Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Canon U.S.A. Emerges a 2018 Digital Imaging Market Share Leader

Continually providing customers with solutions to help equip them for advancement in a time of digital transformation, Canon U.S.A., who was recently recognized as a Multi-Award Winner in the 2018 ‘ASTORS’...
SolarWinds Network Configuration Manager (NCM) provides continuous real-time monitoring and alerts for automated detection and remediation of harmful security violations.

SolarWinds Network Configuration Manager Competes in 2019 ‘ASTORS’

SolarWinds Worldwide, a leading provider of powerful and affordable IT management software, and Platinum Award Winner for Three Consecutive Years in the Annual 'ASTORS' Homeland Security Awards Program, is pleased to...

Attivo Networks Powers up with New Energy Impact Partners

Cyber threats to the Energy sector are on the rise. As one of the sixteen national critical infrastructure sectors, it is vital that energy companies are able to adequately defend themselves from...

FBI Releases the Internet Crime Complaint Center 2018 IC3 Report

The FBI’s Internet Crime Complaint Center (IC3) 2018 Internet Crime Report includes information from 351,936 complaints of suspected Internet crime, with reported losses in excess of $2.7 billion. The top three crime types reported...
Your Biggest Asset is Also Your Biggest Risk The greatest threat to businesses today isn’t the outsider trying to get in. It’s the people you trust—the ones who already have the keys. (Courtesy of ObserveIT)

ObserveIT 7.7 Competes in 2019 ‘ASTORS’ Awards Program

ObserveIT, a leading insider threat management provider recognized in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company’s ObserveIT introduced its newest solution, ObserveIT 7.7 has been nominated to compete...
Access rights don’t have to be hard to audit and report on. Manage and audit access rights across your IT infrastructure with SolarWinds Access Rights Manager.

SolarWinds Access Rights or Access Risks? In 2019 ‘ASTORS’ Awards

Webcast: Access Rights or Access Risks? Date: Tuesday, April 30, 2019 Time: 11 am - 12 pm CT Access rights management is often viewed as a “nice-to-have” solution within IT security...
Portnox CLEAR is a cloud-delivered network access control solution providing actionable network visibility and risk management of endpoints in any location, on or off campus, delivering continuous risk monitoring of all endpoints – IoT, BYOD and managed devices, across wired, wireless and virtual networks.

Portnox Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

Digital transformation, mobile workers, unmanaged devices including IoT, and cloud based applications are causing complex network security and access control challenges that place corporate assets and data at risk. Portnox CLEAR, a...
Julian Paul Assange is an Australian computer programmer and the founder and director of WikiLeaks. Assange is currently in police custody in London after having been arrested on 11 April 2019 by the Metropolitan Police Service for breaching his bail conditions in December 2010. Immediately before his arrest, he had been under the protection of Ecuador as an asylum seeker, and had been living in the Ecuadorian Embassy in London since 2012. (Courtesy of YouTube)

Julian Assange: Wikileaks Co-Founder Arrested in London (Multi-Video)

April 11, 2019 – In Breaking News – Fox News WikiLeaks founder Julian Assange was charged Thursday with conspiracy to commit computer intrusion for aiding Chelsea Manning in the cracking of a password to a...
A USB drive with hardware-based encryption is an excellent, non-complicated and simple solution to protect data from breaches, while also providing compliance with evolving governmental regulations.

Encryption Is Key in the World of BYOD USB Flash Drives

Guest Editorial by Richard Kanadjian, Encrypted USB Business Manager at Kingston Technology Today, government entities are filling their workplace environments with all sorts of interesting, novel perks in an attempt to keep staff...
“With Gemalto, a global leader in digital identification and data protection, Thales has acquired a set of highly complementary technologies and competencies with applications in all of our five vertical markets, which are now redefined as aerospace; space; ground transportation; digital identity and security; and defense and security, explained Patrice Caine, Chairman and CEO, Thales.”

Thales Completes Gemalto Takeover, Creates Leader in Digital Security

Completed in 15 months, the acquisition of Gemalto by Thales for €4.8 (CAD $7.3) billion, has created a world-class leader portfolio of digital security solutions based on technologies which includes digital...