See How Dell’s Computer Vision is Reinventing the Fan Experience
There’s nothing like the thrill of a big game or the concert atmosphere, as people tend to value experiences more than physical possessions, generating billions annually to the “experience economy.”
Entertainment venues...
Sophos MTR to Compete in 2022 ‘ASTORS’ Homeland Security Awards
Sophos, a global leader in next-generation cybersecurity, is pleased to announce Sophos Managed Threat Response (MTR) is one of three of the company's products, to have been nominated to compete in...
SQL Injection & the BillQuick Attack: Best Practices to Protect your Org
Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO
The BillQuick attack was an important reminder of the dangers of SQL injection. Attackers discovered a SQL injection flaw in...
NanoLock Combats Cyber Chaos with Device-Level Industrial Cybersecurity
NanoLock Security has become the first company to introduce device-level protection solutions for legacy and new industrial machinery and smart factory production lines.
NanoLock's industrial solutions are available in the United States,...
Genetec Customers Break Free with Next-Generation Synergis Cloud Link
Genetec, a leading technology provider of unified security, public safety, operations, and business intelligence solutions, who took home a Gold in the 2021 'ASTORS' Homeland Security Awards Program, has announced the...
Diana Logue Named Chief Operating Officer of ‘ASTORS’ Sponsor Rajant
Rajant Corporation, the pioneer of Kinetic Mesh® wireless networks, a 2021 'ASTORS' Award Winner, and a New Premier Industry Sponsor of the 2022 'ASTORS' Homeland Security Awards Program, has promoted Diana...
NIST Addressing Future Post-Quantum Cybersecurity Threats Today
QuSecure™, Inc., a leader in post-quantum cybersecurity (PQC), has announced its QuProtect™ PQC solution supports all of the post-quantum cryptography algorithms selected by the National Institute of Standards and Technology (NIST)...
BlackCat Targets Microsoft Exchange Signaling a Disturbing New Trend
Guest Editorial by Jon Hencinski, Director, Threat Detection & Response, Expel
On June 13, Microsoft posted this blog, “The many lives of BlackCat ransomware,” detailing the history of one of the most...
Ex-CIA Programmer Convicted of Vault 7 WikiLeak Breach (Videos)
July 14, 2022 – In Breaking News – FOX NEWS
A former CIA programmer was convicted Wednesday of federal charges in connection to the massive Vault 7 theft of secret information provided...
What Is the Log4j Vulnerability and Why It’s NOT an Easy Fix
Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO
Log4j is a very popular logging package for Java. It is widely used by high-profile applications and services, including software...