This article has been indexed from Cyber Security – American Security Today Mission Secure, an industry leader in Operational Technology (OT) cybersecurity, is pleased to announce the company’s program has been nominated to compete in the 2021 ‘ASTORS’ Homeland Security…
Category: Cyber Security – American Security Today
Mission Secure is Newest Competitor in 2021 ‘ASTORS’ Awards Program
This article has been indexed from Cyber Security – American Security Today Mission Secure, an industry leader in Operational Technology (OT) cybersecurity, is pleased to announce the company’s program has been nominated to compete in the 2021 ‘ASTORS’ Homeland Security…
How Wireless Comms Can Covertly Keep the Public Safe at Major Events
This article has been indexed from Cyber Security – American Security Today Guest OpEd by Angela Quinn at Rajant Corporation When preparing for a large-scale event, protecting the public is the top priority for everyone involved. Taking extra measures to…
Why Veterans are Ideal Hires in the Cyber Security Industry
This article has been indexed from Cyber Security – American Security Today Guest OpEd by Kayleigh Alexandra Life after time serving in the armed forces comes with a lot of questions. Who am I? Where do I go from here?…
Attivo Networks Honors Partners Driving Cybersecurity Innovation
This article has been indexed from Cyber Security – American Security Today Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, is pleased to announce that it has received four 2020 ‘ASTORS’ Homeland Security Awards…
SolarWinds SEM Nominated in 2021 ‘ASTORS’ Awards Program
This article has been indexed from Cyber Security – American Security Today The job of the technology professional is hard. Technology is pervasive, complex and always changing. End users can be demanding, and businesses need constant access to an ever-expanding…
SolarWinds SEM Nominated in 2021 ‘ASTORS’ Awards Program
The job of the technology professional is hard. Technology is pervasive, complex and always changing. End users can be demanding, and businesses need constant access to an ever-expanding ecosystem of applications and infrastructure. The expectations for IT performance and availability…
Yubico New YubiKey 5 FIPS Series Enables Passwordless Authentication
Yubico, a leading provider of hardware authentication security keys, and an ‘ASTORS’ Winner in the last Three ‘ASTORS’ Homeland Security Awards Program, has introduces its next-generation FIPS security keys: the YubiKey 5 FIPS Series. This newest product line is the…
ThycoticCentrify Unveils “Definitive Guide to Securing Privileged Access”
Thycotic, a leading provider of privileged access management (PAM) solutions for more than 12,500 organizations worldwide, and a Platinum Award Winner in the 2019, 2018 and 2016 ‘ASTORS’ Homeland Security Awards Programs, recently merged with Centrify, a leading provider of…
ThycoticCentrify Unveils “Definitive Guide to Securing Privileged Access”
Thycotic, a leading provider of privileged access management (PAM) solutions for more than 12,500 organizations worldwide, and a Platinum Award Winner in the 2019, 2018 and 2016 ‘ASTORS’ Homeland Security Awards Programs, recently merged with Centrify, a leading provider of…
Americans Not Confident in US Gov’t Cybersecurity Preparedness
PC Matic, an American cybersecurity recognized in the ‘ASTORS’ Homeland Security Awards Program Four Years Running, has released findings of a new public opinion survey which sought to understand public opinion of cybersecurity as it relates to state and federal…
Rajant Recognized by ‘Philadelphia Inquirer’ as Best Employer
Read the original article: Rajant Recognized by ‘Philadelphia Inquirer’ as Best Employer Rajant Corporation, the provider of Kinetic Mesh® wireless networks headquartered in Malvern, Pennsylvania, and the Platinum Award Winner for ‘Best Wireless Network Security Solution’ in the 2020 ‘ASTORS’…
RangeForce & BCA to Create Cyber Career Advancement Opportunities
Read the original article: RangeForce & BCA to Create Cyber Career Advancement Opportunities RangeForce, a new competitor in the 2021 ‘ASTORS’ Awards Program which is revolutionizing cybersecurity training, has announced a new partnership with the Black Cybersecurity Association (BCA) to…
Where Digital Meets Physical: Integrating Your Threat Intel Strategy
Read the original article: Where Digital Meets Physical: Integrating Your Threat Intel Strategy Guest OpEd by Karl Swannie, founder and CEO of Echosec Systems Threat intelligence. For security professionals, the term is often synonymous with detecting and mitigating cyber attacks…
Infrastructure Intrusion: America Under Attack
Read the original article: Infrastructure Intrusion: America Under Attack Guest OpEd by Chris Risley, CEO at Bastille Networks It could have been worse. Much, much worse. On February 5th, 2021, the city of Oldsmar, Florida was targeted for a cyberattack.…
What Does the Future of DDoS Attacks Look Like?
