Delta Risk expert John Hawley, VP, (pictured here) and Andrew Cook, Manager, ActiveResponse, will lead a discussion on, "Is Your Organization Prepared for a Cyber Attack? Key Takeaways from Real-Life Incidents."

LegalCIO 2018 to Offer Practical Advice for Law Firms & Legal IT

Delta Risk will host a roundtable on incident response best practices on February 1 as part of the LegalCIO conference. The conference is held in conjunction with Legalweek New York 2018 January 29 - February 1 at...
WatchGuard Technologies Adds Security at the DNS Layer to Company's SMB Security Platform with the Acquisition of Percipient Networks

WatchGuard Acquires Percipient Networks & Flagship Strongarm

WatchGuard Technologies, has announced that it has acquired Percipient Networks, a developer of simple, affordable, automated security solutions for small and midsize organizations. Percipient Networks' flagship product, Strongarm, stops phishing and malware...

Norton Takes the Helm of JFHQ-DODIN & Directorship of DISA

Navy Vice Adm. Nancy A. Norton assumed command of the Joint Force Headquarters – Department of Defense Information Network (JFHQ-DODIN) and directorship of the Defense Information Systems Agency (DISA) during a...
In the human brain, the cerebellum receives sensory information and coordinates voluntary movements, resulting in smooth and balanced muscular activity. The Veracity “Cerebellum” platform is designed to serve a similar function for industrial networks, providing a system level approach that responds to sensory data and orchestrates the pre-designed production process response. (Image courtesy of Stanford University)

Veracity Competes in 2018 ‘ASTORS’ Homeland Security Awards (Video)

Cerebellum, by Veracity Industrial Networks has been nominated to compete in the 2018 'ASTORS' Homeland Security Awards for Cyber Critical Infrastructure Solution. Veracity, founded and led by a veteran team with deep...
One piece of security infrastructure that is sometimes overlooked is application whitelisting, which adds a valuable security layer to prevent increasingly sophisticated cyber attacks.

Layered Security Cyber Infrastructure Can Deter Government Breaches

By Heman Mehta, Director of Product Management, Faronics Corporation The Office of Personnel Management (OPM) breach of 21.5 million plus records was perhaps the most notorious hack of government agencies, but it...
Canon U.S.A. uniFLOW, imageRUNNER ADVANCE, imageWARE Secure Audit Manager Express were Honored as the 2017 ‘ASTORS’ Platinum Award Winner for Best Access Control & Authentication Solution

Canon U.S.A. Wins Again, Accolades from Keypoint Intelligence Buyers Lab

In its continued commitment to delivering advanced office solutions to enterprises, Canon U.S.A., a leader in digital imaging solutions, celebrates the receipt of multiple industry accolades awarded to the Company by...

COMSAT Demos the Power of Preparedness During CA Wildfires

COMSAT, a U.S.-based satellite connectivity provider, has successfully demonstrated the power of preparedness in reaction to the recent wildfires in California. The Thomas Fire, reported to be the largest in California state...
Now, it’s easier than ever to collect and manage evidence from the community. With Axon Citizen, the public safety portal, you can invite individual witnesses – or an entire community – to submit photos and videos of an incident directly to your agency.

Fort Worth PD Kicks Off Agency-Wide Trial of Axon Citizen (See in Action)

The Fort Worth Police Department (FWPD) is rolling out an agency-wide field trial of Axon Citizen, a public evidence submission tool from Axon, a global leader in connected law enforcement technologies. Fort Worth, a Major Cities Chiefs...
When it Comes to Cyberattacks, Half Protected is Half Not (Image courtesy of Centrify)

Centrify Recognized in 3 Research Reports by Forrester Research Inc.

Centrify, a leader in securing hybrid enterprises through the power of identity services, and Platinum Winner for Best Cyber Security for ID Mgmt & Access Control in the 2017 ‘ASTORS’ Homeland Security Awards, is...

SolarWinds Goes for Hat Trick in 2018 ‘ASTORS’ Awards (Multi-Video)

Threats to IT networks continue to accelerate and evolve. While enterprising hackers from external sources test the robustness of network security parameters, internal threats in the form of careless and malicious insiders...