Code Dx Enterprise is an automated application vulnerability management tool that makes all of your testing tools work together to provide one set of correlated results, then helps you prioritize and manage vulnerabilities—integrating with your application lifecycle management tools so your security and development teams work together for faster remediation.

Code Dx Competes in 2018 ‘ASTORS’ Awards Program (Learn More, Video)

Code Dx, the Platinum Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program for Best Cyber Security for Application Management, is pleased to announce Code Dx Enterprise has been nominated to compete in the 2018 ‘ASTORS’...
AIAG’s new publication supports industry efforts to protect sensitive data by outlining a unified set of cybersecurity guidelines for automotive trading partners

Auto Industry Collaborates on New Cybersecurity Guidelines (Videos)

In today’s increasingly technology driven and connected world, protecting data is more challenging and more critical than ever before. In response to the rising number of cybersecurity threats to the supply chain,...
The Veridium Enterprise-Ready App allows organizations to deploy Multi-Factor Biometric Authentication to reduce cost while ensuring convenient, fast and secure identity verification with Veridium’s 4 Fingers TouchlessID biometric as well as native fingerprint and face.

Veridium App Competes in 2018 ‘ASTORS’ Awards Program (Videos)

Veridium, a leader in strong authentication solutions using biometrics instead of passwords and tokens, is pleased to announce the Veridium Authenticator App has been nominated to compete in the 2018 ‘ASTORS’ Homeland Security Awards...
Attivo Networks for ICS-SCADA

Attivo for ICS-SCADA in the 2018 ‘ASTORS’ Homeland Security Awards

Attivo Networks, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's ThreatDefend Deception and Response Platform has been nominated to compete in multiple categories of the...
SolarWinds is revolutionizing the way federal IT manages their operations, providing federal customers – including nearly every civilian agency, DoD branch, and intelligence agency – with products that are easy to download, install, evaluate, and buy, while delivering the power to address any IT management problem on any scale.

The Govt’s IoT Investment Calls for an Equal Investment in Security

By Paul Parker, Chief Technologist, SolarWinds The U.S. Defense Department’s investment in the Internet of Things (IoT) has created an interesting paradox. On the one hand, the IoT has helped make ships, planes,...
Protect privileged accounts, prevent and contain breaches, and achieve compliance on Unix & Linux systems. PowerBroker enables you to eliminate credential sharing, limit root access, and ensure accountability – without hurting productivity.

BeyondTrust Competes in 2018 ‘ASTORS’ Homeland Security Awards

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...

NCL Cyber Education Competition Empowers Students to Reach High

From students to teachers, the benefits of participating in the National Cyber League (NCL) cybersecurity competition runs a wide gamut, and every season more people are realizing the appeal. Its virtual training ground helps...
Drive threat prevention to unmatched levels. The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Deep learning makes Intercept X smarter, more scalable, and higher performing than security solutions that use traditional machine learning or signature-based detection alone.

“The Dirty Secrets of Network Firewalls,” from Sophos (Multi-Video)

Sophos has announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45% of their organization’s network traffic. In fact, nearly one-in-four cannot...
Vincent Ramos, CEO of Canada-based Phantom Secure & four associates were indicted on charges that they knowingly and intentionally participated in a criminal enterprise that facilitated the importation & distribution of narcotics through the sale & service of encrypted communications to evade law enforcement and obstruct justice while committing transnational drug trafficking.

Phantom Secure Takedown: Selling Unhackable Phones to Drug Cartels

Phantom Secure Helped Drug Traffickers, Organized Crime Worldwide International organized crime and drug trafficking groups were dealt a blow by the takedown of an encrypted communication service they used to plan and...
The Veridium Authenticator App lets employees capture and authenticate using their biometrics – face, native fingerprint, and 4 Fingers TouchlessID – on their mobile devices, eliminating the need for passwords and tokens.

Veridium Eliminates Need for Passwords with New Biometric App

Authentication solutions firm Veridium, is introducing Veridium Authenticator App, an enterprise-ready solution enabling a cost-efficient, convenient and more secure multi-factor authentication process. The app is now available for download on any iOS and Android...