ATI Enhancements for Warning Systems of Critical Applications
Acoustic Technology Inc. (ATI Systems), a world leading provider of reliable emergency warning & mass notification systems (MNS), is a recipient of the 2017 Platinum ‘ASTORS’ Award for Best Mass Notification...
COMSAT Demos the Power of Preparedness During CA Wildfires
COMSAT, a U.S.-based satellite connectivity provider, has successfully demonstrated the power of preparedness in reaction to the recent wildfires in California.
The Thomas Fire, reported to be the largest in California state...
Centrify Recognized in 3 Research Reports by Forrester Research Inc.
Centrify, a leader in securing hybrid enterprises through the power of identity services, and Platinum Winner for Best Cyber Security for ID Mgmt & Access Control in the 2017 ‘ASTORS’ Homeland Security Awards, is...
SolarWinds Goes for Hat Trick in 2018 ‘ASTORS’ Awards (Multi-Video)
Threats to IT networks continue to accelerate and evolve.
While enterprising hackers from external sources test the robustness of network security parameters, internal threats in the form of careless and malicious insiders...
DURABOOK Now Avail via USAF BPA in the Rugged Notebook Category
Durabook Americas, formerly GammaTech Computer Corporation, a 2017 'ASTORS' Homeland Security Awards Program Winner, is pleased to announce its DURABOOK R8300 R3 is now available via the U.S. Air Force Client Computing Solutions...
Are Your Employees Prepared for an Active Shooter Situation?
By John Arendes, VP and GM, Global Compliance Solutions, Skillsoft
Today, tragic events in the news are far too commonplace. In recent years, the United States has witnessed shootings in schools, shopping...
Fighting Cyber Threats to the Growing US Economy (Learn More, Videos)
By The White House
Information technology (IT) creates enormous value for the U.S. economy.
However, it also exposes U.S. firms, the government sector, and private individuals to new risks that originate and are...
BlackBerry Jarvis: Game Changing Cybersecurity Tool for OEM (Videos)
A modern car has over 100 million lines of software.
As the software in a car grows so does the attack surface, which makes it more vulnerable to cyberattacks.
Each poorly constructed piece...
Stop Hackers at the Gate with Thycotic Endpoint Privilege Mngt
Will Windows 10’s security controls keep malware from exploiting your endpoints?
Not without closing the gaps in Microsoft’s approach to privilege management and application control it won’t.
Head into a Windows 10 migration...
Netwrix & Concept Searching to Enrich Security Intel (Learn More)
Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid environments, and Platinum Award Winner for Best Cyber Auditing & Compliance Solution Two Years Running...