Commit’s complete and comprehensive engineering powerhouse of resources and proprietary Flexible R&D methodology helps transform its clients’ technology visions into high-quality products while reducing costs and improving time-to-market.

Commit Acquires Israeli Tech Firm ITSoft to Bolster ‘Cloud of People’

Commit, a leading global tech services company focused on custom software and IoT solutions, is expanding through the acquisition of ITSoft, an Israeli-founded tech firm that provides software development services around...
Tony Cole is a former army cyber operator with more than 35 years’ experience in cybersecurity and today is the Chief Technology Officer at Attivo Networks responsible for strategy and vision.

Attivo Executive’s Experience Helps to Shape Modern Network Protection

Guest OpEd by Tony Cole, Chief Technology Officer, Attivo Networks With attackers increasingly targeting government agencies and contractors, a background in homeland security is a handy thing to have—and my homeland security...
In 2020, the world changed in unexpected and mostly, unanticipated ways. Schools were closed, sports were canceled and just about everything we understood and took for granted changed. What did not change then or now is the need to have informed conversations about the threats to safety always, and the need to have access to resources that are easy to understand and easy to apply. Developing comprehensive plans for awareness, preparedness, response, and recovery are the first steps-based on knowledge not out of fear. (Courtesy of PWPORG)

3 Minutes to Preparedness: 6 Steps to Cyber Hygiene

By PWPORG, a 501(c)(3) built by law enforcement and security industry practitioners and educators to provide educational resources to kids, families and communities on safety and emergency preparedness. Foundational Best Practices STEP ONE:...
hanwha techwin wisenet 7

Hanwha Techwin Wisenet 7 Competes in 2021 ‘ASTORS’ Awards

Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, and a 2020 Double Platinum 'ASTORS' Award Winner, is pleased to announce the Wisenet 7 is one of...
To maximize visibility and secure your organizational ecosystem, it’s critical for IT teams to define an asset management strategy.

Three Preventative Strategies to Help Mitigate Asset Risk in Your Agency

Guest OpEd by Brandon Shopp, Group Vice President, Products, SolarWinds For many federal employees, the workplace has shifted from a traditional office setting to being at home—in a kitchen, bedroom, basement, or...
Smartphones today are with us everywhere… including the workplace and classified meetings. And therein lies the problem explains Chris Risley, CEO at Bastille Networks. Cell phones infected with spyware show no signs of compromise, giving attackers complete access to email, even encrypted email and messages, plain text messages, photographs, videos, recordings, locations, and notes stored on the phone.

I Spy With My Little… Phone? Yes, It Can Happen to You.

Guest OpEd by Chris Risley, CEO at Bastille Networks The recent revelations surrounding the Pegasus Spyware and its ability to compromise mobile phones should have all government agencies and commercial enterprises on...
Special Agents of the Naval Criminal Investigative Service (NCIS) search the vehicle of a service member who was caught buying a synthetic cannabinoid commonly known as “Spice” while NCIS was serving a search warrant at the business. (Courtesy of U.S. Navy by Ed Buice)

Naval Criminal Investigative Service Nominated in 2021 ‘ASTORS’ Awards

Within the Department of the Navy, the Naval Criminal Investigative Service (NCIS) is the civilian federal law enforcement agency uniquely responsible for investigating felony crime, preventing terrorism and protecting secrets for...
The truth is hackers can compromise home security camera feeds, but there are ways to block spying eyes.

Security Camera Hacking: It Can Happen to You. Here’s How to Stop It

August 22, 2021 – In Breaking News – CNET Installing a Wi-Fi-connected security camera in your house won't necessarily bring a wave of hackers to your network -- but losing privacy thanks...
Data Theorem specializes in proactive security and goes beyond securing the perimeter to inventory, continuously monitor, and remediate shadow APIs, leaky data, and resolve storage configurations - resulting in a program designed to secure your data at every level.

Data Theorem Returns to Compete in 2021 ‘ASTORS’ Awards Program

Data Theorem, a leading provider of modern application security, a Double Platinum 2020 'ASTORS' Award Winner recently nominated to compete in the , is pleased to announce two of the company's products,...

One Man’s Mission to Educate SMBs on the CMMC

CMMC: First Steps for Any Organization Seeking Certification Guest OpEd by James Norris, HumanTouch LLC Cyber Risk Maturity, the process of managing cyber threats better every day, is not as hard to implement...