As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments at a lower cost than any other enterprise solution.

Pivot3 Sees Over 50% Growth in 2018, Named 2018 ‘ASTORS’ Award Finalist

Pivot3, a hyperconverged infrastructure (HCI) performance and technology leader and a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, has announced the company experienced more than 50-percent growth in bookings...
Fortanix SDKMS, a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

Fortanix & Alibaba Launch SDKMS Runtime Encryption Key Mngmt

Fortanix, a leader in Runtime Encryption®, and a Finalist in the 2018 ‘ASTORS’ Awards Program, is partnering with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key Management Service™...

Mapping Apps are Endangering Special Operators, Anger US Troops

By Susan Crabtree, the Washington Free Beacon U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to hacking...
NG Firewall delivers enterprise-grade cybersecurity features in a package that is easy to purchase, configure, deploy and maintain for state and local government, educational institutions,  nonprofit organizations as well as SMBs.

Untangle Goes for 2nd Consecutive Win in 2018 ‘ASTORS’ Awards (Video)

Untangle, a leader in comprehensive network security for small-to-medium business (SMB), and a Winner in the 2017 'ASTORS' Homeland Security Awards Program, is pleased to announce NG Firewall v14.0 has been nominated to...
This new publication is a high-level technical document meant to provide the foundation for a planned series of publications on more specific aspects of blockchain, intended to help readers understand how blockchain technology works. (Courtesy of NIST)

NIST Releases Blockchain Technology Foundational Overview (Learn More)

The National Institute of Standards and Technology (NIST) has officially released the publication NISTIR 8202, Blockchain Technology Overview. Blockchains are tamper evident and tamper resistant digital ledgers implemented in a distributed fashion (i.e., without a...
The LinkGuard platform from Blue Ridge Networks allows organizations to cloak critical data networks, making them invisible and inaccessible to everyone that doesn’t have previously verified access using Autonomous Network Segmentation. This ‘Zero Trust’ methodology prevents hacker reconnaissance and eliminates the high risk of unauthorized access to critical infrastructure while enabling secure connectivity, wherever it’s needed, without costly or time-consuming IT overhead.

Blue Ridge Networks Competes in 2018 ‘ASTORS’ Awards Program

Blue Ridge Networks, a past Platinum Award Winner in the Annual 'ASTORS' Homeland Security Awards Program, is delighted to announce that the company's new LinkGuard Platform has been nominated to compete in...
Attivo Launches Counterintelligence; Bolsters Current Threat and Adversary Intelligence Functionality for Offense-driven Countermeasures

Attivo Closes Serverless & Container Security Gaps Through Deception

Attivo Networks, the 2017 Platinum 'ASTORS' Homeland Security Award-Winning leader in deception for cybersecurity threat detection, is further enhancing its portfolio with advanced deception techniques designed specifically to accurately detect and...
SolarWinds ® Orion ® Platform is trusted by 425 of the Fortune 500 ® companies to monitor, visualize, and analyze the performance of networks, applications, systems, and databases on-premises, in a hybrid environment, or in the cloud.

SolarWinds Orion Suite v3.0 Goes for Common Criteria Evaluation (Video)

SolarWinds, a leading provider of powerful and affordable IT management software, a Platinum Award Winner Two Years Running in the Annual ‘ASTORS’ Homeland Security Awards Program, and a strong competitor in the 2018 'ASTORS'...
Zone Protector™ – Detect Cell Phones & Hidden Transmission Devices. Accurate Detection - Future Proof - Multiple Alert Options. Deploy as a portable or network device with adjustable range.

Cellbusters Goes for Trifecta in 2018 ‘ASTORS’ (Learn More, Multi-Video)

Cellbusters, an Award Winner for Best Cell Phone Detection Solution for Two Years Running in the Annual ‘ASTORS’ Homeland Security Awards Program, is happy to announce the Zone Protector (Cellular and Cyber Detection System), has been nominated to compete in...