FBI Releases the Internet Crime Complaint Center 2018 IC3 Report

The FBI’s Internet Crime Complaint Center (IC3) 2018 Internet Crime Report includes information from 351,936 complaints of suspected Internet crime, with reported losses in excess of $2.7 billion. The top three crime types reported...
Your Biggest Asset is Also Your Biggest Risk The greatest threat to businesses today isn’t the outsider trying to get in. It’s the people you trust—the ones who already have the keys. (Courtesy of ObserveIT)

ObserveIT 7.7 Competes in 2019 ‘ASTORS’ Awards Program

ObserveIT, a leading insider threat management provider recognized in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company’s ObserveIT introduced its newest solution, ObserveIT 7.7 has been nominated to compete...
A USB drive with hardware-based encryption is an excellent, non-complicated and simple solution to protect data from breaches, while also providing compliance with evolving governmental regulations.

Encryption Is Key in the World of BYOD USB Flash Drives

Guest Editorial by Richard Kanadjian, Encrypted USB Business Manager at Kingston Technology Today, government entities are filling their workplace environments with all sorts of interesting, novel perks in an attempt to keep staff...
On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Stomp Out Security Threats with Canon’s Latest Enterprise Solutions

With organizations honing in on IT security and compliance efforts with data privacy regulations, Canon U.S.A., a Double Award Winner in the Annual ‘ASTORS’ Homeland Security Awards Program for two consecutive years, has debuted...
Built from the ground up for emergency communications centers, the NICE Inform Intelligence Center puts powerful real-time analytical tools and metrics within reach of 911 center managers, making it easy to identify, understand, and address the factors that drive operational performance and contribute to success. NICE Investigate can totally transform how your department manages investigations and digital evidence, saving you time and money, improving case solvability, and much more.

Drowning in a Tsunami of Digital Evidence? Here’s Your Lifeline

By Rod Guy, VP of Strategy, NICE Public Safety Today, crime solving hinges on digital evidence and the volume, velocity and variety of digital evidence is growing​ exponentially. From body-worn cameras and CCTV,...
DHS New Additions to S&T’s Data Privacy portfolio to address critical capability gaps for Homeland Security practitioners and instill trust in emergent technologies

DHS S&T Awards $1.14M for New Cyber Data Privacy Tools

Cyber-threats are rapidly shifting and privacy-related breaches are increasing in frequency and impact. To address these concerns, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T), a multiple Platinum Honoree in the...
As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Unmatched scalability and performance makes Axiomatics Policy Server the preferred choice for implementing Attribute Based Access Control in many global enterprises and government agencies.

Axiomatics Federal Named a Finalist in 2018 ‘ASTORS’ Awards (Videos)

Axiomatics Federal, the leader in fine-grained dynamic authorization for customers and partners of the federal government, is delighted to announce Axiomatics' Policy Server has been named a Finalist in the 2018 'ASTORS' Homeland...