Bad actors are targeting governments, schools, and other public institutions with extra venom. Ransomware is proving to be such a problem for the public sector primarily because of the rise of third-party cloud channels: social media tools, messaging apps, and collaboration platforms.

To Defeat Ransomware Threats, Public Sector Must Secure Cloud Channels

Guest Editorial by Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber Most organizations will suffer at least one ransomware attack in any given year. The average attack creates costs of over $730,000....
While not being able to quickly access emails or social media posts can be annoying to a general consumer, wireless connectivity becomes critical when police and fire departments, security personnel and medical professionals need access to many types of data, video, images and more in in real-time. 2020 ’ASTORS’ Competitors Skywire Networks and Siklu, is uniquely qualified to bring immediate high-speed connection to highly congested conditions – in terms of the density of buildings in the end point areas (at an average of 30 stories) and in terms of a crowded and noisy radio transmissions environment.

Pandemic Response – How to Set up Temporary Gigabit Wireless Access Networks

Implementing a wireless network to establish or expand broadband communications services in emergency situations (health, weather, natural disaster related or other) can be a tricky endeavor. Requirements include replacing the capacity lost...
As attacks have grown in complexity, the need for defenders to employ effective automation has also increased, and cybersecurity teams have sought to respond accordingly by investing in tools that help eliminate the manual work associated with incident detection, analysis, and response.

Using Advanced Threat Detection to Enhance Security Orchestration, Automation and Response

Guest Editorial by Carolyn Crandall, Chief Deception Officer at Attivo Networks, a Returning Premier Sponsor for 2020 'ASTORS' Awards Cybercrime is always evolving, and as technology becomes more advanced, so too do...
As the latest expansion to the ThreatDefend™ Detection and Response platform, the Informer adds in-depth, and often hard-to-assemble views of the attacker’s activity to accelerate intelligence-driven response and remediation.

Attivo Networks Returns to Compete in 2020 ‘ASTORS’ Awards Program

Attivo Networks, a leader in deception for cybersecurity threat detection, and a Platinum Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's ThreatDefend Platform with Informer UI,...
The recently updated Forescout Device and Visibility Control Platform offers a unique, agentless approach to network security, enabling government agencies to see all of these devices on their networks.

Forescout Returns to Compete in 3rd ‘ASTORS’ (Learn More, Multi-Videos)

Forescout Technologies, a leader in device visibility and control, and a Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's Forescout Device and Visibility...
In addition to work culture changes brought by the shift to remote work, hackers are leveraging people’s fear and uncertainty to launch a wide range of attacks on remote workers.

Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide

Guest Editorial by Eddie Segal The number of remote workers grew substantially since the World Health Organization officially declared Covid-19 a pandemic on March 11. Within a few weeks, an estimated 16...

Securing Endpoints is a Top Concern in Reducing Attack Dwell Times

Attivo Networks®, a leader in deception for cybersecurity threat detection, Triple Winner in the 2019 'ASTORS' Homeland Security Awards Program, and a multiple product competitor in the 2020 'ASTORS' Awards Program,...
5g

5G Cyber Security: Threats and Possible Solutions

Guest OpEd by Gilad David Maayan Digital transformation is sweeping over the world, demanding new and better solutions for connectivity, user experience, and communication. 5G is a new cellular networking standard, built for...
Working remotely, you can forget your authentication details (particularly when using multi-factor authentication), send a link to the wrong person, click on an ad for something fake, have your online activity traced, or even see your laptop or smartphone stolen, which makes training very important.

Is Remote Working as Secure as it Needs to Be?

By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be technically viable, and accepted some of the...
Semperis ADFR

Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program

While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans. Almost...