Renaud Deraison, co-founder and chief technology officer, Tenable

Tenable Research Team Discovers Slack Download Hijack Vulnerability

Tenable, a cyber exposure company, has announced the company's research team has discovered a vulnerability in the Slack Desktop Application for Windows that could have allowed an attacker to alter where...
Silverfort enables adaptive multi-factor authentication and identity theft prevention for every sensitive user, device and asset across all environments.

Silverfort Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

Corporate networks are going through dramatic changes in recent years, due to IT revolutions such as the cloud, Internet of Things (IoT), Bring Your Own Device (BYOD) and more. In this new...
An automaker with 100+ manufacturing facilities in 30+ countries implemented Indegy to monitor and track production changes and controller upgrades in real-time, discover/maintain accurate OT inventory, and provide a rich audit trail for forensics. (Courtesy of Indegy)

Indegy Industrial Cyber Security Firm Competes in 2019 ‘ASTORS’ Awards

Industrial control system (ICS) networks including SCADA systems are vulnerable to cyber threats on several fronts. First, operational technology (OT) networks that control the critical infrastructure in industrial operations lack basic security...
Fortanix SDKMS, the Gold ‘ASTORS’ Award Winner in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

‘ASTORS’ Award-Winning Fortanix SDKMS Earns FIPS Level 1 Cert

Fortanix, recently recognized as the Gold Award Winner in the 2018 'ASTORS' Homeland Security Awards Program, for the company's Self-Defending Key Management Service™ (SDKMS) is pleased to announce they have earned...

Leading Cyber Startup Cymulate Competes in 2019 ‘ASTORS’ Awards

Organizations worldwide are continually under attack by hackers and cyber criminals, leaving their most sensitive assets - be it IP, data or cash - and reputation at stake. Security testing is a...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Canon U.S.A. Emerges a 2018 Digital Imaging Market Share Leader

Continually providing customers with solutions to help equip them for advancement in a time of digital transformation, Canon U.S.A., who was recently recognized as a Multi-Award Winner in the 2018 ‘ASTORS’...
SolarWinds Network Configuration Manager (NCM) provides continuous real-time monitoring and alerts for automated detection and remediation of harmful security violations.

SolarWinds Network Configuration Manager Competes in 2019 ‘ASTORS’

SolarWinds Worldwide, a leading provider of powerful and affordable IT management software, and Platinum Award Winner for Three Consecutive Years in the Annual 'ASTORS' Homeland Security Awards Program, is pleased to...

Attivo Networks Powers up with New Energy Impact Partners

Cyber threats to the Energy sector are on the rise. As one of the sixteen national critical infrastructure sectors, it is vital that energy companies are able to adequately defend themselves from...
Your Biggest Asset is Also Your Biggest Risk The greatest threat to businesses today isn’t the outsider trying to get in. It’s the people you trust—the ones who already have the keys. (Courtesy of ObserveIT)

ObserveIT 7.7 Competes in 2019 ‘ASTORS’ Awards Program

ObserveIT, a leading insider threat management provider recognized in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company’s ObserveIT introduced its newest solution, ObserveIT 7.7 has been nominated to compete...
Access rights don’t have to be hard to audit and report on. Manage and audit access rights across your IT infrastructure with SolarWinds Access Rights Manager.

SolarWinds Access Rights or Access Risks? In 2019 ‘ASTORS’ Awards

Webcast: Access Rights or Access Risks? Date: Tuesday, April 30, 2019 Time: 11 am - 12 pm CT Access rights management is often viewed as a “nice-to-have” solution within IT security...