Rugged Laptops: What Defense and First Responders Should Look For

Guest Editorial by Mike McMahon, President, Getac North America With law enforcement and first response data being targeted by bad actors and the growing threat of cyberspace being used as a theater of war, the rugged laptops used in the defense of our nation, which offer access to sensitive information and infrastructure, must offer security features.
Multi-factor authentication is now a zero-trust security standard - mandated by all federal agencies by the end of the 2024 fiscal year by Cybersecurity Executive Order 14028.
When vetting rugged laptops and their vendors, the information you find online regarding a particular model will often target a non-specific global audience and might not mention additional security features specifically required by certain nations, jurisdictions, agencies, or service branches.
Such features might include Secret Internet Protocol Router/Non-Classified Protocol Router capability, compliance with Federal Information Processing Standards, theft protection in the BIOS controls and device setting lockout, optical drive security, Data At Rest security, and additional chip/OS manufacturer security safeguards.
The Getac B360 laptop offers security features already mentioned and more and provides all the durability and stress tolerances of a fully-rugged device, with a lighter, slimmer profile more typical of a semi-rugged model while still delivering a 1,400-nit sunlight-readable screen, dual user-removable PCIe NVMe solid state drives, and ample computing power.
This rugged device is built for law enforcement, first responders, and defense customers who need top-of-the-line security and uncompromised productivity in diverse environments.
His unique perspective on rugged technology spans Enterprise, Public Safety, and Federal markets.
American Security Today's Annual 'ASTORS' Awards, the preeminent U.S. Homeland Security Awards Program, now entering its Ninth Year, recognizes industry leaders of Physical and Border Security, Cybersecurity, Emergency Preparedness - Management and Response, Law Enforcement, First Responders as well as federal, state and municipal government agencies in the acknowledgment of their outstanding efforts to Keep our Nation Secure.
The Getac B360 is a modern, full-size, and fully rugged laptop designed for field service, utilities, manufacturing, military, and public safety markets that require both the raw computing power and the versatility and mobility that comes with a lighter, more compact, fully rugged package.
The Getac B360 delivers all the benefits of a fully rugged device, yet it's not larger or heavier than traditional semi-rugged laptops.
With dual user-removable PCIe NVMe SSDs, the B360 enables enhanced data security for industries such as Public Safety, Utilities, and Manufacturing.
Steven Dettelbach, Director of the Bureau of Alcohol, Tobacco, Firearms and Explosives, delivered the keynote address at the 2023 'ASTORS' Homeland Security and Excellence in Public Safety Awards Ceremony and Banquet Luncheon.
The prestigious Annual 'ASTORS' Homeland Security Awards Program highlights the most cutting-edge and forward-thinking security solutions coming onto the market today to ensure our readers have the information they need to stay ahead of the competition and keep our Nation safe - one facility, street, and city at a time.
The 'ASTORS' was specifically designed to honor distinguished government and vendor solutions that deliver enhanced value, benefit, and intelligence to end-users in a variety of government, homeland security, enterprise, and public safety vertical markets.
AST Digital Publications are distributed to over 75,000 qualified government and homeland security professionals in federal, state, local, and private security sectors.
Today's new generation of public safety and security experts need real-time knowledge to deal with domestic and international terrorism, lone wolf attacks, unprecedented urban violence, shifts in society, culture, and media bias - making it increasingly difficult for Homeland Security, Law Enforcement, First Responders, Military and Private Security Professionals to implement coordinated security measures to ensure national security and improve public safety.
It will serve as your Go-To Source throughout the year for 'The Best of 2023 Products and Services' endorsed by American Security Today and can satisfy your agency's and/or organization's most pressing Homeland Security and Public Safety needs.
From Physical Security, to IT Security, the 2023 'ASTORS' CHAMPIONS EDITION will have WHAT YOU NEED to Detect, Delay, Respond to, and Mitigate today's real-time threats in our constantly evolving security landscape.
