Data Theorem Offers API Security Solutions that Automate Continuous API Security Analysis and Vulnerability Inspection

Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report

Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...
Semperis ADFR

Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program

While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans. Almost...
Databreach

The Outpour of Personal Information and Cybersecurity

Guest Editorial by Hajra Khan Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to the internet. But...
People are recycling and sharing passwords leaving themselves exposed and vulnerable. The time has come to adopt alternatives and good biometric authentication combines effortless usability with the security to safeguard society’s most sensitive personal data, according to Andrew Bud, Founder and CEO of Iproov. (Courtesy of Iproov)

50% of Young Consumers Share their Log-In Details, Says Iproov Report

Biometric authentication technology firm iProov has released new research indicating that 75 percent of under-25 year olds the U.S. (and almost 80 percent  in the UK), have used someone else’s password...

Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards

Singlewire Software, a leading provider of IP-based voice applications for emergency communication with mass notification capabilities, and Gold Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, is pleased to...
Working remotely, you can forget your authentication details (particularly when using multi-factor authentication), send a link to the wrong person, click on an ad for something fake, have your online activity traced, or even see your laptop or smartphone stolen, which makes training very important.

Is Remote Working as Secure as it Needs to Be?

By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be technically viable, and accepted some of the...
Vismo Incident Management communicates key information about emerging incidents within seconds to those at risk

Global Tracking Specialist Vismo Unveils Vismo Incident Management

Vismo Global Tracking Solutions has announced the availability of Vismo Incident Management, which allows organizations to alert traveling staff to incidents that are a threat or potential threat to their well-being. Alerts...
As attacks have grown in complexity, the need for defenders to employ effective automation has also increased, and cybersecurity teams have sought to respond accordingly by investing in tools that help eliminate the manual work associated with incident detection, analysis, and response.

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response

Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 'ASTORS' Awards Cybercrime is always evolving, and as technology becomes more advanced, so too do...
In addition to work culture changes brought by the shift to remote work, hackers are leveraging people’s fear and uncertainty to launch a wide range of attacks on remote workers.

Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide

Guest Editorial by Eddie Segal The number of remote workers grew substantially since the World Health Organization officially declared Covid-19 a pandemic on March 11. Within a few weeks, an estimated 16...
The release of this new toolkit comes on the heels of Thycotic's latest product release, Remote Access Controller, which is also designed to help organizations manage challenges associated with securing a remote workforce.

Thycotic Free Digital Toolkit Helps Secure Remote Worker Access

Thycotic, provider of Privileged Access Management (PAM) solutions, and a Gold Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, has released a free digital toolkit for Remote Worker Cyber Security. The...