The Veridium Enterprise-Ready App allows organizations to deploy Multi-Factor Biometric Authentication to reduce cost while ensuring convenient, fast and secure identity verification with Veridium’s 4 Fingers TouchlessID biometric as well as native fingerprint and face.

Veridium App Competes in 2018 ‘ASTORS’ Awards Program (Videos)

Veridium, a leader in strong authentication solutions using biometrics instead of passwords and tokens, is pleased to announce the Veridium Authenticator App has been nominated to compete in the 2018 ‘ASTORS’ Homeland Security Awards...
Dramatic reductions in suicide attempts, assaults on both inmates and staff, better contact with family members of those incarcerated and more opportunities for both the inmates and the correctional facility make this program a win for all parties- inmates, correctional staff and the taxpayers.

Increasing Security & Connecting Jail Inmates with Loved Ones (See Video)

By Kelly Lindman, Director of Product Management and Customer Channels at GTL In correctional facilities nationwide, an inmate attempt to reach a loved one over the phone can be a time-consuming and...
Attivo Networks for ICS-SCADA

Attivo for ICS-SCADA in the 2018 ‘ASTORS’ Homeland Security Awards

Attivo Networks, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, is pleased to announce the company's ThreatDefend Deception and Response Platform has been nominated to compete in multiple categories of the...
CyberVigilant®

IndigoVision Competes in 2018 ‘ASTORS’ Homeland Security Awards

There are two types of companies in the world. Those that know they have been hacked, and those that don’t know it yet! With cyber-attacks constantly evolving it is important to ensure...
SolarWinds is revolutionizing the way federal IT manages their operations, providing federal customers – including nearly every civilian agency, DoD branch, and intelligence agency – with products that are easy to download, install, evaluate, and buy, while delivering the power to address any IT management problem on any scale.

The Govt’s IoT Investment Calls for an Equal Investment in Security

By Paul Parker, Chief Technologist, SolarWinds The U.S. Defense Department’s investment in the Internet of Things (IoT) has created an interesting paradox. On the one hand, the IoT has helped make ships, planes,...
Protect privileged accounts, prevent and contain breaches, and achieve compliance on Unix & Linux systems. PowerBroker enables you to eliminate credential sharing, limit root access, and ensure accountability – without hurting productivity.

BeyondTrust Competes in 2018 ‘ASTORS’ Homeland Security Awards

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...
DDoS attacks typically flood web servers with traffic to take them down and so-called ‘stressers' sell those attacks as a service, offering to take down customers' selected targets for a fee or providing direct access to a DDoS tool. According to investigators working on Operation Power Off, DDoS hits emanating from webstresser.org targeted banks, government institutions, police forces, schools and the gaming industry, investigators said.

Take Down of World’s Biggest ‘DDoS-For-Hire’ Site (Learn More, Video)

The administrators of the DDoS marketplace webstresser.org were arrested on 24 April 2018 as a result of Operation Power Off, a complex investigation led by the Dutch National High Tech Crime Unit and the...

NCL Cyber Education Competition Empowers Students to Reach High

From students to teachers, the benefits of participating in the National Cyber League (NCL) cybersecurity competition runs a wide gamut, and every season more people are realizing the appeal. Its virtual training ground helps...

Homeland Security: Top Cyber Risks are Mobile Apps & Users (See Video)

By Hillary Vaughn, Fox Business  Most mobile app users blindly trust that the apps they download from app stores are safe and secure. But that isn’t the case. Douglas Maughan, who heads up...
Drive threat prevention to unmatched levels. The artificial intelligence built into Intercept X is a deep learning neural network, an advanced form of machine learning, that detects both known and unknown malware without relying on signatures. Deep learning makes Intercept X smarter, more scalable, and higher performing than security solutions that use traditional machine learning or signature-based detection alone.

“The Dirty Secrets of Network Firewalls,” from Sophos (Multi-Video)

Sophos has announced the findings of its global survey, The Dirty Secrets of Network Firewalls, which revealed that IT managers cannot identify 45% of their organization’s network traffic. In fact, nearly one-in-four cannot...