It will also include featured guest editorial pieces from some of the security industry's most respected leaders and recognized firms in the 2023 'ASTORS' Awards Program.
ABOUT US. Security as it is today - bringing security issues from protecting our communities, ports and cities to evolving threats to you in realtime - today's real threats.


This Cyber News was published on americansecuritytoday.com. Publication date: Mon, 22 Jan 2024 23:43:04 +0000


Cyber News related to Rugged Laptops: What Defense and First Responders Should Look For

Rugged Laptops: What Defense and First Responders Should Look For - Guest Editorial by Mike McMahon, President, Getac North America With law enforcement and first response data being targeted by bad actors and the growing threat of cyberspace being used as a theater of war, the rugged laptops used in the defense of ...
10 months ago Americansecuritytoday.com
Tech upgrades for first responders are a necessity, not a luxury - Public safety professionals want technology upgrades and adoption of federal standards for first responder IT security, reporting and efficiency, according to Mark43. First responders face growing concerns amidst cybersecurity surge. The ...
11 months ago Helpnetsecurity.com
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
11 months ago Esecurityplanet.com
Power of Flexible Tech: Applying Conference Room Tech to Front Lines - We work with public safety, government, defense, security, and enterprise organizations to help them use unmanned systems, from drones to ground robotics, to enhance their situational awareness and streamline operations. The level of insight these ...
10 months ago Americansecuritytoday.com
The First 10 Days of a vCISO’S Journey with a New Client - Cyber Defense Magazine - During this period, the vCISO conducts a comprehensive assessment to identify vulnerabilities, engages with key stakeholders to align security efforts with business objectives, and develops a strategic roadmap to prioritize actions and resources. If ...
2 months ago Cyberdefensemagazine.com
Integration of Cisco Secure Threat Defense Virtual with Megaport - Business critical data can originate from diverse sources ranging from multiple public clouds, private clouds, and internal servers to a remote employee's device. Securing each data entity individually is time consuming and challenging due to lack of ...
6 months ago Feedpress.me
Warren PD Launches Mark43 Records Management System - Mark43, a leading cloud-native public safety software company that took home Top Awards for Best Disaster Preparedness and Disaster Recovery Solution in the 2023 'ASTORS' Homeland Security Awards Program, is pleased to announce the official ...
10 months ago Americansecuritytoday.com
DHS Awards UAA to Launch New ADAC-ARCTIC Center of Excellence - S&T will provide ADAC-ARCTIC $46 million over a 10-year cooperative agreement to establish this Research Center portfolio for Homeland Security in the Arctic. Vital insights from academic-led innovative research will help the Department of Homeland ...
10 months ago Americansecuritytoday.com
How Secure Cloud Development Replaces Virtual Desktop Infrastructures - The need to secure corporate IT environments is common to all functions of organizations, and software application development is one of them. Development environments have notoriously complex setups and often require significant maintenance because ...
8 months ago Feeds.dzone.com
McCaffrey Joins 'ASTORS' Champion SIMS Software Board of Advisors - SIMS Software, the leading provider of security information management software to the government and defense industries - and the 2023 Platinum 'ASTORS' Award Champion for Best Security Workforce Management Solution, is delighted to announce that ...
10 months ago Americansecuritytoday.com
Konica Minolta Wins Two Platinum 'ASTORS' Homeland Security Awards - ' Now in its ninth year, it continues to recognize industry leaders in physical and border security, cybersecurity, emergency preparedness management and response, law enforcement, first responders, and federal, state, and municipal government ...
8 months ago Americansecuritytoday.com
Embracing offensive cybersecurity tactics for defense against dynamic threats - In this Help Net Security, Alexander Hagenah, Head of Cyber Controls at SIX, discusses the critical steps in creating effective offensive security operations and their impact on organizational security strategies. The first line of defense is often ...
