Cloud Access Security Brokers Give Peek into Better Application Security

By Nico Fischbach, Global Chief Technology Officer for Forcepoint Federal agencies are undergoing a massive transition from legacy IT technologies to the cloud. Many CIOs have been focused on moving their organizations to...

DC1000B Marks Kingston’s Entrance into NVMe Data Center Drives

Kingston Technology, a world leader in memory products and technology solutions, and a Double Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has introduced a new data center SSD, the DC1000B...

7 Cybersecurity Threats and Trends to Watch for in 2020 (Multi-Video)

Guest OpEd by Gilad David Maayan Cybercriminals are constantly looking for new strategies and exploits to damage organizations. However, some older threats remain amongst the most common attacks on businesses. The overall damage...

NICE to Drive Digital Transformation for Nassau NY Police & DA’s Office

NICE, a world leader in providing both cloud and on-premises enterprise software solutions for law enforcement agencies, and a Multiple Award Winner in the Annual 'ASTORS' Homeland Security Awards Program for...

SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards

SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the SolarWinds Access...
Gurucul provides a comprehensive view of user/entity behaviors and detects risky outliers using a library of advanced machine learning (ML) models and identity-centric data science, artificial intelligence (AI), anomaly detection and predictive risk-scoring algorithms to identify abnormal behaviors and activities indicative of security threats. (Courtesy of Gurucul)

Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program

Gurucul, a Winner in the 2016, 2018 and 2019 'ASTORS' Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to compete in the 2020...
“We have been able to meet the demands of supporting home equipment and getting people ready to work so they can continue essential operations for a health care system while building out capacity for surge patients, all while keeping our backbone operational staff safe at home.” “We would not have been able to accomplish this without BeyondTrust.” (Courtesy of Mount Sinai South Nassau and Twitter)

BeyondTrust Free Secure Remote Access for Workforce from COVID-19

BeyondTrust, a Platinum Award Winner in the 2019 'ASTORS' Homeland Security Awards Program, is extending the availability of its free 90-Day evaluation for organizations seeking solutions to enable Secure Remote Access...

How Federal Agencies Can Secure Data Services in the Cloud

Guest Editorial by Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following...
Attorney General Bill Barr says the iPhones belonging to Pensacola naval base gunman Mohammed Alshamrani, who killed three US sailors helped the Justice Department in establishing Alshamrani’s “significant” ties to al Qaeda before he even arrived in the U.S. and right up until the night of the murders. (Courtesy of YouTube.)

FBI Finds al Qaeda Links on Pensacola Shooter’s iPhones

May 18, 2020 – In Breaking News – Fox News After being denied help from Apple, FBI investigators have been able to access the contents of the phones that belonged to the Saudi aviation student who shot and killed...
Data Theorem Offers API Security Solutions that Automate Continuous API Security Analysis and Vulnerability Inspection

Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report

Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...