Implementing SecOps can be challenging, as it often requires not only a change in processes but also in how IT operations teams think.

4 SecOps Challenges and How to Overcome Them

Guest OpEd by Gilad David Maayan The competitive software market has created a paradox of conflicting demands. On the one hand, consumers have come to expect ever-faster software delivery, and this includes...
How can you make sure your corporate data and valuable company information is safe and protected against data theft? Today’s MFPs (multifunctional peripherals) offer a huge range of functions and choices – which unfortunately goes along with a similarly wide range of potential security loopholes. Konica Minolta’s answer to this is the reliable protection of bizhub SECURE: together with you, we determine which of our industry-leading security standards are right for you. With this set of security measures, we give your Konica Minolta bizhub MFP and especially its HDD an extra level of protection to ensure that your data is more than secure – it’s bizhub SECURE!

Konica Minolta Scores Four Finalist Spots in 2019 ‘ASTORS’

Konica Minolta Business Solutions, a leader in delivering world-class business transformation solutions and technologies, and a Multi-Award Winner in the Annual 'ASTORS' Homeland Security Awards Program for Two Consecutive Years, is...
Secret Server is the only feature-complete PAM service in the world, enabling discovery of local and service accounts across the organization while securing password management for organizations ranging from SMBs to enterprises.

Thycotic Secret Server Returns as Finalist in 2019 ‘ASTORS’ (See Video)

Thycotic, a Gold Award Winner in both the 2016 and 2018 'ASTORS' Homeland Security Awards Programs, is happy to announce the company's flagship solution Secret Server has been selected as a...
Code Dx Enterprise helps secure applications by providing an easy-to-use and affordable application vulnerability correlation and management solution, enabling organizations to overcome the obstacles they face that are deterrents to using application security testing (AST) tools.

Code Dx Selected a Finalist in 2019 ‘ASTORS’ Awards for Third Year

Code Dx, a Platinum Award Winner for two consecutive years in the Annual 'ASTORS' Homeland Security Awards Program, is pleased to announce that Code Dx Enterprise Application Vulnerability Management System, has...
Shared Assessments is an epicenter of risk management, benefiting from the diverse perspectives of many of the world’s most innovative practitioners in Third-Party Risk Management (TPRM).

Shared Assessments a Finalist in the 2019 ‘ASTORS’ for Cyber Risk Mgmt

Third-party risk has caused millions of dollars in loss and damage. The heightened pace of attacks and constant evolution of malware and tactics make it imperative that organizations and agencies be constantly...
ManTech’s ACRE is a unique physical and virtualized cyber range that brings best-in-class cyber defense expertise to a new generation of professionals.

ManTech a New Competitor in 2019 ‘ASTORS’ Awards Program (Videos)

Protecting against cyberattacks is an inside job. Organizations can readily test their own network security posture and defenses while training their security teams quickly and affordably with the ACRE™ Cyber Range, a...
Canon Solutions America’s experts took MetLife Stadium event attendees on a journey through real world demonstrations of their Five Pillars of Security, a layered security approach encompassing device security, print security, document security, information security, and cybersecurity, to outline a business model that can be easily and efficiently implemented. (Courtesy of Canon Solutions America)

Canon Showcases Information Security at Special Event (Multi-Video)

Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., a leader in digital imaging solutions, Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and multi-product competitor in the 2019 ‘ASTORS’ Awards...
We often think of cyber threats as coming from an anonymous criminal, hundreds of miles away behind a computer screen. However, current and former employees who have intimate and valuable knowledge about a company are also capable of committing a cybercrime. (Courtesy of YouTube)

DoD Raising Insider Threat Awareness to Safeguard National Security

The Department of Defense (DoD), is partnering with intelligence and law enforcement agencies to educate government employees on how to detect and mitigate insider threats that pose national security risks. The DoD, National Insider...
HydrantID will Expand Enterprise PKI Management Services for Network Security and IoT Devices, strengthening HID’s Identity and Access Management solutions portfolio to solve customer’s digital security challenges.

HID Global Acquires HydrantID Managed PKI for IoT Devices & More

HID Global®, a worldwide leader in trusted identity solutions, and a 2018 ‘ASTORS’ Homeland Security Awards Winner, has acquired HydrantID, a provider of management and automation services to secure enterprise organizations’ data, IT...
The future is here, with digital transformation strategies rapidly disrupting modern-day office environments, their related technologies, and the way we work. With the imminent evolution of technology heavily influencing everything from business workflow to employee habits to cybersecurity and beyond, many companies face questions on how to navigate the new workplace.

Preventing Security Breaches in the Digital Workplace, New Canon Survey

While digital transformation helps companies work smarter, the ongoing digitization unlocks a wealth of security vulnerabilities that can cost companies money, time, intellectual property, and customer trust. In its latest Office of...