Read the original article: What Does the Future of DDoS Attacks Look Like? Guest OpEd by MJ Shoer, SVP, Executive Director at CompTIA ISAO A DDoS attack is a malicious attempt to sabotage someone’s online business. It occurs when a…
TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program
Read the original article: TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program Still Using Passwords? TruU can do better 80% of breaches start with compromised credentials $2.1 Trillion Global cost of data breaches in FY 2019 -5% Drop in…
TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program
Read the original article: TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program Still Using Passwords? TruU can do better 80% of breaches start with compromised credentials $2.1 Trillion Global cost of data breaches in FY 2019 -5% Drop in…
Security Culture – Beyond Technical Controls, by Red Hat’s Andrea Hall
Read the original article: Security Culture – Beyond Technical Controls, by Red Hat’s Andrea Hall Guest Editorial by Andrea Hall, Red Hat Trespassing. Breaking and entering. Grand larceny. These could be considered physical equivalents of cyber attacks and data breaches.…
Cutting Edge Security Tech in 2021: XDR, Zero Trust, IAST & More
Read the original article: Cutting Edge Security Tech in 2021: XDR, Zero Trust, IAST & More Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO The Evolution of Cybersecurity in a Post-COVID World Almost every industry and…
Cutting Edge Security Tech in 2021: XDR, Zero Trust, IAST & More
Read the original article: Cutting Edge Security Tech in 2021: XDR, Zero Trust, IAST & More Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO The Evolution of Cybersecurity in a Post-COVID World Almost every industry and…
Protecting Our & Your Health Data: 3 Pillars of COVID-19 Era Data Security
Read the original article: Protecting Our & Your Health Data: 3 Pillars of COVID-19 Era Data Security Guest OpEd by Scott Pettigrew, Chief Security Officer at HMS The year 2020 was one of unprecedented change and uncertainty. Much of the…
Redefining Communications for Today’s Mobile Workforces
Read the original article: Redefining Communications for Today’s Mobile Workforces Guest OpEd by Chief Technologist Dave George Communicating with personnel was already a challenge for companies with workers in the field, widespread workforces in siloed divisions and office locations, or deskless…
Richard Simone Named CEO of 2020 ‘ASTORS’ Award Winner CHERRY
Read the original article: Richard Simone Named CEO of 2020 ‘ASTORS’ Award Winner CHERRY CHERRY, a leading global manufacturer of computer input devices and switches for mechanical keyboards, and a Recognized Platinum Award Winner in the 2020 ‘ASTORS’ Homeland Security…
Why Water Plants are So Vulnerable to Hackers
Read the original article: Why Water Plants are So Vulnerable to Hackers February 10, 2021 – In Breaking News – Fortune A hacker’s botched attempt to poison the water supply of a small Florida city is raising alarms about just…
CHERRY on the Future of Work & Society – Gazing into the Crystal Ball
Read the original article: CHERRY on the Future of Work & Society – Gazing into the Crystal Ball CHERRY, a world-leading manufacturer of computer input devices and switches, and the 2020 Platinum ‘ASTORS’ Award Winner for Best Smart Card/Reader Systems, is…
Canon U.S.A. Honored with Two 2020 ‘ASTORS’ Homeland Security Awards
Read the original article: Canon U.S.A. Honored with Two 2020 ‘ASTORS’ Homeland Security Awards Aligning with its ongoing commitment to innovation, Canon U.S.A., Inc., a leader in digital imaging solutions, is proud to announce that it is the proud recipient…
Attivo Offers Limited-Time Software Use to Combat Privilege Escalation & Lateral Movement
Read the original article: Attivo Offers Limited-Time Software Use to Combat Privilege Escalation & Lateral Movement Sophisticated nation-state adversaries who compromised a string of federal agencies in recent months used Kerberoasting to steal the passwords of agency employees and move laterally within…
New Gurucul XDR for Real-Time Threat Detection & Incident Response
Read the original article: New Gurucul XDR for Real-Time Threat Detection & Incident Response Gurucul, a leader in Unified Security and Risk Analytics technology, and the 2020 Platinum ‘ASTORS’ Award Winner for Best Cyber Security Risk Management, has released Gurucul…
Russia’s Federal Cyber Attack on U.S.? What Are the Feds Doing?
