Learn How the SolarWinds Next-Generation Build System is Setting the New Standard in Secure Software Development (Courtesy of SolarWinds)

SolarWinds Next-Generation Build System Aligns with NIST SSDF

SolarWinds, the 2022 Platinum 'ASTORS' Homeland Security Award Winner for Best IT Access Control & Authentication Solution, recently Nominated to Compete in the 2023 'ASTORS' Awards Program, is pleased to announce...
“When it comes to cybersecurity, it’s important to rely on facts from a third-party organization with groups of peer-reviewed data scientists and mathematicians whose sole focus is to think about security all day, every day,” explains Will Knehr, Senior Manager of Information Assurance and Data Privacy at i-PRO Americas.

i-PRO: How to Advance Cybersecurity with Secure Element & FIPS

With the ever increasing rise in cybercrime, i-PRO Americas, a global leader in professional security solutions for surveillance and public safety, and a Platinum 'ASTORS' Homeland Security Award Winner in 2022,...
Learn how with 1Kosmos BlockID, Workers, Customers, and Citizens can Login with a Blink and Smile. It's Easy to Implement and Users Love it! (Courtesy of 1Kosmos)

1Kosmos BlockID Latest Nominee in 2023 ‘ASTORS’ Awards Program

Identity fraud is running rampant. The FTC reported that losses due to impersonation fraud spiked 70% in 2021, and the trend has continued upward. In the wake of escalating data breaches...
Cyber attacks are on the rise and the only way to defend against them is to be proactive, pre-emptive and catch them BEFORE they take hold. (Courtesy of Cyemptive Technologies and Twitter)

Ray McCay Joins Cyemptive as New Chief Revenue Officer

Cyemptive Technologies, a Multi-Award Winner in the 2022 'ASTORS' Homeland Security Awards Program, has continued its series of strategic actions to scale the company up for the next level of growth...
Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...
Learn about GRAYPATH, a software-defined, cloud-hosted, Distributed Virtual Network (DVN) that uses Spread Spectrum IP technology to provide unprecedented security, performance, and reliability.

Intelligent Waves’ Returns to Compete in Third Consecutive ‘ASTORS’

Intelligent Waves, a leading tech integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, is pleased to announce its GRAYPATH Next-Generation Cyber-Defense Solution has been...
When it comes to the threat of corporate espionage and eavesdropping, some organizations aren’t listening. The troublesome aspect of Chinese spy balloons is that they can potentially be outfitted with cameras, radars, and radio devices. These radio devices can be utilized to infiltrate organizations via a number of wireless protocols, potentially giving them access to sensitive information, critical discussions, and more. Radio-based attacks are a constant threat with something as small as a compromised cell phone able to wreak havoc in the enterprise, let alone a high-tech spy balloon.

The Current State of Wireless (In)security, by Bastille CTO

Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is...
As Trusted Workforce 2.0 continues to roll out, there will be even more professionals within the government’s Continuous Vetting (CV) program, and more opportunities, for personnel to transfer between contracts. That’s good news for business – but bad news for security where paper-based systems and spreadsheets reign supreme. SIMS Software ClearanceJobs

SIMS a Returning ‘ASTORS’ Sponsor: ‘State of 2023 Facility Security Officer’

Behind every security clearance or classified program is a security officer maintaining that eligibility and keeping those classified programs safe. The good news is that security clearance reforms baked into Trusted Workforce...
keeper KSGC equips organizational IT administrators with visibility and control over password security practices across the entire organization on all devices, enabling them to enforce the use of strong, unique passwords, multi-factor authentication (MFA), role-based access control (RBAC), event logging, reporting, and other security policies. KSGC provisions with and integrates into any IT environment and identity stack.

Keeper Security Newest Competitor in 2023 Homeland Security Awards

Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software solutions that protect passwords, privileged access, secrets, and remote connections, is pleased to announce it's FedRAMP Keeper Security Government Cloud...