NICE to Drive Digital Transformation for Nassau NY Police & DA’s Office

NICE, a world leader in providing both cloud and on-premises enterprise software solutions for law enforcement agencies, and a Multiple Award Winner in the Annual 'ASTORS' Homeland Security Awards Program for...
As part of this effort Commissioner Bratton explained that Verizon has invested over $80 million to enhance its network, and its network engineers have been hard at work for more than two years to ensure the Verizon network, already the premier network in south Florida, is ready for Super Bowl LIV.

Super Bowl LIV Security & Bill Bratton on Verizon’s $80M Ramp Up

Public safety agencies have been planning for years to ensure the stadium, associated sites and events leading up to Super Bowl LIV are protected and connected, in a collaboration that requires...
Joseph Carson Thycotic

Can PAM Coexist with the Zero Trust Security Model? Yes says Thycotic

By Joseph Carson, Chief Security Scientist (CSS) & Advisory CISO at Thycotic What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the...

Microsoft Exposes 250 Million Customer Records: What to Do

January 1, 2020 – In Breaking News – CNN Microsoft exposed nearly 250 million customer-service and customer-support records on the web for anyone to see. Security researchers working with Comparitech discovered the unprotected data, which consisted...
New Winner in the the Annual 'ASTORS' Awards Program, Gallagher Security offers comprehensive security and business risk management solutions for large and small organizations throughout the world, addressing key issues of security and risk management.

‘ASTORS’ Winner Gallagher & Convergint Enter Global Partnership

Gallagher, a global security technology manufacturer, and a New Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, along with Convergint Technologies, have entered into a partnership that will...
How can you make sure your corporate data and valuable company information is safe and protected against data theft? Today’s MFPs (multifunctional peripherals) offer a huge range of functions and choices – which unfortunately goes along with a similarly wide range of potential security loopholes. Konica Minolta’s answer to this is the reliable protection of bizhub SECURE: together with you, we determine which of our industry-leading security standards are right for you. With this set of security measures, we give your Konica Minolta bizhub MFP and especially its HDD an extra level of protection to ensure that your data is more than secure – it’s bizhub SECURE!

Konica Minolta Honored with Four 2019 ‘ASTORS’ Security Awards

Konica Minolta Business Solutions U.S.A., Inc., a Multiple-Award Winner in both the 2018 and 2017 'ASTORS' Awards Program, is pleased to announce that Konica Minolta has been awarded four new 2019...
On October 2, the FBI issued a high-impact cyber-attack warning in response to attacks on state and local government targets. This warned that health care organizations, industrial companies, and the transportation sector were also being targeted.

New Orleans Declares State of Emergency After Cyber Attack (Video)

December 14, 2019 – In News – Forbes The City of New Orleans has suffered a cybersecurity attack serious enough for Mayor LaToya Cantrell to declare a state of emergency. The attack started...
Ransomware is one of five major trends predicted to dominate cyber security next year, some are threat oriented while others are inward looking and focus on defensive measures.

5 Trends Will Dominate Cybersecurity in 2020, by Dr. Srinivas Mukkamala

Willy Sutton (an American bank robber listed on the FBI's Ten Most Wanted Fugitives list, who stole an estimated $2 million over the course of his forty-year robbery career,) famously said...
Brinqa Cyber Risk Services were built for security; transforming security, context and threat data into knowledge-driven insights that empower organizations to own their cyber risk.

Brinqa Wins for Best Cyber Security Risk Mgmt Solution in 2019 ‘ASTORS’

The enterprise technology infrastructure has undergone significant changes in the last few years which has driven by the push for digital transformation; and the emergence and rapid adoption of new infrastructure technologies...
The ranking system used to determine the top 25 most dangerous software errors was based on a formula that accounted for prevalence and severity. Weaknesses that are both common and can cause significant harm received a high score, while issues that are rarely exploited or have a low impact were filtered out. (Courtesy of DHS S&T)

Top 25 Most Dangerous CWE Software Errors, DHS S&T and Mitre

From smartphone games and personal email accounts to international banking and hospital records, software is everywhere, entertaining, boosting efficiency, and even saving lives. Unfortunately, for every new program developed, there is likely...