iboss, a New Competitor in the 2020 ‘ASTORS’ Homeland Security Awards, is the best choice for government entities for fast and secure connections for users from anywhere with a SASE platform that completely isolates network data traffic.

Fast and Secure Connectivity from Anywhere, Designed for Government

Guest OpEd by Paul Martini, iboss CEO, CTO, Co-Founder With increasing bandwidth, encrypted traffic, shifts to cloud applications like Office 365 and users that are no longer constrained to the government network,...
The significance of the Apricorn Aegis Secure Key 3NXC software-free, encrypted device that works across a diverse computing landscape (MacBook, iPad, Android) is particularly important now as organizations around the globe have transitioned to a work-from-home or hybrid working models due to COVID-19.

Aegis Secure Key 3NXC a Finalist in 2020 ‘ASTORS’ Awards Program

Even before the COVID-19 pandemic, remote and mobile working was on the rise. As the global workforce shifted from office to home practically overnight, it became abundantly clear that workers would...
Digital assistants, fitness trackers, home security devices, thermostats, remote-controlled robots, gaming systems, and talking stuffed animals … What these things all have in common is that they send and receive data. But do you know where it is going?

FBI ‘Drive-By’ Hacking Threat Just Got Real: Why You Should Be Concerned

October 7, 2020 – In Breaking News – Forbes Warnings that our IoT devices might be spying on us are nothing new—remember the smart speaker fiasco last year? But at least we expect those devices...
Security begins at the input device – stay protected from keyloggers and BadUSB attacks with the SECURE BOARD 1.0 from CHERRY. With the new CHERRY SECURE BOARD 1.0, accessing sensitive credentials and passwords will be impossible for hardware keyloggers, as keys are entered in encrypted form.

CHERRY Grows it’s US Base with Executive Promotions & Input Devices

Developments such as digitization and Big Data and the exponentially growing mountains of data that go hand in hand with them are stirring a desire for more. Not only for cybercriminals who...
Bad actors are targeting governments, schools, and other public institutions with extra venom. Ransomware is proving to be such a problem for the public sector primarily because of the rise of third-party cloud channels: social media tools, messaging apps, and collaboration platforms.

To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels

Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....

7 Data Loss Prevention Strategies and Practices You Should Know

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Data Loss Prevention (DLP) enables organizations to protect data against a wide range of losses, including theft, deletion, and modification....
While not being able to quickly access emails or social media posts can be annoying to a general consumer, wireless connectivity becomes critical when police and fire departments, security personnel and medical professionals need access to many types of data, video, images and more in in real-time. 2020 ’ASTORS’ Competitors Skywire Networks and Siklu, is uniquely qualified to bring immediate high-speed connection to highly congested conditions – in terms of the density of buildings in the end point areas (at an average of 30 stories) and in terms of a crowded and noisy radio transmissions environment.

Pandemic Response – How to Set up Temporary Gigabit Wireless Access Networks

Implementing a wireless network to establish or expand broadband communications services in emergency situations (health, weather, natural disaster related or other) can be a tricky endeavor. Requirements include replacing the capacity lost...
Nightfall ai logo

5 Common Accidental Sources of Data Leaks

In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or account takeovers,...
As attacks have grown in complexity, the need for defenders to employ effective automation has also increased, and cybersecurity teams have sought to respond accordingly by investing in tools that help eliminate the manual work associated with incident detection, analysis, and response.

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response

Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 'ASTORS' Awards Cybercrime is always evolving, and as technology becomes more advanced, so too do...
For years, various representative studies have shown that computer keyboards are among the dirtiest and most bacterially contaminated office products available. What can you do? Find out from the world's leading keyboard manufacturer, CHERRY.

Fight the Germs – Discover How to Keep a Hygienic Work Space

Since the beginning of time, people have been disgusted by certain things. From an evolutionary-biological point of view, this makes sense. A healthy disgust preserved and still preserves people today from carelessly putting...