The future is here, with digital transformation strategies rapidly disrupting modern-day office environments, their related technologies, and the way we work. With the imminent evolution of technology heavily influencing everything from business workflow to employee habits to cybersecurity and beyond, many companies face questions on how to navigate the new workplace.

Preventing Security Breaches in the Digital Workplace, New Canon Survey

While digital transformation helps companies work smarter, the ongoing digitization unlocks a wealth of security vulnerabilities that can cost companies money, time, intellectual property, and customer trust. In its latest Office of...
Brinqa Cyber Risk Services were built for security; transforming security, context and threat data into knowledge-driven insights that empower organizations to own their cyber risk.

Brinqa is a New Competitor in 2019 ‘ASTORS’ Homeland Security Awards

The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...
PC Matic's security solution is used by home users, as well as in business environments such as U.S. local governments, municipalities, and educational institutions, explains Rob Cheng, CEO & Founder of PC Matic.

American-Made PC Matic Returns to Compete in 2019 ‘ASTORS’ Awards

PC Matic, a security solution that has been recognized for the last two consecutive years in the Annual 'ASTORS' Homeland Security Award Program, has continued to be a leader in anti-malware...
Image courtesy of Pixabay

DevOps Security: Secrets from the Trenches

By Gilad David Maayan The marriage of software development and operations in the form of DevOps is now a well-established concept and has mostly replaced traditional waterfall development models. However, security is...

Combat Vets Transition to HSI HERO’s Battling Child Exploitation (Videos)

Twelve military veterans graduated from the U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security Investigations (HSI) Human Exploitation Rescue Operative (HERO) Child Rescue Corps program during a ceremony at ICE Headquarters...
Therefore™ information management software enables you to store, manage and process all kinds of business information efficiently, economically and securely throughout your organization.

Canon Returns to Compete in 2019 ‘ASTORS’ Awards with Therefore™

Canon U.S.A., a leader in digital imaging solutions, and a Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, in pleased to announce multiple products have been nominated to...
Critical events happen every day: severe weather, workplace violence, active shooters, terrorism, IT and power outages & more. Together, NC4 & Everbridge is an end-to-end threat assessment, incident communications & mgmt platform reducing critical incident ‘time to know’ thru remediation-all from a single pane of glass, for gov’t, enterprise, community.

Everbridge Florida Partners Are Ready for Hurricane Dorian (Multi-Video)

Everbridge, a global leader in critical event management software that helps keep people safe and businesses running, and a Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and Everbridge’s partners in...
LRAD 450XL

LRAD Returns to Compete in 2019 ‘ASTORS’ Awards Program (Video)

LRAD Corporation, a Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce multiple LRAD products have been nominated to compete in the 2019 'ASTORS' Awards...
Detecting threats needs to be comprehensive, however it doesn't have to be complicated. Designed for simplicity, Attivo Networks redirects attackers away from the target assets and provides high-fidelity alerting and intelligence on malicious activity and insider policy violations.

No Nonsense Cyber Threat Detection Made Simple with Deception

For years, attackers have successfully used deception tactics for breaching networks. They masquerade as legitimate employees, using stolen credentials and deceptive measures to infiltrate a network, all while remaining undetected for lengthy...
SafeLogic's CrytoComply provides innovative encryption products for applications in mobile, cloud, server, appliance, wearable, IoT, and other constrained environments.

SafeLogic Returns to Compete in 2019 ‘ASTORS’ Awards Program

SafeLogic, an innovator of encryption products for applications in mobile, server, appliance, wearable, and other constrained environments, and a 2018 'ASTORS' Homeland Security Awards Winner, is pleased to announce the CryptoComply has...