Read the original article: Russia’s Federal Cyber Attack on U.S.? What Are the Feds Doing? Over the course of the past several days, the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Office of…
Canon U.S.A. Named a Buyers Lab Visionary Leader in Healthcare
Read the original article: Canon U.S.A. Named a Buyers Lab Visionary Leader in Healthcare Aligning with its dedication to meeting customer needs, Canon U.S.A., a leader in digital imaging solutions recently selected as a Multi-Award Winner in the 2020 ‘ASTORS’…
Attivo Networks Returns as ‘ASTORS’ Premier Sponsor for Third Year
Read the original article: Attivo Networks Returns as ‘ASTORS’ Premier Sponsor for Third Year American Security Today (AST) is pleased to announce it’s Annual ‘ASTORS’ Homeland Security Awards Program has had 100% Returning Premier Sponsors, including Attivo Networks, a world…
Fast and Secure Connectivity from Anywhere, Designed for Government
Read the original article: Fast and Secure Connectivity from Anywhere, Designed for Government Guest OpEd by Paul Martini, iboss CEO, CTO, Co-Founder With increasing bandwidth, encrypted traffic, shifts to cloud applications like Office 365 and users that are no longer…
Aegis Secure Key 3NXC a Finalist in 2020 ‘ASTORS’ Awards Program
Read the original article: Aegis Secure Key 3NXC a Finalist in 2020 ‘ASTORS’ Awards Program Even before the COVID-19 pandemic, remote and mobile working was on the rise. As the global workforce shifted from office to home practically overnight, it…
How Federal Agencies Can Reduce Cyber Risk Posed by Contractors
Read the original article: How Federal Agencies Can Reduce Cyber Risk Posed by Contractors By Brandon Shopp, VP of Product Strategy, SolarWinds Federal IT professionals are making strides to address cybersecurity challenges within their agencies. However, there’s still a lot…
Minimizing Cognitive Bias in Cybersecurity
Read the original article: Minimizing Cognitive Bias in Cybersecurity Guest OpEd by Margaret Cunningham, Principal Research Scientist, Forcepoint It is 7am, and ten minutes into the morning you have already dismissed the first round of notifications littering your screen. Respond,…
FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned
Read the original article: FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned October 7, 2020 – In Breaking News – Forbes Warnings that our IoT devices might be spying on us are nothing new—remember the smart speaker…
CHERRY Grows it’s US Base with Executive Promotions & Input Devices
Read the original article: CHERRY Grows it’s US Base with Executive Promotions & Input Devices Developments such as digitization and Big Data and the exponentially growing mountains of data that go hand in hand with them are stirring a desire…
To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels
Read the original article: To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average…
7 Data Loss Prevention Strategies and Practices You Should Know
Read the original article: 7 Data Loss Prevention Strategies and Practices You Should Know Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Data Loss Prevention (DLP) enables organizations to protect data against a wide range of…
Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards
Read the original article: Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards Brinqa™, a leader in Cyber Risk Management recognized in 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce that Brinqa Cyber Risk Services and Brinqa…
Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards
Read the original article: Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards Brinqa™, a leader in Cyber Risk Management recognized in 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce that Brinqa Cyber Risk Services and Brinqa…
Virtual Event & Funding Op for ‘Cyber Solutions for Energy Infrastructure’
Read the original article: Virtual Event & Funding Op for ‘Cyber Solutions for Energy Infrastructure’ The U.S. Department of Energy (DOE), the Israel Ministry of Energy, and the Israel Innovation Authority are seeking Proposals from the U.S.-Israel Center of Excellence…
Virtual Event & Funding Op for ‘Cyber Solutions for Energy Infrastructure’
Read the original article: Virtual Event & Funding Op for ‘Cyber Solutions for Energy Infrastructure’ The U.S. Department of Energy (DOE), the Israel Ministry of Energy, and the Israel Innovation Authority are seeking Proposals from the U.S.-Israel Center of Excellence…
5 Common Accidental Sources of Data Leaks
Read the original article: 5 Common Accidental Sources of Data Leaks In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or…
World’s Largest Cruise Line Operator Suffers Ransomware Attack
Read the original article: World’s Largest Cruise Line Operator Suffers Ransomware Attack Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain…
