Sarah Ashburn, SVP Sales & Customer Success at Attivo Networks

Attivo Networks Honors Partners Driving Cybersecurity Innovation

Attivo Networks®, an award-winning leader in cyber deception and attacker lateral movement threat detection, is pleased to announce that it has received four 2020 ‘ASTORS’ Homeland Security Awards from American Security...
Mobile team communications apps are fast becoming the go-to solution across the spectrum, from small business to major enterprises, and spanning every industry, whether working in a shared workplace or remotely.(Courtesy of Chris Montgomery on Unsplash)

Redefining Communications for Today’s Mobile Workforces

Guest OpEd by Chief Technologist Dave George Communicating with personnel was already a challenge for companies with workers in the field, widespread workforces in siloed divisions and office locations, or deskless staff who...

Protecting Our & Your Health Data: 3 Pillars of COVID-19 Era Data Security

Guest OpEd by Scott Pettigrew, Chief Security Officer at HMS The year 2020 was one of unprecedented change and uncertainty. Much of the world’s economy — including, notably, the healthcare sector — has...
Security is everyone’s responsibility. When individuals are aware of cyber threats and their possible personal impacts, they change their behavior.

Security Culture – Beyond Technical Controls, by Red Hat’s Andrea Hall

Guest Editorial by Andrea Hall, Red Hat Trespassing. Breaking and entering. Grand larceny. These could be considered physical equivalents of cyber attacks and data breaches. When individuals and organizations endure such attacks, they typically...
Ready to make the jump to passwordless authentication? Enjoy complete and robust passwordless authentication for your entire workforce and eliminate the possibility of phished or stolen passwords with TruU. Integrate into major enterprise identity stores and IT infrastructure and ensure compatibility with your environment.

TruU Named Newest Competitor in the 2021 ‘ASTORS’ Awards Program

Still Using Passwords? TruU can do better 80% of breaches start with compromised credentials $2.1 Trillion Global cost of data breaches in FY 2019 -5% Drop in stock price the day a...
Extract greater value from your #security tools with RangeForce's Integrated Tools Training Modules. Basic to advanced hands-on skills development for products like #Recordedfuture, #Splunk, #Wireshark and more.

RangeForce & BCA to Create Cyber Career Advancement Opportunities

RangeForce, a new competitor in the 2021 'ASTORS' Awards Program which is revolutionizing cybersecurity training, has announced a new partnership with the Black Cybersecurity Association (BCA) to provide hands-on cyber skills...
The February 2021 remote cyber attack to the water treatment system for the city of Oldsmar FL, could have put put 15,000 residents at risk. The fact that the attacker was able to get that far shows just how vulnerable America’s critical infrastructure and government environments are to remote cyberattacks.

Infrastructure Intrusion: America Under Attack

Guest OpEd by Chris Risley, CEO at Bastille Networks It could have been worse. Much, much worse. On February 5th, 2021, the city of Oldsmar, Florida was targeted for a cyberattack. The intruder remotely...
The Contact Notification service in the BlueDiamond mobile app identifies and communicates anonymized real-time COVID-19 risks and provides employees with a safer building experience while empowering building administrators with the data they need to monitor and manage potential exposure risks in the workplace.

LenelS2 Delivers Contact Notification Service to Support Healthy Buildings

LenelS2, a 2020 Gold 'ASTORS' Homeland Security Award Winner, has introduced a COVID-19 Contact Notification subscription-based service for businesses and other organizations using LenelS2’s OnGuard® or NetBox™ access control security systems along...
Learn how a new, holistic approach to security tooling known as XDR is the next big step forward in cyber security tools. (Courtesy of Pixabay)

XDR and The Future Security Stack

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Security teams rely on a complex technology stack that helps prevent, detect, and respond to security incidents. However, this stack...
To have an effective security plan in place for any large-scale event, you have to guarantee a fail-proof network to ensure a covert and securely encrypted operation.

How Wireless Comms Can Covertly Keep the Public Safe at Major Events

Guest OpEd by Angela Quinn at Rajant Corporation When preparing for a large-scale event, protecting the public is the top priority for everyone involved. Taking extra measures to ensure the public’s safety is...