PARANOID is designed to prevent the most advanced and targeted national-level cyber-attacks on enterprise organizations, requiring no previous knowledge about the threat or its specific methodology. Based on a unique “last-line-of-defense approach,” Nyotron’s technology is designed to mitigate threats that are able to outsmart all other security layers.

PARANOID, a New Competitor in the 2019 ‘ASTORS’ Awards Program

Nyotron, a provider of the industry's first OS-Centric Positive Security solution to strengthen endpoint protection, is pleased to announce that PARANOID, has been nominated to compete in the 2019 ‘ASTORS’ Homeland...

12M Impacted by Quest Diagnostics & LabCorp Breach – What to Do (Video)

Quest Diagnostics and Laboratory Corporation of America Holdings (LabCorp) announced related data breaches that may impact up to 20 million customers who used their services between August 1, 2018 and March...

Canon Security Roadshow with Expert Insights on InfoSec & Data Privacy

Securing your workplace has never been more important. Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., a Multi-Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, is launching a 16-city security...
An automaker with 100+ manufacturing facilities in 30+ countries implemented Indegy to monitor and track production changes and controller upgrades in real-time, discover/maintain accurate OT inventory, and provide a rich audit trail for forensics. (Courtesy of Indegy)

Indegy Unifies OT and IT Security with Partners Palo Alto Networks

Indegy, a leading provider of security solutions for both industrial control system (ICS) and operational technology (OT) environments, and a New Competitor in the 2019 ‘ASTORS’ Homeland Security Awards Program, is...
Fortanix SDKMS, the Gold ‘ASTORS’ Award Winner in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

‘ASTORS’ Award-Winning Fortanix SDKMS Earns FIPS Level 1 Cert

Fortanix, recently recognized as the Gold Award Winner in the 2018 'ASTORS' Homeland Security Awards Program, for the company's Self-Defending Key Management Service™ (SDKMS) is pleased to announce they have earned...
Canon's New Edition of Award-Winning imageRUNNER ADVANCE Platform Focuses on Security Features and Workflow Efficiency

Canon U.S.A. Emerges a 2018 Digital Imaging Market Share Leader

Continually providing customers with solutions to help equip them for advancement in a time of digital transformation, Canon U.S.A., who was recently recognized as a Multi-Award Winner in the 2018 ‘ASTORS’...

Attivo Networks Powers up with New Energy Impact Partners

Cyber threats to the Energy sector are on the rise. As one of the sixteen national critical infrastructure sectors, it is vital that energy companies are able to adequately defend themselves from...
Your Biggest Asset is Also Your Biggest Risk The greatest threat to businesses today isn’t the outsider trying to get in. It’s the people you trust—the ones who already have the keys. (Courtesy of ObserveIT)

ObserveIT 7.7 Competes in 2019 ‘ASTORS’ Awards Program

ObserveIT, a leading insider threat management provider recognized in the 2018 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company’s ObserveIT introduced its newest solution, ObserveIT 7.7 has been nominated to compete...
A USB drive with hardware-based encryption is an excellent, non-complicated and simple solution to protect data from breaches, while also providing compliance with evolving governmental regulations.

Encryption Is Key in the World of BYOD USB Flash Drives

Guest Editorial by Richard Kanadjian, Encrypted USB Business Manager at Kingston Technology Today, government entities are filling their workplace environments with all sorts of interesting, novel perks in an attempt to keep staff...

How Can Federal Agencies Secure Data Services in the Cloud

By Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to the cloud, federal agencies are following suit, and...