Raffael Marty, Vice President of Research and Intelligence, Forcepoint

See Forcepoint’s Seven Cybersecurity Predictions for 2019 (Multi-Video)

In 2019, attackers will stop at nothing to steal our identities, evade detection through new techniques, and bring disruption to our doorsteps. The stakes are high, the world more connected than we...
Virsec understands what your applications should be doing, and instantly detects deviations caused by attacks. Instead of chasing elusive threats, Virsec sees what’s really going on across the full stack of your applications, from web to memory.

Virsec Honored with Two 2018 ASTORS Homeland Security Awards

Virsec, a cybersecurity company delivering a radically new approach to protect against advanced targeted attacks, has been recognized by American Security Today’s Homeland Security Awards Program, the 2018 'ASTORS.' The Virsec Security...
(Courtesy of U.S. Air Force by J.M. Eddins Jr.)

Strategies & Solutions to Enforce DoD’s Cybersecurity ‘Lines of Effort’

By Jim Hansen, Vice President of Products & Security, SolarWinds The Department of Defense is going on the offense. The DoD Cybersecurity Discipline Implementation Plan outlines several key “Lines of Effort” to strengthen government...

Facebook Removes 512 Russian Accounts Spreading Disinfo (Video)

January 17, 2018 – In Breaking News – The New York Times Facebook said on Thursday that it had identified two disinformation campaigns originating from Russia — including one tied to an...
Deep Integration with ServiceNow Service Desk Incident and Service Catalogs Automates Information Sharing and Collaboration for Faster Remediation of Vulnerabilities

RiskSense Platform Now Addresses Security & IT Operations Gaps (Video)

RiskSense®, Platinum Award Winner in the 2018 'ASTORS' Homeland Security Awards Program for Best Cyber Risk Management, has launched a new version of the RiskSense platform that closes the gap between...
The DFLabs CDI Program fosters an open approach to security orchestration, including an Open Integration Framework for linking third party security tools and actions, a free IncMan SOAR (CE) Community Edition and a Community Portal with developer resources and a forum.

DFLabs Extends Open Approach to Security Orchestration & Automation

DFLabs, a 2018 'ASTORS' Award-Winning Security Orchestration, Automation and Response (SOAR) vendor, is extending its Community Development Incentive (CDI) Program which rewards and encourages the sharing of innovations for the DFLabs...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...
Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web

95% of IT Pros Underestimate Phishing Attack Risks, SlashNext

SlashNext, a leader in real-time phishing site detection for businesses, and a 2018 'ASTORS' Homeland Security Award Winner for Best Phishing Defense Solutions, has released new survey results suggesting a dangerous...
Silverfort enables adaptive multi-factor authentication and identity theft prevention for every sensitive user, device and asset across all environments.

Silverfort Competes in 2019 ‘ASTORS’ Homeland Security Awards Program

Corporate networks are going through dramatic changes in recent years, due to IT revolutions such as the cloud, Internet of Things (IoT), Bring Your Own Device (BYOD) and more. In this new...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...