The Secret AHW War Against the US: Urgent Call to Action (Multi-Video)

By T. Casey Fleming, Eric L. Qualkenbush, and Anthony M. Chapa ABSTRACT Imagine if Pearl Harbor had been attacked and there had been no response from Washington. This is the actual case today due to...
Equifax Releases Updated Information on 2017 Cybersecurity Incident, confirming Roughly 147.9 million Americans have been affected by Equifax's data breach.

Equifax Big Data Breach Hit 2.4M More People than Reported (Video)

As a result of ongoing analysis of data stolen in last year's cybersecurity incident, Equifax Inc. announced on Thursday that the company has confirmed the identities of U.S. consumers whose partial...
Matt Middleton-Leal, GM of the EMEA region at Netwrix

Netwrix & Concept Searching to Enrich Security Intel (Learn More)

Netwrix Corporation, provider of a visibility platform for user behavior analysis and risk mitigation in hybrid environments, and Platinum Award Winner for Best Cyber Auditing & Compliance Solution Two Years Running...

Stop Hackers at the Gate with Thycotic Endpoint Privilege Mngt

Will Windows 10’s security controls keep malware from exploiting your endpoints? Not without closing the gaps in Microsoft’s approach to privilege management and application control it won’t. Head into a Windows 10 migration...
BlackBerry® Jarvis is a powerful binary static analysis SaaS tool that can help automakers secure their software supply chain by inspecting binary files in an easy, quick, scalable, and cost-effective way, and delivering deep insights into the quality and security of software components.

BlackBerry Jarvis: Game Changing Cybersecurity Tool for OEM (Videos)

A modern car has over 100 million lines of software. As the software in a car grows so does the attack surface, which makes it more vulnerable to cyberattacks. Each poorly constructed piece...
Continued cooperation between the public and private sectors is the key to effectively managing cybersecurity risks.

Fighting Cyber Threats to the Growing US Economy (Learn More, Videos)

By The White House Information technology (IT) creates enormous value for the U.S. economy. However, it also exposes U.S. firms, the government sector, and private individuals to new risks that originate and are...
The-All-New DURABOOK R8300 R3 designed to withstand extremely harsh environments, the R8300 notebook meets a host of rugged certifications such as Military Standard 810G, 461F, IP65, and more.

DURABOOK Now Avail via USAF BPA in the Rugged Notebook Category

Durabook Americas, formerly GammaTech Computer Corporation, a 2017 'ASTORS' Homeland Security Awards Program Winner, is pleased to announce its DURABOOK R8300 R3 is now available via the U.S. Air Force Client Computing Solutions...

SolarWinds Goes for Hat Trick in 2018 ‘ASTORS’ Awards (Multi-Video)

Threats to IT networks continue to accelerate and evolve. While enterprising hackers from external sources test the robustness of network security parameters, internal threats in the form of careless and malicious insiders...
When it Comes to Cyberattacks, Half Protected is Half Not (Image courtesy of Centrify)

Centrify Recognized in 3 Research Reports by Forrester Research Inc.

Centrify, a leader in securing hybrid enterprises through the power of identity services, and Platinum Winner for Best Cyber Security for ID Mgmt & Access Control in the 2017 ‘ASTORS’ Homeland Security Awards, is...

COMSAT Demos the Power of Preparedness During CA Wildfires

COMSAT, a U.S.-based satellite connectivity provider, has successfully demonstrated the power of preparedness in reaction to the recent wildfires in California. The Thomas Fire, reported to be the largest in California state...