Delek Pi Glilot Selects Cyberbit to Protect Critical Infrastructure (Video)

Delek Pi Glilot Limited Partnership has selected Cyberbit’s SCADAShield solution to protect critical national assets against cyberattacks. The companies intend to expand their collaboration and leverage Cyberbit’s entire security portfolio to...

Siklu Introduces MultiHaul™ for Physical Security Applications

Siklu has unveiled the MultiHaul™, a revolutionary point-to-multipoint millimeter wave wireless solution for the physical security market. The new millimeter wave radio extends Siklu’s multi-gigabit product line to include an easy to install, interference-immune,...

GD Selected to Provide Enterprise IT & Cloud Services to NATO

General Dynamics Information Technology, was awarded a contract by the NATO Communications and Information Agency (NCI Agency) to deliver the most significant upgrade to the organization’s technical infrastructure in decades. The single-award...

Sentar Awarded SPAWARSYSCEN PAC Cyber Contract

Sentar has been selected by SPAWARSYSCEN PAC as one of four Small Business Prime Contractors for the Cyberspace Science, Research, Engineering, and Technology Integration MAC. Sentar received a potential $30.7 million contract,...

New Report Reveals 30% of Malware is New or Zero Day (Multi-Video)

WatchGuard Technologies, has released the findings of its inaugural quarterly Internet Security Report, which explores the latest computer and network security threats affecting small to midsize businesses (SMBs) and distributed enterprises. The...

Information Security Forum Launches Threat Horizon 2019 (Learn More)

The Information Security Forum (ISF), the world's leading, independent authority on cyber security and information risk management, has released Threat Horizon 2019, the latest in a series of the organization’s annual Threat...

Going Offworld: Escaping Today’s Data Constraints & Security Concerns

By Cliff Beek, President of Cloud Constellation Corporation In the cult film classic Blade Runner, video billboards tout the benefits of moving “offworld” to the hordes making their way through the acid...

40% of Resold Devices Contain PII & How to Destroy (Learn More, Video)

The National Association for Information Destruction (NAID) released results of the largest study to date of the presence of personally identifiable information (PII) on electronic devices sold on the second hand market. The study...

True Crime Novella Highlights Human Factor in Cyber Solutions (Video)

ideas42, a leading non-profit behavioral design firm, has unveiled a unique approach to highlighting and resolving key behavioral problems in cybersecurity with the launch of an original, serialized novella. The new “true-crime”- style...

New GFI Platforms to Protect Companies from Cyber-Attacks

GFI Software has officially launched GFI OneGuard and GFI OneConnect, two powerful platforms aimed at bringing enterprise-class IT management features to small and medium-sized businesses all around the world. GFI OneGuard enables...