Konica Minolta Adds Depth Security to Provide Holistic IT Security Offering
Read the original article: Konica Minolta Adds Depth Security to Provide Holistic IT Security Offering Konica Minolta Business Solutions, a Four-Time 2019 ‘ASTORS’ Homeland Security Awards Winner, together with its IT Services division, All Covered, has acquired Depth Security, a…
Konica Minolta Adds Depth Security to Provide Holistic IT Security Offering
Read the original article: Konica Minolta Adds Depth Security to Provide Holistic IT Security Offering Konica Minolta Business Solutions, a Four-Time 2019 ‘ASTORS’ Homeland Security Awards Winner, together with its IT Services division, All Covered, has acquired Depth Security, a…
Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response
Read the original article: Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 ‘ASTORS’ Awards Cybercrime is always evolving, and as…
Securing the Future: Technical Due Diligence in the Age of COVID-19
Read the original article: Securing the Future: Technical Due Diligence in the Age of COVID-19 Guest OpEd by Limor Maayan-Wainstein Technical due diligence is performed for the purpose of evaluating the viability, sustainability, and profitability of a company’s technical posture.…
Securing the Future: Technical Due Diligence in the Age of COVID-19
Read the original article: Securing the Future: Technical Due Diligence in the Age of COVID-19 Guest OpEd by Limor Maayan-Wainstein Technical due diligence is performed for the purpose of evaluating the viability, sustainability, and profitability of a company’s technical posture.…
Fight the Germs – Discover How to Keep a Hygienic Work Space
Read the original article: Fight the Germs – Discover How to Keep a Hygienic Work Space Since the beginning of time, people have been disgusted by certain things. From an evolutionary-biological point of view, this makes sense. A healthy disgust…
AST Latest *Fully Interactive* Magazine Now Live (Multi-Video)
Read the original article: AST Latest *Fully Interactive* Magazine Now Live (Multi-Video) AST is pleased to announce the newest Magazine is ready for viewing, and includes the following featured articles: DHS S&T Develops DIY Way to Clean N95 Masks A…
Attivo Networks Returns to Compete in 2020 ‘ASTORS’ Awards Program
Read the original article: Attivo Networks Returns to Compete in 2020 ‘ASTORS’ Awards Program Attivo Networks, an leader in deception for cybersecurity threat detection, and a Platinum Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company’s…
RiskSense Platform Unifies Application & Infrastructure Security Risk Mgmt
Read the original article: RiskSense Platform Unifies Application & Infrastructure Security Risk Mgmt RiskSense®, a company which provides pioneering risk-based vulnerability management and prioritization, and was the Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program for Best…
RiskSense Platform Unifies Application & Infrastructure Security Risk Mgmt
Read the original article: RiskSense Platform Unifies Application & Infrastructure Security Risk Mgmt RiskSense®, a company which provides pioneering risk-based vulnerability management and prioritization, and was the Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program for Best…
Forescout Returns to Compete in 3rd ‘ASTORS’ (Learn More, Multi-Videos)
Read the original article: Forescout Returns to Compete in 3rd ‘ASTORS’ (Learn More, Multi-Videos) Forescout Technologies, a leader in device visibility and control, and a Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the…
Thycotic Free Digital Toolkit Helps Secure Remote Worker Access
Read the original article: Thycotic Free Digital Toolkit Helps Secure Remote Worker Access Thycotic, provider of Privileged Access Management (PAM) solutions, and a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has released a free digital toolkit for…
Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide
Read the original article: Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide Guest Editorial by Eddie Segal The number of remote workers grew substantially since the World Health Organization officially declared Covid-19 a pandemic on March 11.…
Securing Endpoints is a Top Concern in Reducing Attack Dwell Times
Read the original article: Securing Endpoints is a Top Concern in Reducing Attack Dwell Times Attivo Networks®, a leader in deception for cybersecurity threat detection, Triple Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, and a multiple product competitor…
5G Cyber Security: Threats and Possible Solutions
Read the original article: 5G Cyber Security: Threats and Possible Solutions Guest OpEd by Gilad David Maayan Digital transformation is sweeping over the world, demanding new and better solutions for connectivity, user experience, and communication. 5G is a new cellular networking…
Is Remote Working as Secure as it Needs to Be?
