Many police departments are turning to innovative investigative solutions like open-source intelligence (OSINT) technology to help officers reduce the risk of perpetual fentanyl overdoses and identify those involved in the drug trade, explains John O’Hare, director sales and business development with Cobwebs Technologies

OSINT: A Powerful Tool in Fentanyl Investigations and Response

Guest Editorial By John O’Hare, Director of Sales and Business Development with Cobwebs Technologies Since March of 2022, fentanyl overdoses have become one of the leading causes of death for adults aged...
Ben Smith, CTO with Netwitness, explains How Distributed Workforces and Decentralized Security Policies Leave Government Networks Vulnerable sase

How SASE Adoption Today – Can Resolve Tomorrow’s Threats

Guest Editorial by Ben Smith, CTO, Netwitness Cyberattacks and cyber warfare have only worsened as geopolitical tensions rise and digital proxy battles rage. But while these threats have remained ubiquitous for more...
Tanium Recognized as Winner of the 2023 Microsoft US Rising Azure Technology Partner of the Year Award

2022 ‘ASTORS’ Champ Tanium a Microsoft US Tech Partner of the Year

Tanium, the 2022 'ASTORS' Homeland Security Award Winner for Best Device Visibility and Control Solution in its Converged Endpoint Management (XEM) platform, has been awarded the Rising Azure Technology Partner of the Year...
The New Rajant Sparrow is an IP67 Kinetic Mesh® network device ideally suited for use in industrial IoT applications and light-duty vehicles.

Rajant Sparrow for Heavy-Duty & Light-Duty Vehicle Applications

RAJANT Corporation, the pioneer of Kinetic Mesh® wireless networks, and Multi-Award Winner in the 2022 ‘ASTORS’ Homeland Security Awards Competition, recently Nominated in the 2023 'ASTORS' Program, debuted its new Sparrow BreadCrumb® on...
Josh Stephens, BackBox CTO

BackBox Launches Cisco CIS Benchmark Automation Templates

BackBox, a market leader in network automation, security, and management solutions that took Platinum for Best Network Automation Solution in the 2022 'ASTORS' Homeland Security Awards Program, is pleased to announce it...
“Gurucul and Snowflake’s joint solution provides exciting new ways for security teams to protect their environments at scale,” added John Bland, Cybersecurity Data Cloud Principal at Snowflake.

Gurucul Powered by Snowflake to Rapidly ID and Mitigate Risks

Gurucul, a visionary Next-Gen SIEM solution provider with a Five Year Legacy of Wins in the Annual 'ASTORS' Homeland Security Awards Program, has launched its Gurucul Security Analytics and Operations platform,...
Stellar's Open XDR platform features enterprise-class NDR capabilities and correlates and analyzes that data with data from its SIEM, UEBA, and TIP functions to detect complex attacks before they can do real damage.

Stellar Open XDR Nominated for Two 2023 ‘ASTORS’ Cybersecurity Awards

In most situations, Network Detection & Response (NDR) tools alone are not enough to provide comprehensive security. The analysts must also be able to see logs, real-time traffic, and user behaviors...
‘ASTORS’ competitors who return year to year, establish a legacy of wins that span over years. Those are a special breed never satisfied but strive to excel each year to provide first responders, security industry professionals, and government practitioners with the capabilities and technologies to create a safer world for generations to come.

Establishing a Legacy of Wins in the Annual ‘ASTORS’ Awards Program

American Security Today’s Annual ‘ASTORS’ Awards, the preeminent U.S. Homeland Security Awards Program, now in its Eighth Year, recognizes industry leaders of Physical and Border Security, Cybersecurity, Emergency Preparedness – Management...
Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...