How Can Federal Agencies Secure Data Services in the Cloud

By Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and...
Acronyms can get tangled in the ever-growing security marketplace. For instance, many use SIEM and SOAR interchangeably. Although security information and event management (SIEM), and security orchestration, automation and response (SOAR), have capabilities which complement one another, they are not the same thing.

SIEM, UEBA, and SOAR – What’s the Difference?

By Limor Wainstein The term ‘Information Security’ refers to the protection of the information environment in its entirety. Data is not the only aspect that needs to be secured, but the defensive system...

The Cognitive Science Behind Cybersecurity

Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...
Courtesy of Sonoma County Fire Relief on GoFundMe

ASC Sounds Alarm of Relying Exclusively on Mobile Device Alerts

American Signal Corporation (ASC), a Milwaukee-based company that develops a variety of sirens and emergency alert systems, and Two-Time Winner in the 2018 'ASTORS' Homeland Security Awards Program, is sounding the alarm...
From multinational cyber syndicates to foreign intelligence services, hacktivists, and insider threats, the FBI takes a multidisciplinary approach to combatting threats, explained FBI Director Christopher Wray at the RSA Conference in San Francisco, California, on March 5, 2019. (Courtesy of YouTube)

The FBI: At the Heart of Combating Cyberthreats (See Video Interview)

By the FBI With cyber threats to the United States and across globe reaching unprecedented levels, the FBI uses a full spectrum of expertise, technology, and partnerships to root out cyber criminals,...
On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
A VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions. (Courtesy of YouTube)

What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)

By Howard Dawson, Writer & Tech Enthusiast Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private. They allow for safe surfing of the internet and to...
2018 'ASTORS' Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Cybersecurity & Fraud Analytics Hit Record Growth in 2018

Gurucul, a leader in behavior based security and fraud analytics technology, and a Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, achieved record business results in 2018 which includes a 200% increase...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...