIC) initiative.
                    
		            
                
                    
                    
                    
                 
            
                
	                 
                    
                                        
		            
                    A world saturated with digital data needs assurance that this data won't fall into the wrong hands.
                    
			            - By Ginger  Hill
- Oct 17, 2013
 
            
                
	                 
                    
                                        
		            
                    Methodical approach and identifying the right tools to meet individual needs is key to security against cyber threats.
                    
			            - By Vann   Abernethy 
- Oct 07, 2013
 
            
                
	                 
                    
                                        
		            
                    Data from Google scanning can be used for more than just targeting advertising, though what Google might be doing with private information is currently under seal.
                    
			            - By Antonia  Gregory
- Sep 19, 2013
 
            
                
	                 
                    
                                        
		            
                    Launching expanded set of managed security solutions, new capabilities and the expanding of their cyber security portfolio. 
                    
			            - By Ginger  Hill
- Sep 10, 2013
 
            
                
	                 
                    
                                        
		            
                    Should a school's curriculum include teaching students how to hack computers?
                    
			            - By Ginger  Hill
- Sep 04, 2013