“So many of our MISSING KIDS are found simply because someone identified them from a picture.” - John Walsh, NCMEC Co-Founder. Use the power of social media to help bring #MISSING children home. Visit: missingkids.org/gethelpnow/search and share a poster of a missing child from your area. (Courtesy of NCMEC)

NCMEC & John F. Clark Honored in 2019 ‘ASTORS’ Awards (Multi-Video)

American Security Today is pleased to announce the National Center for Missing and Exploited Children (NCMEC) CyberTipline, has been nominated in the 2019 'ASTORS' Homeland Security Awards Program. The National Center for...
Experience what complete visibility, security and control of your industrial environment can do for your organization

Trail Blazers in Critical Infrastructure: ‘Own OT. Secure OT. Protect OT.’

When the OT network was connected to the IT network, safety online became a serious concern for any organization using the same controllers found in power plants and electric grids. Whether it’s...
According to the Department of Justice, in addition to site administrator, 337 site users have been arrested around the world with the help of law enforcement from 38 countries, and 92 individuals were arrested from the U.S alone, which includes Nikolas Bradshaw (at left), and Michael Gibbs (Courtesy of the Davis County Jail and Salt Lake County Jail). 

Worldwide Takedown of Darknet Child Pornography Site Funded by Bitcoin

Jong Woo Son, 23, a South Korean national, was indicted by a federal grand jury in the District of Columbia for his operation of 'Welcome To Video,' the largest child sexual...
(Courtesy of the USMC)

U.S. Marine Corps 1700 Cyberspace OccFld Compete in 2019 ‘ASTORS’

The Marine Corps has operated in cyberspace since it's early days. Capability and skills have been slowly accreting over time and or practitioners today rank among the very best. Growing a functional capability...
ManTech’s ACRE is a unique physical and virtualized cyber range that brings best-in-class cyber defense expertise to a new generation of professionals.

ManTech a New Competitor in 2019 ‘ASTORS’ Awards Program (Videos)

Protecting against cyberattacks is an inside job. Organizations can readily test their own network security posture and defenses while training their security teams quickly and affordably with the ACRE™ Cyber Range, a...
Canon Solutions America’s experts took MetLife Stadium event attendees on a journey through real world demonstrations of their Five Pillars of Security, a layered security approach encompassing device security, print security, document security, information security, and cybersecurity, to outline a business model that can be easily and efficiently implemented. (Courtesy of Canon Solutions America)

Canon Showcases Information Security at Special Event (Multi-Video)

Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., a leader in digital imaging solutions, Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and multi-product competitor in the 2019 ‘ASTORS’ Awards...
We often think of cyber threats as coming from an anonymous criminal, hundreds of miles away behind a computer screen. However, current and former employees who have intimate and valuable knowledge about a company are also capable of committing a cybercrime. (Courtesy of YouTube)

DoD Raising Insider Threat Awareness to Safeguard National Security

The Department of Defense (DoD), is partnering with intelligence and law enforcement agencies to educate government employees on how to detect and mitigate insider threats that pose national security risks. The DoD, National Insider...
HydrantID will Expand Enterprise PKI Management Services for Network Security and IoT Devices, strengthening HID’s Identity and Access Management solutions portfolio to solve customer’s digital security challenges.

HID Global Acquires HydrantID Managed PKI for IoT Devices & More

HID Global®, a worldwide leader in trusted identity solutions, and a 2018 ‘ASTORS’ Homeland Security Awards Winner, has acquired HydrantID, a provider of management and automation services to secure enterprise organizations’ data, IT...
The future is here, with digital transformation strategies rapidly disrupting modern-day office environments, their related technologies, and the way we work. With the imminent evolution of technology heavily influencing everything from business workflow to employee habits to cybersecurity and beyond, many companies face questions on how to navigate the new workplace.

Preventing Security Breaches in the Digital Workplace, New Canon Survey

While digital transformation helps companies work smarter, the ongoing digitization unlocks a wealth of security vulnerabilities that can cost companies money, time, intellectual property, and customer trust. In its latest Office of...
Brinqa Cyber Risk Services were built for security; transforming security, context and threat data into knowledge-driven insights that empower organizations to own their cyber risk.

Brinqa is a New Competitor in 2019 ‘ASTORS’ Homeland Security Awards

The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...