How Can Federal Agencies Secure Data Services in the Cloud
By Gerry Gebel, VP of Business Development at Axiomatics
As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and...
SIEM, UEBA, and SOAR – What’s the Difference?
By Limor Wainstein
The term ‘Information Security’ refers to the protection of the information environment in its entirety.
Data is not the only aspect that needs to be secured, but the defensive system...
The Cognitive Science Behind Cybersecurity
Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint
Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...
ASC Sounds Alarm of Relying Exclusively on Mobile Device Alerts
American Signal Corporation (ASC), a Milwaukee-based company that develops a variety of sirens and emergency alert systems, and Two-Time Winner in the 2018 'ASTORS' Homeland Security Awards Program, is sounding the alarm...
The FBI: At the Heart of Combating Cyberthreats (See Video Interview)
By the FBI
With cyber threats to the United States and across globe reaching unprecedented levels, the FBI uses a full spectrum of expertise, technology, and partnerships to root out cyber criminals,...
X-Force Red Finds Security Threats in Visitor Management System Kiosks
March 4, 2018 – In Breaking News – WIRED
DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack.
As research director of IBM’s offensive security group...
What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)
By Howard Dawson, Writer & Tech Enthusiast
Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private.
They allow for safe surfing of the internet and to...
Gurucul Cybersecurity & Fraud Analytics Hit Record Growth in 2018
Gurucul, a leader in behavior based security and fraud analytics technology, and a Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, achieved record business results in 2018 which includes a 200% increase...
NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live
NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final.
If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Stomp Out Security Threats with Canon’s Latest Enterprise Solutions
With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...