Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards

Singlewire Software, a leading provider of IP-based voice applications for emergency communication with mass notification capabilities, and Gold Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, is pleased to...
People are recycling and sharing passwords leaving themselves exposed and vulnerable. The time has come to adopt alternatives and good biometric authentication combines effortless usability with the security to safeguard society’s most sensitive personal data, according to Andrew Bud, Founder and CEO of Iproov. (Courtesy of Iproov)

50% of Young Consumers Share their Log-In Details, Says Iproov Report

Biometric authentication technology firm iProov has released new research indicating that 75 percent of under-25 year olds the U.S. (and almost 80 percent  in the UK), have used someone else’s password...
Databreach

The Outpour of Personal Information and Cybersecurity

Guest Editorial by Hajra Khan Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to the internet. But...
Semperis ADFR

Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program

While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans. Almost...
Data Theorem Offers API Security Solutions that Automate Continuous API Security Analysis and Vulnerability Inspection

Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report

Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...
Gurucul provides a comprehensive view of user/entity behaviors and detects risky outliers using a library of advanced machine learning (ML) models and identity-centric data science, artificial intelligence (AI), anomaly detection and predictive risk-scoring algorithms to identify abnormal behaviors and activities indicative of security threats. (Courtesy of Gurucul)

Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program

Gurucul, a Winner in the 2016, 2018 and 2019 'ASTORS' Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to compete in the 2020...
Protect privileged accounts, prevent and contain breaches, and achieve compliance on Unix & Linux systems. PowerBroker enables you to eliminate credential sharing, limit root access, and ensure accountability – without hurting productivity.

BeyondTrust Nominated in Third ‘ASTORS’ Awards Program

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...

Bricata Network Security Offers Support for MITRE ATT&CK®

Bricata has released the latest version of its network security platform, featuring the addition of BZAR scripts (Bro/Zeek ATT&CK-based Analytics and Reporting) that enable security analysts to gain additional context around alerting and...
Regroup Mass Notification

Regroup Returns to Compete in 4th Annual ‘ASTORS’ Awards Program

Regroup Mass Notification, the Platinum Award Winner for Best Mass Notification Solution in the 2019 'ASTORS' Homeland Security Awards Program, is pleased to announce the company has been nominated in the...

The Critical 4 Phases of an Incident Response Plan (IRP)

Guest OpEd by Gilad David Maayan Incident response (IR) is a set of practices and tooling used and created for the purpose of responding to cyber security incidents. The incident response plan...