Digital assistants, fitness trackers, home security devices, thermostats, remote-controlled robots, gaming systems, and talking stuffed animals … What these things all have in common is that they send and receive data. But do you know where it is going?

FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned

October 7, 2020 – In Breaking News – Forbes Warnings that our IoT devices might be spying on us are nothing new—remember the smart speaker fiasco last year? But at least we expect those devices...
Bad actors are targeting governments, schools, and other public institutions with extra venom. Ransomware is proving to be such a problem for the public sector primarily because of the rise of third-party cloud channels: social media tools, messaging apps, and collaboration platforms.

To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels

Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....

7 Data Loss Prevention Strategies and Practices You Should Know

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
Nightfall ai logo

5 Common Accidental Sources of Data Leaks

In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or account takeovers,...
Carnival Corp says it suffered a ransomware attack on Saturday, August 15, and that hackers stole some of its data.

World’s Largest Cruise Line Operator Suffers Ransomware Attack

Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain of Carnival’s data...
Working remotely, you can forget your authentication details (particularly when using multi-factor authentication), send a link to the wrong person, click on an ad for something fake, have your online activity traced, or even see your laptop or smartphone stolen, which makes training very important.

Is Remote Working as Secure as it Needs to Be?

By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be technically viable, and accepted some of the...
‘ASTORS’ Award Winning NICE Investigate can totally transform how your department manages investigations and digital evidence, saving you time and money, improving case solvability, and much more. Additionally, NICE Inform Intelligence Center puts powerful real-time analytical tools and metrics within reach of 911 center managers, making it easy to identify, understand, and address the factors that drive operational performance and contribute to success.

UK Police to Deploy NICE Investigate to Streamline Investigations and Reduce Risk

NICE, a Multiple Award Winner in the last Four Annual ‘ASTORS’ Homeland Security Awards Programs, has been selected by a consortium of four UK police forces (Hampshire Constabulary, Thames Valley Police,...
Semperis ADFR

Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program

While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans. Almost...
Data Theorem Offers API Security Solutions that Automate Continuous API Security Analysis and Vulnerability Inspection

Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report

Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...
Gurucul provides a comprehensive view of user/entity behaviors and detects risky outliers using a library of advanced machine learning (ML) models and identity-centric data science, artificial intelligence (AI), anomaly detection and predictive risk-scoring algorithms to identify abnormal behaviors and activities indicative of security threats. (Courtesy of Gurucul)

Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program

Gurucul, a Winner in the 2016, 2018 and 2019 'ASTORS' Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to compete in the 2020...