Read the original article: Is Remote Working as Secure as it Needs to Be? By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be…
Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards
Read the original article: Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards Singlewire Software, a leading provider of IP-based voice applications for emergency communication with mass notification capabilities, and Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards…
Attivo Networks Powers up with New Energy Impact Partners
Read the original article: Attivo Networks Powers up with New Energy Impact Partners Cyber threats to the Energy sector are on the rise. As one of the sixteen national critical infrastructure sectors, it is vital that energy companies are able…
50% of Young Consumers Share their Log-In Details, Says Iproov Report
Read the original article: 50% of Young Consumers Share their Log-In Details, Says Iproov Report Biometric authentication technology firm iProov has released new research indicating that 75 percent of under-25 year olds the U.S. (and almost 80 percent in the…
ManTech Returns to Compete in 2020 ‘ASTORS’ Awards Program
Read the original article: ManTech Returns to Compete in 2020 ‘ASTORS’ Awards Program Today, every facet of space, from complex ground stations to data transport facilities, to the spacecraft themselves, faces the same challenge: cyberattacks that can disable systems vital…
The Outpour of Personal Information and Cybersecurity
Read the original article: The Outpour of Personal Information and Cybersecurity Guest Editorial by Shahab Nafees Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to…
The Outpour of Personal Information and Cybersecurity
Read the original article: The Outpour of Personal Information and Cybersecurity Guest Editorial by Shahab Nafees Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to…
Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program
Read the original article: Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions…
Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report
Read the original article: Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report Data Theorem, a leading provider of modern application security, and a competitor in the 2020 ‘ASTORS’ Homeland Security Awards Program, has been recognized in the…
Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program
Read the original article: Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program Gurucul, a Winner in the 2016, 2018 and 2019 ‘ASTORS’ Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to…
Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program
Read the original article: Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program Gurucul, a Winner in the 2016, 2018 and 2019 ‘ASTORS’ Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to…
BeyondTrust Nominated in Third ‘ASTORS’ Awards Program
Read the original article: BeyondTrust Nominated in Third ‘ASTORS’ Awards Program According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling,…
People & Tech an Effective One-Two Punch in Gov’ts Cybersecurity Battle
Read the original article: People & Tech an Effective One-Two Punch in Gov’ts Cybersecurity Battle By Brandon Shopp, Vice President, Product Strategy and Security, SolarWinds As you’re reading this, a data breach is most likely occurring somewhere in the United…
How Federal Agencies Can Secure Data Services in the Cloud
Read the original article: How Federal Agencies Can Secure Data Services in the Cloud Guest Editorial by Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to…
Bricata Network Security Offers Support for MITRE ATT&CK®
Read the original article: Bricata Network Security Offers Support for MITRE ATT&CK® Bricata has released the latest version of its network security platform, featuring the addition of BZAR scripts (Bro/Zeek ATT&CK-based Analytics and Reporting) that enable security analysts to gain additional context…
The Critical 4 Phases of an Incident Response Plan (IRP)
Read the original article: The Critical 4 Phases of an Incident Response Plan (IRP) Guest OpEd by Gilad David Maayan Incident response (IR) is a set of practices and tooling used and created for the purpose of responding to cyber…
BeyondTrust Free Secure Remote Access for Workforce from COVID-19
Read the original article: BeyondTrust Free Secure Remote Access for Workforce from COVID-19 BeyondTrust, a Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is extending the availability of its free 90-Day evaluation for organizations seeking solutions to…
Way to De-Anonymize Device IDs to Users’ Biometrics, Say Researchers
Read the original article: Way to De-Anonymize Device IDs to Users’ Biometrics, Say Researchers April 28, 2020 – In Breaking News – The Hacker News Researchers have uncovered a potential means to profile and track online users using a novel…
SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards
Read the original article: SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to…
Hackers Exploit PayPal and Facebook to Steal Millions Each Month
Read the original article: Hackers Exploit PayPal and Facebook to Steal Millions Each Month Cybersecurity analysts at CyberNews have uncovered an ongoing scam using loopholes in PayPal and Facebook. Fraudsters are stealing roughly $1.6 million per month by convincing Facebook…
Early Entry Discount for 2020 ‘ASTORS’ Awards Ends April 30th
Read the original article: Early Entry Discount for 2020 ‘ASTORS’ Awards Ends April 30th The 2020 ‘ASTORS’ Homeland Security Awards Program Early Entry Discount period closes on April 30, 2020, so get your Nominations in Today to take advantage of…
