Can Your SOC Secure Kubernetes? Using Vuln Scanners, SIEM and EDR for Container Security

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Kubernetes is an inseparable part of modern DevOps infrastructure. While it is extremely powerful and flexible, it also raises major...
The truth is hackers can compromise home security camera feeds, but there are ways to block spying eyes.

Security Camera Hacking: It Can Happen to You. Here’s How to Stop It

August 22, 2021 – In Breaking News – CNET Installing a Wi-Fi-connected security camera in your house won't necessarily bring a wave of hackers to your network -- but losing privacy thanks...
E-Request digitally transforms how emergency communications centers (ECCs) receive and process 911 audio evidence requests and share incident information with district attorneys, police investigators and other key stakeholders.

NICE Public Safety E-Request Nominated in 2021 ‘ASTORS’ Awards

NICE Public Safety, a Double Platinum 2020 'ASTORS' Homeland Security Awards Program Winner, is pleased to announce their new E-Request has been nominated to compete in the 2021 'ASTORS' Awards Program. As...

Konica Minolta: Solving Challenges for the Government Workplace

Guest Editorial by Chris Bilello, Vice President, Business Solutions Development at Konica Minolta Business Solutions In this evolving global climate, government organizations face many significant challenges. The ability to streamline business processes while...
Apple products, including iPhones, have been vulnerable since at least last February according to internet security watchdog group Citizen Lab, underscoring the fact that no smartphone can be completely trusted.

Apple Security Fix: Urging Immediate iOS Update for iPhones & iPads

Israel-based cyber surveillance company NSO Group has developed a tool to break into Apple iPhones, utilizing a never-before-seen technique that has been in place since last February, according to internet security...
Smartphones are a great source of productivity, but they are also one of the biggest internal attack vectors on the market today because they generate a constant stream of detailed data about the user even when those features are turned off.

Smartphones Are Putting Government Users at Risk

OpEd by Dr. Bill Anderson, President of CIS Mobile In theory, smartphones are a great source of productivity, combining mobile telephone and computing functions into a single unit that provides users with...
top secret information

SIMS Software Named a Premier Sponsor in the 2021 ‘ASTORS’ Awards

By Michael Struttmann, President and CEO of SIMS Software SIMS Software, the leading provider of industrial security information management software to the government and defense industries, and a New 'ASTORS' Award Program...
The Durabook S14I is equipped with a smart card reader, fingerprint scanner, and hardware-based encryption (Trusted Platform Module (TPM 2.0)) to ensure storage security for sensitive data. In addition to software-based encryption, hardware-based encryption can be applied.

Durabook Americas Returns to Compete in 2021 ‘ASTORS’ Awards

Durabook Americas, formerly GammaTech Computer Corporation, who took home the Gold in the 2017 'ASTORS' Homeland Security Awards Program for 'Best Rugged Computer Tablet,' is pleased to announce the Durabook S14I...
Attackers are targeting credentials, privileges and the systems that manage them. Attivo Networks Identity Detection and Response solutions are designed to detect and derail identity-based attacks.

Attivo Identity Detect & Response Wins Triple 2021 Platinum ‘ASTORS’

Attivo Networks®, the leader in identity detection and response, has been named a Multi-Platinum 'ASTORS' Award Winner for the Fifth Consecutive Year in the Annual AST Homeland Security Awards Program. Organizations provision...
Neal Bridges

AttackIQ Named Newest Competitor in 2021 ‘ASTORS’ Awards Program

The AttackIQ Security Optimization Platform enables risk and security practitioners to continuously assess and improve critical security controls within their production environment, optimizing their end-to-end security posture and providing trend reporting...