As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Unmatched scalability and performance makes Axiomatics Policy Server the preferred choice for implementing Attribute Based Access Control in many global enterprises and government agencies.

Axiomatics Federal Named a Finalist in 2018 ‘ASTORS’ Awards (Videos)

Axiomatics Federal, the leader in fine-grained dynamic authorization for customers and partners of the federal government, is delighted to announce Axiomatics' Policy Server has been named a Finalist in the 2018 'ASTORS' Homeland...
Attivo Launches Counterintelligence; Bolsters Current Threat and Adversary Intelligence Functionality for Offense-driven Countermeasures

Attivo Networks Makes Deception Technology Deceptively Simple (Learn More, Multi-Video)

Attivo Networks®, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, a Finalist in the 2018 'ASTORS' Awards, and a leader in deception for cyber security threat detection, includes new advanced capabilities that...
CyberArk’s Privileged Account Security Solution provides a multi-layered security solution that includes privileged password management, session recording, least privilege enforcement and privileged data analytics to help organizations defend against advanced persistent threats and insider threats.

Cyber Hygiene: A Programmatic Approach to Improving Security

By Kevin Corbett, Director of U.S. Federal Business, CyberArk Government agencies and departments face a wide range of security challenges – and they have a lot at risk. Just consider the U.S. Office...
Fortanix SDKMS, a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

Fortanix & Alibaba Launch SDKMS Runtime Encryption Key Mngmt

Fortanix, a leader in Runtime Encryption®, and a Finalist in the 2018 ‘ASTORS’ Awards Program, is partnering with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key Management Service™...

Mapping Apps are Endangering Special Operators, Anger US Troops

By Susan Crabtree, the Washington Free Beacon U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to hacking...
NG Firewall delivers enterprise-grade cybersecurity features in a package that is easy to purchase, configure, deploy and maintain for state and local government, educational institutions,  nonprofit organizations as well as SMBs.

Untangle Goes for 2nd Consecutive Win in 2018 ‘ASTORS’ Awards (Video)

Untangle, a leader in comprehensive network security for small-to-medium business (SMB), and a Winner in the 2017 'ASTORS' Homeland Security Awards Program, is pleased to announce NG Firewall v14.0 has been nominated to...
The CDM Program was designed to help government teams identify and prioritize cybersecurity risks and enable cyber personnel to quickly mitigate these problems.

Feds Weigh In on Impact of CDM Program, Forcepoint Survey Explores

Forcepoint, a global leader in cybersecurity and a Finalist in the 2018 ‘ASTORS’ Homeland Security Award Program, has released the results of its new Federal CDM Survey, which explores how the U.S....
The LinkGuard platform from Blue Ridge Networks allows organizations to cloak critical data networks, making them invisible and inaccessible to everyone that doesn’t have previously verified access using Autonomous Network Segmentation. This ‘Zero Trust’ methodology prevents hacker reconnaissance and eliminates the high risk of unauthorized access to critical infrastructure while enabling secure connectivity, wherever it’s needed, without costly or time-consuming IT overhead.

Blue Ridge Networks Competes in 2018 ‘ASTORS’ Awards Program

Blue Ridge Networks, a past Platinum Award Winner in the Annual 'ASTORS' Homeland Security Awards Program, is delighted to announce that the company's new LinkGuard Platform has been nominated to compete in...
As many as 90M people were affected by the Facebook hack disclosed Friday afternoon - nearly double what Facebook first reported, and if the victims logged into other services like Tinder, Instagram, or Spotify with their Facebook accounts, those might be affected to.

Facebook Weaponizing Security to Erode Privacy Massive Hack, Videos)

By Natasha Lomas, TechCrunch At a Senate hearing this week in which US lawmakers quizzed tech giants on how they should go about drawing up comprehensive Federal consumer privacy protection legislation, Apple’s VP of software technology...