Leveling Up Encryption for U.S. Federal Agencies
Guest Editorial by Walter Paley, VP of Communications for SafeLogic It’s 2020, and for folks working in the cryptography niche, that means it is time to address a convergence of complications. I don’t want to say that things were simple…
Leveling Up Encryption for U.S. Federal Agencies
Guest Editorial by Walter Paley, VP of Communications for SafeLogic It’s 2020, and for folks working in the cryptography niche, that means it is time to address a convergence of complications. I don’t want to say that things were simple…
SolarWinds Security Event Manager Competes in 2020 ‘ASTORS’ Awards
SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the SolarWinds Security Event Manager, formerly Log & Event Manager,…
Data Theorem Competes in 2020 ‘ASTORS’ Awards Program
Data Theorem, a leading provider of modern application security, is pleased to announce that API Discover and API Inspect have been nominated in the 2020 ‘ASTORS’ Homeland Security Awards Program for Best Application Security . Data Theorem’s API Discover and API…
7 Cybersecurity Threats and Trends to Watch for in 2020 (Multi-Video)
Guest OpEd by Gilad David Maayan Cybercriminals are constantly looking for new strategies and exploits to damage organizations. However, some older threats remain amongst the most common attacks on businesses. The overall damage related to cybercrime is expected to reach $6…
7 Cybersecurity Threats and Trends to Watch for in 2020 (Multi-Video)
Guest OpEd by Gilad David Maayan Cybercriminals are constantly looking for new strategies and exploits to damage organizations. However, some older threats remain amongst the most common attacks on businesses. The overall damage related to cybercrime is expected to reach $6…
NICE to Drive Digital Transformation for Nassau NY Police & DA’s Office
NICE, a world leader in providing both cloud and on-premises enterprise software solutions for law enforcement agencies, and a Multiple Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for Four Consecutive Years, has been selected by Nassau County,…
McLaren Racing Relies on Darktrace AI to Defend Against CyberAttacks
Darktrace, a leading cyber AI company and Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has been selected by McLaren Racing an their AI Cyber Security Partner. This new multi-year partnership will involve a technical integration of Darktrace’s cyber…
Cloud Access Security Brokers Give Peek into Better Application Security
By Nico Fischbach, Global Chief Technology Officer for Forcepoint Federal agencies are undergoing a massive transition from legacy IT technologies to the cloud. Many CIOs have been focused on moving their organizations to hybrid, multi-cloud environments dependent on many different…
Award Winning RiskLens Unveils the RiskLens FAIR Enterprise Model™
RiskLens, a leading provider of cyber risk quantification (CRQ) and cyber risk management solutions, and a Winner in the Annual ‘ASTORS’ Homeland Security Awards Program Two Years Running, is pleased to unveil the RiskLens FAIR Enterprise Model™ (RF-EM™). The RF-EM™…
DC1000B Marks Kingston’s Entrance into NVMe Data Center Drives
Kingston Technology, a world leader in memory products and technology solutions, and a Double Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has introduced a new data center SSD, the DC1000B M.2 NVMe boot drive. This new drive is ideal…
Super Bowl LIV Security & Bill Bratton on Verizon’s $80M Ramp Up
Public safety agencies have been planning for years to ensure the stadium, associated sites and events leading up to Super Bowl LIV are protected and connected, in a collaboration that requires the resources and tremendous support of private sector partners.…
Super Bowl LIV Security & Bill Bratton on Verizon’s $80M Ramp Up
Public safety agencies have been planning for years to ensure the stadium, associated sites and events leading up to Super Bowl LIV are protected and connected, in a collaboration that requires the resources and tremendous support of private sector partners.…
Forescout eyeSegment for Enterprise Wide Network Segmentation
With the explosive growth of non-traditional endpoints on government networks, it is critically important to gain a consolidated view not only of all government-owned PCs, laptops, servers and mobile devices, but also connected contractor and guest devices, IoT endpoints, operational…
Ransomware Dashboard Tells If and Where Firms Vulnerable to Attack
RiskSense®, a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has announced an industry first. A new Ransomware Dashboard, RiskSense has developed automatically reveals all of an organization’s exposure to specific attacks, including the ransomware family name,…
Ransomware Dashboard Tells If and Where Firms Vulnerable to Attack
RiskSense®, a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has announced an industry first. A new Ransomware Dashboard, RiskSense has developed automatically reveals all of an organization’s exposure to specific attacks, including the ransomware family name,…
Santa Fe Group Honored for Cyber Security Risk Mgmt (See Video)
Third-party risk has caused millions of dollars in loss and damage. The heightened pace of attacks and constant evolution of malware and tactics make it imperative that organizations and agencies be constantly vigilant and approach risk management with programmatic precision.…
Can PAM Coexist with the Zero Trust Security Model? Yes says Thycotic
By Joseph Carson, Chief Security Scientist (CSS) & Advisory CISO at Thycotic What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the term was coined by Forrester back in…