The ranking system used to determine the top 25 most dangerous software errors was based on a formula that accounted for prevalence and severity. Weaknesses that are both common and can cause significant harm received a high score, while issues that are rarely exploited or have a low impact were filtered out. (Courtesy of DHS S&T)

Top 25 Most Dangerous CWE Software Errors, DHS S&T and Mitre

From smartphone games and personal email accounts to international banking and hospital records, software is everywhere, entertaining, boosting efficiency, and even saving lives. Unfortunately, for every new program developed, there is likely...
Over the past few years, Yubico has worked with Microsoft to help drive the future of passwordless authentication through the creation of the FIDO2 and WebAuthn open authentication standards.

‘ASTORS’ Finalist Yubico Reveals First Biometric YubiKey (See in Action)

Yubico, a Gold Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and a Finalist in the 2019 ‘ASTORS’ Homeland Security Awards Program, is excited to announce the long-awaited YubiKey Bio. It...
Implementing SecOps can be challenging, as it often requires not only a change in processes but also in how IT operations teams think.

4 SecOps Challenges and How to Overcome Them

Guest OpEd by Gilad David Maayan The competitive software market has created a paradox of conflicting demands. On the one hand, consumers have come to expect ever-faster software delivery, and this includes...
Automated tools used to enable mass surveillance of social media accounts is spiraling out of control, according to Freedom on the Net, which warns that nine out of every 10 internet users are being actively monitored online.

Is Your Social Media Being Watched? Probably, Says New Surveil Report

Governments around the world are increasingly using social media to manipulate elections and monitor their citizens, tilting the technology toward digital authoritarianism. As a result of these trends, global internet freedom declined...
How can you make sure your corporate data and valuable company information is safe and protected against data theft? Today’s MFPs (multifunctional peripherals) offer a huge range of functions and choices – which unfortunately goes along with a similarly wide range of potential security loopholes. Konica Minolta’s answer to this is the reliable protection of bizhub SECURE: together with you, we determine which of our industry-leading security standards are right for you. With this set of security measures, we give your Konica Minolta bizhub MFP and especially its HDD an extra level of protection to ensure that your data is more than secure – it’s bizhub SECURE!

Konica Minolta Scores Four Finalist Spots in 2019 ‘ASTORS’

Konica Minolta Business Solutions, a leader in delivering world-class business transformation solutions and technologies, and a Multi-Award Winner in the Annual 'ASTORS' Homeland Security Awards Program for Two Consecutive Years, is...
Code Dx Enterprise helps secure applications by providing an easy-to-use and affordable application vulnerability correlation and management solution, enabling organizations to overcome the obstacles they face that are deterrents to using application security testing (AST) tools.

Code Dx Selected a Finalist in 2019 ‘ASTORS’ Awards for Third Year

Code Dx, a Platinum Award Winner for two consecutive years in the Annual 'ASTORS' Homeland Security Awards Program, is pleased to announce that Code Dx Enterprise Application Vulnerability Management System, has...
According to the Department of Justice, in addition to site administrator, 337 site users have been arrested around the world with the help of law enforcement from 38 countries, and 92 individuals were arrested from the U.S alone, which includes Nikolas Bradshaw (at left), and Michael Gibbs (Courtesy of the Davis County Jail and Salt Lake County Jail). 

Worldwide Takedown of Darknet Child Pornography Site Funded by Bitcoin

Jong Woo Son, 23, a South Korean national, was indicted by a federal grand jury in the District of Columbia for his operation of 'Welcome To Video,' the largest child sexual...
(Courtesy of the USMC)

U.S. Marine Corps 1700 Cyberspace OccFld Compete in 2019 ‘ASTORS’

The Marine Corps has operated in cyberspace since it's early days. Capability and skills have been slowly accreting over time and or practitioners today rank among the very best. Growing a functional capability...
Canon Solutions America’s experts took MetLife Stadium event attendees on a journey through real world demonstrations of their Five Pillars of Security, a layered security approach encompassing device security, print security, document security, information security, and cybersecurity, to outline a business model that can be easily and efficiently implemented. (Courtesy of Canon Solutions America)

Canon Showcases Information Security at Special Event (Multi-Video)

Canon Solutions America, a wholly owned subsidiary of Canon U.S.A., a leader in digital imaging solutions, Double Award Winner in the 2018 ‘ASTORS’ Homeland Security Awards Program, and multi-product competitor in the 2019 ‘ASTORS’ Awards...
HydrantID will Expand Enterprise PKI Management Services for Network Security and IoT Devices, strengthening HID’s Identity and Access Management solutions portfolio to solve customer’s digital security challenges.

HID Global Acquires HydrantID Managed PKI for IoT Devices & More

HID Global®, a worldwide leader in trusted identity solutions, and a 2018 ‘ASTORS’ Homeland Security Awards Winner, has acquired HydrantID, a provider of management and automation services to secure enterprise organizations’ data, IT...