The Cognitive Science Behind Cybersecurity

Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...
From multinational cyber syndicates to foreign intelligence services, hacktivists, and insider threats, the FBI takes a multidisciplinary approach to combatting threats, explained FBI Director Christopher Wray at the RSA Conference in San Francisco, California, on March 5, 2019. (Courtesy of YouTube)

The FBI: At the Heart of Combating Cyberthreats (See Video Interview)

By the FBI With cyber threats to the United States and across globe reaching unprecedented levels, the FBI uses a full spectrum of expertise, technology, and partnerships to root out cyber criminals,...
On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
A VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions. (Courtesy of YouTube)

What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)

By Howard Dawson, Writer & Tech Enthusiast Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private. They allow for safe surfing of the internet and to...
2018 'ASTORS' Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Cybersecurity & Fraud Analytics Hit Record Growth in 2018

Gurucul, a leader in behavior based security and fraud analytics technology, and a Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, achieved record business results in 2018 which includes a 200% increase...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Silverfort enables adaptive multi-factor authentication and identity theft prevention for every sensitive user, device and asset across all environments.

Silverfort Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

Corporate networks are going through dramatic changes in recent years, due to IT revolutions such as the cloud, Internet of Things (IoT), Bring Your Own Device (BYOD) and more. In this new...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...
Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web

95% of IT Pros Underestimate Phishing Attack Risks, SlashNext

SlashNext, a leader in real-time phishing site detection for businesses, and a 2018 'ASTORS' Homeland Security Award Winner for Best Phishing Defense Solutions, has released new survey results suggesting a dangerous...
The DFLabs CDI Program fosters an open approach to security orchestration, including an Open Integration Framework for linking third party security tools and actions, a free IncMan SOAR (CE) Community Edition and a Community Portal with developer resources and a forum.

DFLabs Extends Open Approach to Security Orchestration & Automation

DFLabs, a 2018 'ASTORS' Award-Winning Security Orchestration, Automation and Response (SOAR) vendor, is extending its Community Development Incentive (CDI) Program which rewards and encourages the sharing of innovations for the DFLabs...