The Cognitive Science Behind Cybersecurity

Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...
Everbridge report finds that despite increase in awareness and concern around active shooters, half of organizations don’t have a communications plan in place, and 62% never run drills.

Active Shooters Rank Top Threat, But Most Firms Lack Safety Measures

Over three quarters of organizations list an active shooter situation as their top safety threat, according to Everbridge, a global leader in critical event management and enterprise safety applications, and a Two Time...
On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
A VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions. (Courtesy of YouTube)

What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)

By Howard Dawson, Writer & Tech Enthusiast Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private. They allow for safe surfing of the internet and to...
'ASTORS' Award-Winning Regroup empowers better mass communication to keep people safe and informed at all times.

Regroup Mass Notification Nominated in 2019 ‘ASTORS’ Awards Program (Multi-Video)

Regroup Mass Notification, a recognized leader in the mass communications sector, and a Platinum Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the cloud-based mass communication platform...
2018 'ASTORS' Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Cybersecurity & Fraud Analytics Hit Record Growth in 2018

Gurucul, a leader in behavior based security and fraud analytics technology, and a Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, achieved record business results in 2018 which includes a 200% increase...
Silverfort enables adaptive multi-factor authentication and identity theft prevention for every sensitive user, device and asset across all environments.

Silverfort Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

Corporate networks are going through dramatic changes in recent years, due to IT revolutions such as the cloud, Internet of Things (IoT), Bring Your Own Device (BYOD) and more. In this new...
HID’s new beacon and the Bluvision end-to-end IoT platform enable hospitals to easily plug real-time duress detection and alerts into their healthcare IoT infrastructure. This powerful combination simplifies the process of increasing healthcare personnel safety with a solution that also requires minimal effort by the user. (Courtesy of HID Global)

IoT Beacons Help Keep Doctors, Hosp Staff Safe from Workplace Violence

HID Global, a leader in trusted identity solutions, and Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, has launched the company's new BEEKs Duress Badge Beacon which addresses the growing need to protect doctors,...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...
Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web

95% of IT Pros Underestimate Phishing Attack Risks, SlashNext

SlashNext, a leader in real-time phishing site detection for businesses, and a 2018 'ASTORS' Homeland Security Award Winner for Best Phishing Defense Solutions, has released new survey results suggesting a dangerous...