10 months ago Helpnetsecurity.com
Revolutionizing Cybersecurity with Cyber Defense Planning and Optimization - Heads-up CISOs - there's a major paradigm shift coming that will change how you plan and execute your adaptive cybersecurity defense strategy. It's a new tech category, mentioned by Gartner for the first time recently in a paper authored by a team ...
11 months ago Securityboulevard.com
Egress Security: Part of a Holistic, Multidirectional Security Strategy for Today's Multicloud World - According to Enterprise Strategy Group, more than half of production workloads will be running on public cloud infrastructure within the next two years, positioning cloud computing center-stage as the best practice for solving critical business ...
10 months ago Feedpress.me
Microsoft: Hackers target defense firms with new FalseFont malware - Microsoft says the APT33 Iranian cyber-espionage group is using recently discovered FalseFont backdoor malware to attack defense contractors worldwide. The DIB sector targeted in these attacks comprises over 100,000 defense companies and ...
11 months ago Bleepingcomputer.com
What is digital forensics and incident response? - Digital forensics and incident response is a combined set of cybersecurity operations that incident response teams use to detect, investigate and respond to cybersecurity events. As the acronym implies, DFIR integrates digital forensics and incident ...
10 months ago Techtarget.com
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report - To illuminate the evolving digital threat landscape and help the cyber community understand today's most pressing threats, we released our annual Microsoft Digital Defense Report. This year's report focuses on five key topics: cybercrime, ...
1 year ago Csoonline.com
CVE-2015-7268 - Samsung 850 Pro and PM851 solid-state drives and Seagate ST500LT015 and ST500LT025 hard disk drives, when used on Windows and operating in Opal mode on Lenovo ThinkPad T440s laptops with BIOS 2.32 or ThinkPad W541 laptops with BIOS 2.21, or in Opal ...
6 years ago
CVE-2015-7267 - Samsung 850 Pro and PM851 solid-state drives and Seagate ST500LT015 and ST500LT025 hard disk drives, when in sleep mode and operating in Opal or eDrive mode on Lenovo ThinkPad T440s laptops with BIOS 2.32; ThinkPad W541 laptops with BIOS 2.21; Dell ...
6 years ago
Failing Upwards - One of the phrases my early boss in pentesting taught me and adopted was failing upwards in a career. This leads to hard decisions between hanging up part of your subject matter expertise and focusing on managing and leading teams or do you continue ...
10 months ago Blog.zsec.uk
Managing the Risk of Cancer in Security - Recently, a friend brought up the term Carcinization and I had to look it up. It turns out that this term was created more than a century ago to explain the process of crustaceans transforming into crab-like forms. What does this example of ...
1 year ago Securityweek.com
It's Time For Lawmakers to Listen to Courts: Your Law Regulating Online Speech Will Harm Internet Users' Free Speech Rights - Despite a long history of courts ruling that government efforts to regulate speech online harm all internet users and interfere with their First Amendment rights, state and federal lawmakers continue to pass laws that do just that. Three separate ...
4 months ago Eff.org
EFF Asks Court to Uphold Federal Law That Protects Online Video Viewers' Privacy and Free Expression - As millions of internet users watch videos online for news and entertainment, it is essential to uphold a federal privacy law that protects against the disclosure of everyone's viewing history, EFF argued in court last month. For decades, the Video ...
10 months ago Eff.org
Continuity in Chaos: Applying Time-Tested Incident Response to Modern Cybersecurity - Incident response is foundational to every security program, yet many companies still struggle with adoption and testing. He enumerated the top challenges of incident response at the time which were 1) Increasing complexity and sophistication of ...
10 months ago Securityweek.com
FAQ: What Is DFARS Compliance and How Does It Work? - Our intention is to offer a comprehensive perspective on DFARS in the context of cybersecurity, its various clauses, and the intricacies of maintaining compliance as these rules constantly shift and change over time. Size doesn't matter - big global ...
10 months ago Securityboulevard.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)