Rajant Corporation's Kinetic Mesh® Wireless Mesh Networks Serve as the Backbone of ESG’s Digital Seismic Recorder.

Rajant Partners to Carry Underground Mining Microseismic Data to Surface

Rajant Corporation, the provider of Kinetic Mesh® wireless networks, and a Platinum Award Winner in the 2020 'ASTORS' Homeland Security Awards Program recently Nominated in the 2021 'ASTORS' Awards Program, has...
Versa Networks

Versa’s 5G WAN Edge Products for Complete SASE Services to the Edge

Versa Networks, a leader in secure access service edge (SASE), and the Newest Competitor in the 2021 'ASTORS' Homeland Security Awards Program, has launched the industry’s first 5G-native products for the...
There are many applications, and fiber optic sensing is being used worldwide to enhance the security of critical facilities and infrastructure and to strengthen public safety. For example, it is being deployed to protect infrastructure, such as railways, bridges, tunnels, borders, airports, power stations and pipelines.

Enhancing Critical Facilities Security While Enhancing Public Safety

Kent Wardley, the Chairman of the Fiber Optic Sensing Association who is half-way through his year’s tenure, also marks his 10-year anniversary at bp Launchpad company Fotech in 2021, where he...
SolarWinds IT Trends Report 2021: Building a Secure Future examines how technology professionals perceive the evolving state of risk in today’s business environment following internal impact of COVID-19 IT policies and exposure to external breaches

New Ops for Managing Risk Driven by Internal & External Security Threats

SolarWinds, a leading provider of simple, powerful, and secure IT management software, and Multiple 2020 'ASTORS' Award Winner, with Multiple-Products Nominated to compete in the 2021 'ASTORS' Awards Program, has  released...
Apple products, including iPhones, have been vulnerable since at least last February according to internet security watchdog group Citizen Lab, underscoring the fact that no smartphone can be completely trusted.

Apple Security Fix: Urging Immediate iOS Update for iPhones & iPads

Israel-based cyber surveillance company NSO Group has developed a tool to break into Apple iPhones, utilizing a never-before-seen technique that has been in place since last February, according to internet security...
Commit’s complete and comprehensive engineering powerhouse of resources and proprietary Flexible R&D methodology helps transform its clients’ technology visions into high-quality products while reducing costs and improving time-to-market.

Commit Acquires Israeli Tech Firm ITSoft to Bolster ‘Cloud of People’

Commit, a leading global tech services company focused on custom software and IoT solutions, is expanding through the acquisition of ITSoft, an Israeli-founded tech firm that provides software development services around...
E-Request digitally transforms how emergency communications centers (ECCs) receive and process 911 audio evidence requests and share incident information with district attorneys, police investigators and other key stakeholders.

NICE Public Safety E-Request Nominated in 2021 ‘ASTORS’ Awards

NICE Public Safety, a Double Platinum 2020 'ASTORS' Homeland Security Awards Program Winner, is pleased to announce their new E-Request has been nominated to compete in the 2021 'ASTORS' Awards Program. As...
Tony Cole is a former army cyber operator with more than 35 years’ experience in cybersecurity and today is the Chief Technology Officer at Attivo Networks responsible for strategy and vision.

Attivo Executive’s Experience Helps to Shape Modern Network Protection

Guest OpEd by Tony Cole, Chief Technology Officer, Attivo Networks With attackers increasingly targeting government agencies and contractors, a background in homeland security is a handy thing to have—and my homeland security...
In 2020, the world changed in unexpected and mostly, unanticipated ways. Schools were closed, sports were canceled and just about everything we understood and took for granted changed. What did not change then or now is the need to have informed conversations about the threats to safety always, and the need to have access to resources that are easy to understand and easy to apply. Developing comprehensive plans for awareness, preparedness, response, and recovery are the first steps-based on knowledge not out of fear. (Courtesy of PWPORG)

3 Minutes to Preparedness: 6 Steps to Cyber Hygiene

By PWPORG, a 501(c)(3) built by law enforcement and security industry practitioners and educators to provide educational resources to kids, families and communities on safety and emergency preparedness. Foundational Best Practices STEP ONE:...
Smartphones today are with us everywhere… including the workplace and classified meetings. And therein lies the problem explains Chris Risley, CEO at Bastille Networks. Cell phones infected with spyware show no signs of compromise, giving attackers complete access to email, even encrypted email and messages, plain text messages, photographs, videos, recordings, locations, and notes stored on the phone.

I Spy With My Little… Phone? Yes, It Can Happen to You.

Guest OpEd by Chris Risley, CEO at Bastille Networks The recent revelations surrounding the Pegasus Spyware and its ability to compromise mobile phones should have all government agencies and commercial enterprises on...