On Monday, IBM is publishing findings on vulnerabilities in five “visitor management systems,” the digital sign-in portals that often greet you at businesses and facilities.

X-Force Red Finds Security Threats in Visitor Management System Kiosks

March 4, 2018 – In Breaking News – WIRED DANIEL CROWLEY HAS a long list of software platforms, computers, and internet-of-things devices that he suspects he could hack. As research director of IBM’s offensive security group...
A VPN (Virtual Private Network) is a service that lets you access the web safely and privately by routing your connection through a server and hiding your online actions. (Courtesy of YouTube)

What Are the Most Secure VPN Proto-cols & Why? (Learn More, See Video)

By Howard Dawson, Writer & Tech Enthusiast Virtual Private Networks (VPN) are vital applications for those who want to keep their Web browsing data private. They allow for safe surfing of the internet and to...
The NIST National Cybersecurity Center of Excellence (NCCoE) has released final guidance on mobile device security to help organizations secure mobile devices and prevent data breaches.

NIST Guide to ‘Mobile Device Security: Cloud and Hybrid Builds’ Now Live

NIST Cybersecurity Practice Guide SP 1800-4 Mobile Device Security: Cloud and Hybrid Builds, is now final. If sensitive data is stored on a poorly secured mobile device that is lost or stolen, an attacker...
Built from the ground up for emergency communications centers, the NICE Inform Intelligence Center puts powerful real-time analytical tools and metrics within reach of 911 center managers, making it easy to identify, understand, and address the factors that drive operational performance and contribute to success. NICE Investigate can totally transform how your department manages investigations and digital evidence, saving you time and money, improving case solvability, and much more.

Drowning in a Tsunami of Digital Evidence? Here’s Your Lifeline

By Rod Guy, VP of Strategy, NICE Public Safety Today, crime solving hinges on digital evidence and the volume, velocity and variety of digital evidence is growing​ exponentially. From body-worn cameras and CCTV,...
(Courtesy of U.S. Air Force by J.M. Eddins Jr.)

Strategies & Solutions to Enforce DoD’s Cybersecurity ‘Lines of Effort’

By Jim Hansen, Vice President of Products & Security, SolarWinds The Department of Defense is going on the offense. The DoD Cybersecurity Discipline Implementation Plan outlines several key “Lines of Effort” to strengthen government...

21 Terrifying Cyber Crime Statistics

By Jack Foster, Author at VPN Geeks Unfortunately, with technology on the rise, there’s more room for cyber crime in 2019. According to the Cyber Security Breaches Survey 2018, 43% of businesses were a victim of...
Gurucul Risk Analytics (GRA) is a multi-use UEBA platform with an open architecture that ingests virtually any dataset for desired attributes, and includes configurable out-of-the-box analytics.

Gurucul Takes Platinum in 2018 ‘ASTORS’ Awards (Multi-Video)

Gurucul, a leader in behavior based security and fraud analytics technology for on-premises and the cloud, has been named the Platinum Award for 'Best User & Entity Behavior Analytics (UEBA) Solution'...
As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments at a lower cost than any other enterprise solution.

Pivot3 Sees Over 50% Growth in 2018, Named 2018 ‘ASTORS’ Award Finalist

Pivot3, a hyperconverged infrastructure (HCI) performance and technology leader and a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, has announced the company experienced more than 50-percent growth in bookings...
Fortanix SDKMS, a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

Fortanix & Alibaba Launch SDKMS Runtime Encryption Key Mngmt

Fortanix, a leader in Runtime Encryption®, and a Finalist in the 2018 ‘ASTORS’ Awards Program, is partnering with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key Management Service™...