5 Common Accidental Sources of Data Leaks
In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events.
Bad actors are easy to blame for information leaks or account takeovers,...
World’s Largest Cruise Line Operator Suffers Ransomware Attack
Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain of Carnival’s data...
Is Remote Working as Secure as it Needs to Be?
By Kayleigh Alexandra
For well over a decade, remote working was an option that most businesses left in their back pockets.
They knew it to be technically viable, and accepted some of the...
UK Police to Deploy NICE Investigate to Streamline Investigations and Reduce Risk
NICE, a Multiple Award Winner in the last Four Annual ‘ASTORS’ Homeland Security Awards Programs, has been selected by a consortium of four UK police forces (Hampshire Constabulary, Thames Valley Police,...
Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program
While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans.
Almost...
Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report
Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...
Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program
Gurucul, a Winner in the 2016, 2018 and 2019 'ASTORS' Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to compete in the 2020...
FBI Finds al Qaeda Links on Pensacola Shooter’s iPhones
May 18, 2020 – In Breaking News – Fox News
After being denied help from Apple, FBI investigators have been able to access the contents of the phones that belonged to the Saudi aviation student who shot and killed...
How Federal Agencies Can Secure Data Services in the Cloud
Guest Editorial by Gerry Gebel, VP of Business Development at Axiomatics
As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following...
BeyondTrust Free Secure Remote Access for Workforce from COVID-19
BeyondTrust, a Platinum Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, is extending the availability of its free 90-Day evaluation for organizations seeking solutions to enable Secure Remote Access...