On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...
Built from the ground up for emergency communications centers, the NICE Inform Intelligence Center puts powerful real-time analytical tools and metrics within reach of 911 center managers, making it easy to identify, understand, and address the factors that drive operational performance and contribute to success. NICE Investigate can totally transform how your department manages investigations and digital evidence, saving you time and money, improving case solvability, and much more.

Drowning in a Tsunami of Digital Evidence? Here’s Your Lifeline

By Rod Guy, VP of Strategy, NICE Public Safety Today, crime solving hinges on digital evidence and the volume, velocity and variety of digital evidence is growing​ exponentially. From body-worn cameras and CCTV,...
DHS New Additions to S&T’s Data Privacy portfolio to address critical capability gaps for Homeland Security practitioners and instill trust in emergent technologies

DHS S&T Awards $1.14M for New Cyber Data Privacy Tools

Cyber-threats are rapidly shifting and privacy-related breaches are increasing in frequency and impact. To address these concerns, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T), a multiple Platinum Honoree in the...
As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Unmatched scalability and performance makes Axiomatics Policy Server the preferred choice for implementing Attribute Based Access Control in many global enterprises and government agencies.

Axiomatics Federal Named a Finalist in 2018 ‘ASTORS’ Awards (Videos)

Axiomatics Federal, the leader in fine-grained dynamic authorization for customers and partners of the federal government, is delighted to announce Axiomatics' Policy Server has been named a Finalist in the 2018 'ASTORS' Homeland...
Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments at a lower cost than any other enterprise solution.

Pivot3 Sees Over 50% Growth in 2018, Named 2018 ‘ASTORS’ Award Finalist

Pivot3, a hyperconverged infrastructure (HCI) performance and technology leader and a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, has announced the company experienced more than 50-percent growth in bookings...
Fortanix SDKMS, a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

Fortanix & Alibaba Launch SDKMS Runtime Encryption Key Mngmt

Fortanix, a leader in Runtime Encryption®, and a Finalist in the 2018 ‘ASTORS’ Awards Program, is partnering with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key Management Service™...
The CDM Program was designed to help government teams identify and prioritize cybersecurity risks and enable cyber personnel to quickly mitigate these problems.

Feds Weigh In on Impact of CDM Program, Forcepoint Survey Explores

Forcepoint, a global leader in cybersecurity and a Finalist in the 2018 ‘ASTORS’ Homeland Security Award Program, has released the results of its new Federal CDM Survey, which explores how the U.S....