One of the most popular types of phygital attacks is “warshipping,” in which the attacker sends a digital device small enough to fit in a modestly sized cardboard package, through the mail.

Phygital Attacks: Protecting Critical Infrastructure from Cyber Threats

Guest Editorial by Will Plummer, Military Veteran and Chief Security Officer at RaySecur As businesses across the globe have grown in their reliance on digital infrastructure, so too has the number of...
By using millimeter wave technology to transmit real-time video feeds, wireless video drones can provide security personnel with a unique perspective on security situations, helping them to respond more effectively and efficiently to security incidents. (Courtesy of Siklu)

Take a Look: Millimeter Wave Tech for its Role in Drone Security

By Dan Shalev, Marketing Manager for Siklu, a 2022 'ASTORS' Homeland Security Award Champion Wireless video drones are unmanned aerial vehicles (UAVs) equipped with cameras that serve several important roles. These drones provide...
How Dispatchers and First Responders Can Stay Ahead of the Curve In Advance of Super Bowl LVII, when NHTSA fatality data show that the stakes are high - with Alcohol-related traffic fatalities 74% higher on Super Bowl Sunday compared to the week before and 82% higher than the following week. SOMA Global

How We Can Make Public Safety More Proactive

Guest Editorial by Josh Lewis, CTO at SOMA Global, a Double Platinum Winner in the 2022 'ASTORS' Homeland Security Awards Glendale saw a massive influx of sports fans this past weekend for...
Patrick Harr, CEO SlashNext

SlashNext Joins the Microsoft Intelligent Security Association

SlashNext, a  leader in SaaS-based Integrated Cloud Messaging Security across email, mobile or web messaging apps, and a 2022 'ASTORS' Homeland Security Award Winner for Best Phishing Defense Solution, is pleased...
“These findings underscore why it’s so crucial to regularly pentest all internal and externally exposed assets and points of entry,” explained Snehal Antani, CEO and co-founder of Horizon3.ai. “Many of the vulnerabilities and weaknesses that companies believe they’ve already addressed are, in fact, welcoming entry points for threat actors. Every organization should regularly ask themselves what their threat environment looks like, whether their security tools are appropriately configured and effective, and most importantly – whether their assets and environments are secure.”

Horizon3.ai Unveils: ‘Year in Review: Thru the Eyes of the Attacker 2022’

Horizon3.ai, a leading cybersecurity firm focusing on autonomous penetration testing, and a Platinum 'ASTORS' Winner in AST's 2022 Homeland Security Awards Program, has issued its inaugural cybersecurity threatscape report titled: “Year...
UiPath has the vision to deliver the Fully Automated Enterprise™, where companies use automation to unlock their greatest potential. They make software robots, so that people don’t have to be robots. (Courtesy of UiPath)

Tackling Cyber Threats with Automation & AI in 2023 and Beyond

Guest Editorial by Mike Daniels, Senior Vice President of Public Sector, UiPath Automation technology company UiPath recently released its predictions for the top public sector automation and artificial intelligence trends in 2023....
Quantum

Quantum’s Surveillance Award Wins Signify Continued Tech Leadership

Quantum Corporation, a global leader in pioneering solutions for video and unstructured data, has been recognized with three awards in two leading security industry programs: The American Security Today (AST) ‘ASTORS’...
2022 'ASTORS' Double Award Winner Darktrace, is a global leader in cyber security artificial intelligence, delivers complete AI-powered solutions in its mission to free the world of cyber disruption.

Darktrace Unveils Cyberattack Data Trends for Energy, Healthcare & Retail

Darktrace, a global leader in cyber security artificial intelligence, and a Double Award Winner in the 2022 'ASTORS' Homeland Security Awards Program, has released three new cyber threat trend reports disclosing 2022...
The reality for companies who fall victim to a data security breach can have dire effects on not just a company’s value, but also its brand image and reputation, explains Bal Heroor, CEO and Principal at Mactores. 

How Data Security Breaches Affect Your Company’s Value

Guest Editorial by Bal Heroor, CEO and Principal at Mactores  Picture the scene. It’s 11:00 P.M. and an urgent board meeting has just been called for a Fortune 500 company headquartered in Manhattan. Board...
The National Security Agency (NSA) has already warned of VPN vulnerabilities. Of course, it can be tempting to assume that classified and top-secret networks are inherently safe. But with security, there is no ceiling. ZTNA can make classified networks even more secure. (Courtesy of Forcepoint)

How the Intelligence Community Can Embrace Zero Trust Network Access

Guest Editorial by George Kamis, CTO for Global Governments & Critical Infrastructure at Forcepoint Last year, two months into the pandemic, the White House published an executive order mandating that all federal...