Expect more targeted IoT attacks and new nation-state threats in the coming year. (Courtesy of YouTube)

Security Threats, Risks and Trends in 2019 (Learn More, Multi-Video)

December 5, 2018 – In Breaking News – techradar - By Sam Curry When it comes to cybersecurity risks and threats in 2019, attackers will do what they always do and follow...

21 Terrifying Cyber Crime Statistics

By Jack Foster, Author at VPN Geeks Unfortunately, with technology on the rise, there’s more room for cyber crime in 2019. According to the Cyber Security Breaches Survey 2018, 43% of businesses were a victim of...
Acoustic Technology Inc. (ATI), a leader in the mass notification industry, and Platinum Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program for Best Mass Notification/Siren System, is pleased to announce the company’s next generation REACT5000 Central Control Unit (CCU) provides advanced monitoring and control features that enhance the entire line of ATI Mass Notification Products.

ATI Systems Honored with Two 2018 ‘ASTORS’ Homeland Security Awards

Acoustic Technology, Inc. (ATI Systems), a world leader in the design, manufacturing, and installation of reliable emergency warning and notification systems for the campus, community, industrial, and military markets, is pleased to...
The HID Crescendo Mobile solution provides organizations seeking to eliminate passwords with a solution that combines the high security of physical authenticators with the usability of a mobile solution.

HID Crescendo Mobile Smart Card Offers High Security & Convenience

HID Global®, a worldwide leader in trusted identity solutions, and  2018 'ASTORS' Homeland Security Award Winner for Best Cyber Risk Management, is introducing the Crescendo® Mobile smart card; bringing convenience to high...
Online advertisers desire premium websites on which to publish their ads and large numbers of visitors to view those ads. 3ve created fake versions of both (websites and visitors), and funneled the advertising revenue to cyber criminals. 3ve obtained control over 1.7 million unique IPs by leveraging victim computers infected with Boaxxe/Miuref and Kovter malware, as well as Border Gateway Protocol-hijacked IP addresses. 

FBI & Tech Giants Take Down Massive Online Fraud Scheme Named ‘3ve’

A gigantic criminal network that was able to generate fake ad views and clicks to defraud millions of dollars from ad networks and advertisers over the past four years has been...
Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Takes Platinum in 2018 ‘ASTORS’ Awards (Multi-Video)

Gurucul, a leader in behavior based security and fraud analytics technology for on-premises and the cloud, has been named the Platinum Award for 'Best User & Entity Behavior Analytics (UEBA) Solution'...
CyberVigilant® helps to keep your system safe from anomalies by applying IndigoVision’s expert knowledge to your existing setup, combining over 23 years of IndigoVision’s expertise in IP CCTV; specific knowledge of your site including cameras, NVRs, workstations and Control Center’s powerful alarm management.

IndigoVison Takes Home 2018 ‘ASTORS’ Gold at ISC East (Videos)

IndigoVision’s cybersecurity offering, CyberVigilant, was recognized with the 2018 Gold 'ASTORS' Award for Best Cyber loT Management at c in New York City, on the 14th November 2018. The Annual ‘ASTORS’ Awards...
the Federal Protective Service

Trump Creates CISA, Official Federal Cybersecurity Agency (Multi-Video)

On November 16, 2018, President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018 which elevates the mission of the former National Protection and Programs Directorate (NPPD) within DHS,...
As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Unmatched scalability and performance makes Axiomatics Policy Server the preferred choice for implementing Attribute Based Access Control in many global enterprises and government agencies.

Axiomatics Federal Named a Finalist in 2018 ‘ASTORS’ Awards (Videos)

Axiomatics Federal, the leader in fine-grained dynamic authorization for customers and partners of the federal government, is delighted to announce Axiomatics' Policy Server has been named a Finalist in the 2018 'ASTORS' Homeland...