Thycotic Secret Server Returns as Finalist in 2019 ‘ASTORS’ (See Video)
Thycotic, a Gold Award Winner in both the 2016 and 2018 'ASTORS' Homeland Security Awards Programs, is happy to announce the company's flagship solution Secret Server has been selected as a...
Hackers Exploit PayPal and Facebook to Steal Millions Each Month
Cybersecurity analysts at CyberNews have uncovered an ongoing scam using loopholes in PayPal and Facebook.
Fraudsters are stealing roughly $1.6 million per month by convincing Facebook users to voluntarily send money.
CyberNews talked...
7 Data Loss Prevention Strategies and Practices You Should Know
Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO
Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
SolarWinds SEM Nominated in 2021 ‘ASTORS’ Awards Program
The job of the technology professional is hard.
Technology is pervasive, complex and always changing.
End users can be demanding, and businesses need constant access to an ever-expanding ecosystem of applications and infrastructure.
The...
Canon Adds Compact A3 Color Models to Line-up of Office MFPs
Helping to meet the needs of the changing workplace, Canon U.S.A., a leader in digital imaging solutions, and Double Award Winner in the 2020 'ASTORS' Awards Program, is pleased to introduce...
Enhance Critical Communications During Natural Disasters
Guest Editorial by Chris Wall – Director of Sales at Rajant Corporation
Natural disasters have always posed a significant risk, striking anywhere and anytime. These types of disasters are especially prevalent in...
Stellar Open XDR Nominated for Three 2022 ‘ASTORS’ Cybersecurity Awards
In most situations, Network Detection & Response (NDR) tools alone are not enough to provide comprehensive security. The analysts must also be able to see logs, real-time traffic, and user behaviors...
Securonix in AST Homeland Security Awards (Video Interviews)
Government agencies and the organizations that work with them are collecting, archiving and storing massive volumes of data in repositories -- but haven’t been able to derive security value from it....
Kudelski Sets Standard in Cyber Strategy with Secure Blueprint (Video)
Kudelski Security, introduces Secure Blueprint™, a strategic approach setting a new standard in cybersecurity program management.
Through Secure Blueprint, enterprises can design comprehensive, agile and business-driven programs, with tools providing Chief Information...
Dashlane & Intel to Create Unrivaled Password Protection (Video)
Dashlane, has entered into a collaboration with Intel® to deploy Intel® Software Guard Extension (SGX) technology - with Dashlane's award-winning password manager.
Dashlane's industry-leading and patented security software combined with Intel® SGX will...