Home IT Security Corporate Facilities

Corporate Facilities

Availability bias is the human tendency to think that examples of things that come readily to mind are more representative than is actually the case, which can hamper critical thinking and, as a result, the validity of our decisions.

Minimizing Cognitive Bias in Cybersecurity

Guest OpEd by Margaret Cunningham, Principal Research Scientist, Forcepoint It is 7am, and ten minutes into the morning you have already dismissed the first round of notifications littering your screen. Respond, dismiss, delete,...
Security begins at the input device – stay protected from keyloggers and BadUSB attacks with the SECURE BOARD 1.0 from CHERRY. With the new CHERRY SECURE BOARD 1.0, accessing sensitive credentials and passwords will be impossible for hardware keyloggers, as keys are entered in encrypted form.

CHERRY Grows it’s US Base with Executive Promotions & Input Devices

Developments such as digitization and Big Data and the exponentially growing mountains of data that go hand in hand with them are stirring a desire for more. Not only for cybercriminals who...
Bad actors are targeting governments, schools, and other public institutions with extra venom. Ransomware is proving to be such a problem for the public sector primarily because of the rise of third-party cloud channels: social media tools, messaging apps, and collaboration platforms.

To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels

Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....

7 Data Loss Prevention Strategies and Practices You Should Know

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
While not being able to quickly access emails or social media posts can be annoying to a general consumer, wireless connectivity becomes critical when police and fire departments, security personnel and medical professionals need access to many types of data, video, images and more in in real-time. 2020 ’ASTORS’ Competitors Skywire Networks and Siklu, is uniquely qualified to bring immediate high-speed connection to highly congested conditions – in terms of the density of buildings in the end point areas (at an average of 30 stories) and in terms of a crowded and noisy radio transmissions environment.

Pandemic Response – How to Set up Temporary Gigabit Wireless Access Networks

Implementing a wireless network to establish or expand broadband communications services in emergency situations (health, weather, natural disaster related or other) can be a tricky endeavor. Requirements include replacing the capacity lost...
Brinqa Cyber Risk Services intelligently connect security, asset and threat data from all relevant sources to measure, prioritize, remediate and manage cyber risk. The solution provides a truly open data model and completely configurable risk scoring methodology. (Courtesy of Brinqa)

Brinqa Returns with Two Products to Compete in 2019 ‘ASTORS’ Awards

Brinqa™, a leader in Cyber Risk Management recognized in 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce that Brinqa Cyber Risk Services and Brinqa Vulnerability Risk Service have been nominated...
The new award-winning features of the HALO IOT Smart Sensor include air quality monitoring, BACnet (a communication protocol for Building Automation and Control networks that leverage the ASHRAE, ANSI, and ISO 16484-5 standard protocol) integration and cleaning chemical signature verification.

HALO Unveils New Features to Aid in Safe Return to Work and School

IPVideo Corporation, a 2019 'ASTORS' Multiple Award Winner, is proud to announce the HALO IOT 2.2 Smart Sensor, now includes sound alert incident management incorporates alerts for spoken key words, advanced gunshot...
Nightfall ai logo

5 Common Accidental Sources of Data Leaks

In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or account takeovers,...

Everbridge Helps Mitigate Impact of COVID-19 for Safe Return to Work

Everbridge, a global leader in Critical Event Management (CEM), and a Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for Three Consecutive Years, has achieved the International Organization for Standardization (ISO) and the...
Carnival Corp says it suffered a ransomware attack on Saturday, August 15, and that hackers stole some of its data.

World’s Largest Cruise Line Operator Suffers Ransomware Attack

Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain of Carnival’s data...