SolarWinds IT Trends Report 2021: Building a Secure Future examines how technology professionals perceive the evolving state of risk in today’s business environment following internal impact of COVID-19 IT policies and exposure to external breaches

New Ops for Managing Risk Driven by Internal & External Security Threats

SolarWinds, a leading provider of simple, powerful, and secure IT management software, and Multiple 2020 'ASTORS' Award Winner, with Multiple-Products Nominated to compete in the 2021 'ASTORS' Awards Program, has  released...
Tony Coulson, director of CSUSB testified that the nation is in a crisis situation of a 500,000 person shortage in the cyber workforce. “That’s an absurd number,” Coulson told members of the House Subcommittee on Homeland Security, Infrastructure Protection and Innovation. “If this was doctors and nurses, there would be a national outcry.”

U.S. in Crisis with Massive Shortfall of 500,000 Cyber Workforce Jobs

Tony Coulson, director of Cal State San Bernardino's Cybersecurity Center, testified before a congressional subcommittee on Thursday, to apprise all those in attendance that the nation is in a crisis situation of...
Learn how Hypori unleashes the power of secure mobility wherever your mission takes you from any endpoint device. With Hypori, you empower your users to perform classified work from any endpoint device without worrying about security, with zero footprint and guaranteed 100% separation.

Hypori Virtual Mobility Nominated in 2021 ‘ASTORS’ Awards Program

Hypori is a ground-breaking Enterprise Virtual Mobility solution designed for Government secure teleworkers in Homeland and Defense that lets Work From Home (WFH) users perform business tasks on their mobile devices...

S&T AI/ML Strategic Plan Nominated in 2021 ‘ASTORS’ Awards Program

Artificial intelligence and machine learning (AI/ML) is transformational technology that is affecting every segment of society and the economy. "As the science and technology advisor to the Department of Homeland Security (DHS),...

Can Your SOC Secure Kubernetes? Using Vuln Scanners, SIEM and EDR for Container Security

Guest OpEd by Gilad David Maayan, CEO and Founder of Agile SEO Kubernetes is an inseparable part of modern DevOps infrastructure. While it is extremely powerful and flexible, it also raises major...
The truth is hackers can compromise home security camera feeds, but there are ways to block spying eyes.

Security Camera Hacking: It Can Happen to You. Here’s How to Stop It

August 22, 2021 – In Breaking News – CNET Installing a Wi-Fi-connected security camera in your house won't necessarily bring a wave of hackers to your network -- but losing privacy thanks...
E-Request digitally transforms how emergency communications centers (ECCs) receive and process 911 audio evidence requests and share incident information with district attorneys, police investigators and other key stakeholders.

NICE Public Safety E-Request Nominated in 2021 ‘ASTORS’ Awards

NICE Public Safety, a Double Platinum 2020 'ASTORS' Homeland Security Awards Program Winner, is pleased to announce their new E-Request has been nominated to compete in the 2021 'ASTORS' Awards Program. As...

Konica Minolta: Solving Challenges for the Government Workplace

Guest Editorial by Chris Bilello, Vice President, Business Solutions Development at Konica Minolta Business Solutions In this evolving global climate, government organizations face many significant challenges. The ability to streamline business processes while...
Apple products, including iPhones, have been vulnerable since at least last February according to internet security watchdog group Citizen Lab, underscoring the fact that no smartphone can be completely trusted.

Apple Security Fix: Urging Immediate iOS Update for iPhones & iPads

Israel-based cyber surveillance company NSO Group has developed a tool to break into Apple iPhones, utilizing a never-before-seen technique that has been in place since last February, according to internet security...
Smartphones are a great source of productivity, but they are also one of the biggest internal attack vectors on the market today because they generate a constant stream of detailed data about the user even when those features are turned off.

Smartphones Are Putting Government Users at Risk

OpEd by Dr. Bill Anderson, President of CIS Mobile In theory, smartphones are a great source of productivity, combining mobile telephone and computing functions into a single unit that provides users with...