2018 'ASTORS' Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Cybersecurity & Fraud Analytics Hit Record Growth in 2018

Gurucul, a leader in behavior based security and fraud analytics technology, and a Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, achieved record business results in 2018 which includes a 200% increase...
A VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions. (Courtesy of YouTube)

What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)

By Howard Dawson, Writer & Tech Enthusiast Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private. They allow for safe surfing of the internet and to...
On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...

How Can Federal Agencies Secure Data Services in the Cloud

By Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and...
From multinational cyber syndicates to foreign intelligence services, hacktivists, and insider threats, the FBI takes a multidisciplinary approach to combatting threats, explained FBI Director Christopher Wray at the RSA Conference in San Francisco, California, on March 5, 2019. (Courtesy of YouTube)

The FBI: At the Heart of Combating Cyberthreats (See Video Interview)

By the FBI With cyber threats to the United States and across globe reaching unprecedented levels, the FBI uses a full spectrum of expertise, technology, and partnerships to root out cyber criminals,...
A USB drive with hardware-based encryption is an excellent, non-complicated and simple solution to protect data from breaches, while also providing compliance with evolving governmental regulations.

Encryption Is Key in the World of BYOD USB Flash Drives

Guest Editorial by Richard Kanadjian, Encrypted USB Business Manager at Kingston Technology Today, government entities are filling their workplace environments with all sorts of interesting, novel perks in an attempt to keep staff...
Courtesy of Sonoma County Fire Relief on GoFundMe

ASC Sounds Alarm of Relying Exclusively on Mobile Device Alerts

American Signal Corporation (ASC), a Milwaukee-based company that develops a variety of sirens and emergency alert systems, and Two-Time Winner in the 2018 'ASTORS' Homeland Security Awards Program, is sounding the alarm...

The Cognitive Science Behind Cybersecurity

Guest Editorial by Margaret Cunningham, Principal Research Scientist, Forcepoint Artificial intelligence, cognitive computing, and machine learning are among the most discussed technologies in the cybersecurity realm, but what do these solutions really...
Access rights don’t have to be hard to audit and report on. Manage and audit access rights across your IT infrastructure with SolarWinds Access Rights Manager.

SolarWinds Access Rights or Access Risks? In 2019 ‘ASTORS’ Awards

Webcast: Access Rights or Access Risks? Date: Tuesday, April 30, 2019 Time: 11 am - 12 pm CT Access rights management is often viewed as a “nice-to-have” solution within IT security...
Acronyms can get tangled in the ever-growing security marketplace. For instance, many use SIEM and SOAR interchangeably. Although security information and event management (SIEM), and security orchestration, automation and response (SOAR), have capabilities which complement one another, they are not the same thing.

SIEM, UEBA, and SOAR – What’s the Difference?

By Limor Wainstein The term ‘Information Security’ refers to the protection of the information environment in its entirety. Data is not the only aspect that needs to be secured, but the defensive system...