Outsmart your smart home. One plan can cover your family's smart home devices including TVs, laptops, tablets, gaming systems, smartwatches, Bluetooth headphones, and more. Enrollment? Easy. Claims? Easy. Coverage? Awesome. For less than $1 a day everyone in your home can get the support and protection they need to outsmart their smart home by Pocket Geek Home by Assurant.

Device Privacy Support for Retailers in Today’s Smart Home (Multi-Video)

Guest OpEd by Scott McKinley, Assistant Vice President, Premium Technical Support for Pocket Geek Home Privacy concerns with many smart home tech devices are on the rise as of recently, in which...

BeyondTrust PowerBroker in AST Homeland Security Awards (Video)

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...

Hack the Army & Get Paid for It: Two New DOD Cyber Challenges (Video)

Building on the success of the “Hack the Pentagon” bug bounty pilot in which hackers from across the country were provided legal authorization to spot vulnerabilities in specific Department of Defense...

Meeting The Challenge of Securing the Cloud – Michael Xie, Fortinet

Guest Editorial by Michael Xie, Fortinet Founder, President and CTO The cloud has been a powerfully disruptive technology, transforming traditional network architectures that have been in place for decades and allowing businesses...

Eagle Eye Networks Implements Two Factor Authentication (Learn More)

Eagle Eye Networks has initiated implementation of two factor authentication, utilizing trusted devices, trusted phone numbers or emails, and security codes, across the Eagle Eye Security Camera VMS including its iOS and...

Seagate Strengthens Federal Cyber Security with Fornetix Encryption

Seagate Technology's portfolio hard drives and solid-state drives designed to meet stringent federal security standards, now integrate with advanced encryption key management software and services from Fornetix. The integration gives federal government...

Threat Sketch Joins DHS Cyber Intelligence Sharing Program

In 2017, Threat Sketch will begin to receive real-time cybersecurity intelligence information from the Department of Homeland Security that will complement and greatly expand the cyber crime statistics used to drive...

Lacework Zero-Touch Cloud Workload Security Platform (Multi-Video)

Lacework™, a new provider of cloud workload security solutions, has launched out of stealth mode with the introduction of Lacework Polygraph™, the industry’s first zero-touch cloud workload security platform. Lacework Polygraph instantly...
ATI Systems

Achieving Maximum Intelligibility in Mass Notification Systems

During major emergencies and disasters, accurate and timely voice warnings to all affected people are among the most important factors to successfully protect lives, contain property damage and minimize community impact. A...

NIST Launches New Special Publication (SP) 800-63 Suite!

By Paul Grassi, NIST Trusted Identity Group Goodbye LOA…Hello IAL, AAL, and FAL (collectively called “xALs”) More than a year in the making, after a large, cross-industry effort, we are proud to announce that...