As the latest expansion to the ThreatDefend™ Detection and Response platform, the Informer adds in-depth, and often hard-to-assemble views of the attacker’s activity to accelerate intelligence-driven response and remediation.

Attivo Networks Returns to Compete in 2020 ‘ASTORS’ Awards Program

Attivo Networks, an leader in deception for cybersecurity threat detection, and a Platinum Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's ThreatDefend Platform with Informer UI,...
The recently updated Forescout Device and Visibility Control Platform offers a unique, agentless approach to network security, enabling government agencies to see all of these devices on their networks.

Forescout Returns to Compete in 3rd ‘ASTORS’ (Learn More, Multi-Videos)

Forescout Technologies, a leader in device visibility and control, and a Platinum Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's Forescout Device and Visibility...
In addition to work culture changes brought by the shift to remote work, hackers are leveraging people’s fear and uncertainty to launch a wide range of attacks on remote workers.

Does Remote Work Expose You to Security Vulnerabilities? A Remediation Guide

Guest Editorial by Eddie Segal The number of remote workers grew substantially since the World Health Organization officially declared Covid-19 a pandemic on March 11. Within a few weeks, an estimated 16...

Securing Endpoints is a Top Concern in Reducing Attack Dwell Times

Attivo Networks®, a leader in deception for cybersecurity threat detection, Triple Winner in the 2019 'ASTORS' Homeland Security Awards Program, and a multiple product competitor in the 2020 'ASTORS' Awards Program,...
5g

5G Cyber Security: Threats and Possible Solutions

Guest OpEd by Gilad David Maayan Digital transformation is sweeping over the world, demanding new and better solutions for connectivity, user experience, and communication. 5G is a new cellular networking standard, built for...
Working remotely, you can forget your authentication details (particularly when using multi-factor authentication), send a link to the wrong person, click on an ad for something fake, have your online activity traced, or even see your laptop or smartphone stolen, which makes training very important.

Is Remote Working as Secure as it Needs to Be?

By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be technically viable, and accepted some of the...
Semperis ADFR

Semperis a New Competitor in the 2020 ‘ASTORS’ Awards Program

While back-up, business continuity and disaster recovery can be different for every company, involving numerous strategies and tactics, there is no doubting the need for solutions to support over-arching BDR plans. Almost...
Data Theorem Offers API Security Solutions that Automate Continuous API Security Analysis and Vulnerability Inspection

Data Theorem Named ‘Cool Vendor’ in Gartner’s 2020 “API Strategy” Report

Data Theorem, a leading provider of modern application security, and a competitor in the 2020 'ASTORS' Homeland Security Awards Program, has been recognized in the 2020 list of Cool Vendors in...
Gurucul provides a comprehensive view of user/entity behaviors and detects risky outliers using a library of advanced machine learning (ML) models and identity-centric data science, artificial intelligence (AI), anomaly detection and predictive risk-scoring algorithms to identify abnormal behaviors and activities indicative of security threats. (Courtesy of Gurucul)

Gurucul Nominated to Compete in 4th ‘ASTORS’ Awards Program

Gurucul, a Winner in the 2016, 2018 and 2019 'ASTORS' Awards Program, is pleased to announce the Gurucul Unified Security & Risk Analytics has been nominated to compete in the 2020...
Protect privileged accounts, prevent and contain breaches, and achieve compliance on Unix & Linux systems. PowerBroker enables you to eliminate credential sharing, limit root access, and ensure accountability – without hurting productivity.

BeyondTrust Nominated in Third ‘ASTORS’ Awards Program

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...