The Critical 4 Phases of an Incident Response Plan (IRP)

Guest OpEd by Gilad David Maayan Incident response (IR) is a set of practices and tooling used and created for the purpose of responding to cyber security incidents. The incident response plan...
“We have been able to meet the demands of supporting home equipment and getting people ready to work so they can continue essential operations for a health care system while building out capacity for surge patients, all while keeping our backbone operational staff safe at home.” “We would not have been able to accomplish this without BeyondTrust.” (Courtesy of Mount Sinai South Nassau and Twitter)

BeyondTrust Free Secure Remote Access for Workforce from COVID-19

BeyondTrust, a Platinum Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, is extending the availability of its free 90-Day evaluation for organizations seeking solutions to enable Secure Remote Access...

Protect Your People with COVID-19 Updates via Mass Notification

Guest Editorial by Paul Shain, President and CEO of Singlewire Software The coronavirus has caused immeasurable disruptions across every possible industry. It presents a very real threat to many organization’s daily operations. While...
CivicReady Regroup

Local Gov’ts Get 90 Day Access to Regroup Mass Notification & CivicPlus

In response to the unprecedented COVID-19 pandemic, Regroup Mass Notification, a Nominated Competitor in the 2020 'ASTORS' Homeland Security Awards Program, with its partner CivicPlus are offering cities and counties across the...

SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards

SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the SolarWinds Access...

Leveling Up Encryption for U.S. Federal Agencies

Guest Editorial by Walter Paley, VP of Communications for SafeLogic It’s 2020, and for folks working in the cryptography niche, that means it is time to address a convergence of complications. I don’t...
As malicious actors step up their game and adopt new strategies to steal personal data, you should consider adopting high-tech solutions such as Artificial Intelligence (AI) to protect your business from privacy breaches and identity fraud. (Courtesy of Unplash)

How AI Can Protect Your Business from Identity Fraud

Guest Editorial by Gil Artmoore While the number of identity fraud cases has steadily declined over the past few years, the financial burden borne by the victims has increased. According to Javelin...
With SolarWinds Security Event Manager

SolarWinds Security Event Manager Competes in 2020 ‘ASTORS’ Awards

SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the...
API Security for Dummies

Data Theorem Competes in 2020 ‘ASTORS’ Awards Program

Data Theorem, a leading provider of modern application security, is pleased to announce that API Discover and API Inspect have been nominated in the 2020 'ASTORS' Homeland Security Awards Program for Best...

7 Cybersecurity Threats and Trends to Watch for in 2020 (Multi-Video)

Guest OpEd by Gilad David Maayan Cybercriminals are constantly looking for new strategies and exploits to damage organizations. However, some older threats remain amongst the most common attacks on businesses. The overall damage...