Cutting-edge innovations in the transport industry such as cloud migration have transformed efficiency, paving the way for consumer ease – but they have also introduced a complex threat landscape where attackers have more places to hide. Darktrace

Darktrace Reveals Increased Cyber Incidents in U.S. Transport & Logistics

The increasing digitization of transportation networks allows organizations in the transport and logistics industry to optimize their operations, from scheduling to the transportation of passengers and goods, but the complex intersection...

Seraphic Brings Home the Gold in the 2022 ‘ASTORS’ Awards Program

Seraphic Security is pleased to announce its been named a Gold 'ASTORS' Award Winner in the 2022 ‘ASTORS’ Homeland Security Awards from American Security Today for its innovation in Cyber Security...
Protecting government agencies from software supply chain attacks—and interrupting the Cyber Kill Chain—requires a concerted effort. Let’s look at three key practices agencies can follow to better protect against the growing threat of supply chain attacks and help ensure the software they procure doesn’t serve as a threat vector. (Courtesy of SolarWinds)

3 Ways Govt IT Pros Can Prevent Software Supply Chain Attacks

Guest OpEd by Brandon Shopp, GVP, Product Strategy, SolarWinds Software supply chain hacks are on the rise. According to the 2022 Verizon® Data Breach Investigations Report, 62% of cyberattacks originate through an...
Each passing year sees more businesses and government agencies embrace the benefits of IoT infrastructures, yet, these benefits can come with an unseen threat in the form of RF attacks that may lead to high-level data breaches and foreign government espionage. As we move towards a more interconnected world, it’s imperative that CISOs and their security teams recognize the threat of RF attacks and take all necessary measures to plug their security gaps. (Courtesy of GBT Technologies)

Learn How RF Security Can Ensure Your IoT Safety

Guest Editorial by Dr. Danny Ritttman, Chief Technology Officer at GBT Technologies Government organizations and commercial businesses understand the need to protect themselves from malicious cyberattacks intent on stealing their trade secrets,...
With a focus on safety and the opportunity to greatly enhance operations and the quality of research and learning, educational institutions could see significant gains by implementing computer vision with real-time federated analytics.

Find Out How Computer Vision is Accelerating Education

By Wayne Arvidson, Global Director, Market Development and Strategy, Dell Technologies Computer vision is revolutionizing many industries, but it’s still making inroads into education. That’s not surprising, given the historically tight budgets for...
The 2022 'ASTORS' Awards Ceremony and Exclusive Luncheon Banquet will be held on Wednesday, November 16th, 2022, from 12:00 pm through 2:30 pm at none other than the Jacob Javits Convention Center in New York City during ISC East!

Are You a 2022 ‘ASTORS’ Finalist or Honoree? Join Us to Celebrate in NYC!

It's time to receive the Recognition you and your organization deserve among your Industry-Leading Peers, and Government Colleagues at the 2022 'ASTORS' Awards Presentation Ceremony and Luncheon Banquet in New York...
SolarWinds

SolarWinds Worldwide Nominated in 7th Consecutive ‘ASTORS’ Awards

The job of the technology professional is hard. Technology is pervasive, complex and always changing. End users can be demanding, and businesses need constant access to an ever-expanding ecosystem of applications and infrastructure. The...
Application platforms like Interplay – a low-code AI platform developed by Iterate.ai – make all of this easier. This new type of application platform marries middleware connectivity with built-in containerization (leveraging Docker and Kubernetes), data layer abstraction, and robust security at all layers to provide a new type of application server that provides an environment for quick development and integration while also continuing the benefits that came from containerization.

The Emergence of Application Servers is Increasing Application Security

Guest Editorial by Brian Sathianathan, Dave Jenkins, and Marek Suscak of Iterate.ai Application Servers are re-emerging in the enterprise, and they are classified by analysts as App Platforms. The demand for faster...
There has been an explosion in human and machine identities with the rapid acceleration of major initiatives such as digital transformation, cloud migration and more. While the attack paths from internal and external threats have not changed, the complexity of managing cyber risks has magnified. (Courtesy of CyberArk)

CyberArk Returns to Compete in Fifth Annual ‘ASTORS’ Awards Program

Escalating numbers of high-profile breaches impacting federal entities and private organizations have revealed the depth and breadth of enterprises’ cybersecurity debt (a combination of expanding attack surfaces, rising numbers of identities,...
Mr. Breslin currently serves as the Director, Strategic Client Relationships, Public Safety for LexisNexis. Additionally, he is a retired federal law enforcement senior executive with twenty-four years of law enforcement and homeland security experience.  Most of Mr. Breslin’s career was spent with the United States Secret Service (USSS), where he served as Deputy Assistant Director in the Office of Investigations, focusing on the integrated mission of investigations and protection. 

Michael Breslin Nominated in 2022 ‘ASTORS’ Homeland Security Awards

Michael Breslin serves as the Director, Strategic Client Relationships, Public Safety for LexisNexis, where in this role, he supports the LexisNexis Federal Government team by managing and establishing the executive relationships...