Learn about GRAYPATH, a software-defined, cloud-hosted, Distributed Virtual Network (DVN) that uses Spread Spectrum IP technology to provide unprecedented security, performance, and reliability.

Intelligent Waves’ Returns to Compete in Third Consecutive ‘ASTORS’

Intelligent Waves, a leading tech integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, is pleased to announce its GRAYPATH Next-Generation Cyber-Defense Solution has been...
When it comes to the threat of corporate espionage and eavesdropping, some organizations aren’t listening. The troublesome aspect of Chinese spy balloons is that they can potentially be outfitted with cameras, radars, and radio devices. These radio devices can be utilized to infiltrate organizations via a number of wireless protocols, potentially giving them access to sensitive information, critical discussions, and more. Radio-based attacks are a constant threat with something as small as a compromised cell phone able to wreak havoc in the enterprise, let alone a high-tech spy balloon.

The Current State of Wireless (In)security, by Bastille CTO

Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is...
As Trusted Workforce 2.0 continues to roll out, there will be even more professionals within the government’s Continuous Vetting (CV) program, and more opportunities, for personnel to transfer between contracts. That’s good news for business – but bad news for security where paper-based systems and spreadsheets reign supreme. SIMS Software ClearanceJobs

SIMS a Returning ‘ASTORS’ Sponsor: ‘State of 2023 Facility Security Officer’

Behind every security clearance or classified program is a security officer maintaining that eligibility and keeping those classified programs safe. The good news is that security clearance reforms baked into Trusted Workforce...
keeper KSGC equips organizational IT administrators with visibility and control over password security practices across the entire organization on all devices, enabling them to enforce the use of strong, unique passwords, multi-factor authentication (MFA), role-based access control (RBAC), event logging, reporting, and other security policies. KSGC provisions with and integrates into any IT environment and identity stack.

Keeper Security Newest Competitor in 2023 Homeland Security Awards

Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software solutions that protect passwords, privileged access, secrets, and remote connections, is pleased to announce it's FedRAMP Keeper Security Government Cloud...
A successful cybersecurity attack can devastate a small business, leading to financial loss, reputational damage, and potential legal ramifications. (Courtesy of ChamberofCommerce.org)

The Import of Cybersecurity in Small Business – ChamberofCommerce.org

Cybersecurity refers to the practice of protecting digital assets, such as computer systems, networks, and data, from unauthorized access, theft, damage, or disruption. This involves implementing a range of measures, including technological...

New Research Spotlights BEC Tactics, Other Emerging Security Trends

Guest Editorial by Ben Brigida, Director, SOC Operations, Expel While there’s no tried-and-true crystal ball, one of the more reliable ways to predict the future is to observe recent trends. As a security...
The reality for companies who fall victim to a data security breach can have dire effects on not just a company’s value, but also its brand image and reputation, explains Bal Heroor, CEO and Principal at Mactores. 

How Data Security Breaches Affect Your Company’s Value

Guest Editorial by Bal Heroor, CEO and Principal at Mactores  Picture the scene. It’s 11:00 P.M. and an urgent board meeting has just been called for a Fortune 500 company headquartered in Manhattan. Board...
Interest in Robots is Growing, and new networking options are a significant factor explains Chris Wall, Sales Director for Rajant Corporation.

Empowering Public Safety and Industrial Security with Robotics

Guest Editorial by Chris Wall, Sales Director for Rajant Corporation Public safety and security organizations are continuously looking for greater operational efficiencies and cost savings. The likes of autonomous robotics solutions will...
Changes to regulations, standards, and guidelines are rippling up and down the federal government through agencies, large and small, in response to the White House Executive Order on Improving the Nation’s Cybersecurity, but here are some of the major ones put forth by CISA and NIST.

Highlighting CISA & NIST’s Efforts Under EO 14028: Standards & Security

Guest editorial by Dr. Brian Gant Companies and organizations have been increasingly aware of the need for cybersecurity to safeguard their data and that of their customers. However, even the best intentions...
Canon U.S.A. earned recognition in the categories of Best Access Control and Authentication Solution and Best Device Visibility and Control Solution for its continually updated and enhanced uniFLOW Online and Canon Office Cloud offerings.

Canon U.S.A. Earns Multi-Gold 2022 ‘ASTORS’ Homeland Security Awards

For its efforts in offering cloud print and scan solutions with built-in security features that can help users modernize some of their scanning and printing processes – Canon U.S.A., Inc., a...