SolarWinds Goes for Hat Trick in 2018 ‘ASTORS’ Awards (Multi-Video)

Threats to IT networks continue to accelerate and evolve. While enterprising hackers from external sources test the robustness of network security parameters, internal threats in the form of careless and malicious insiders...
When it Comes to Cyberattacks, Half Protected is Half Not (Image courtesy of Centrify)

Centrify Recognized in 3 Research Reports by Forrester Research Inc.

Centrify, a leader in securing hybrid enterprises through the power of identity services, and Platinum Winner for Best Cyber Security for ID Mgmt & Access Control in the 2017 ‘ASTORS’ Homeland Security Awards, is...
Now, it’s easier than ever to collect and manage evidence from the community. With Axon Citizen, the public safety portal, you can invite individual witnesses – or an entire community – to submit photos and videos of an incident directly to your agency.

Fort Worth PD Kicks Off Agency-Wide Trial of Axon Citizen (See in Action)

The Fort Worth Police Department (FWPD) is rolling out an agency-wide field trial of Axon Citizen, a public evidence submission tool from Axon, a global leader in connected law enforcement technologies. Fort Worth, a Major Cities Chiefs...

COMSAT Demos the Power of Preparedness During CA Wildfires

COMSAT, a U.S.-based satellite connectivity provider, has successfully demonstrated the power of preparedness in reaction to the recent wildfires in California. The Thomas Fire, reported to be the largest in California state...
One piece of security infrastructure that is sometimes overlooked is application whitelisting, which adds a valuable security layer to prevent increasingly sophisticated cyber attacks.

Layered Security Cyber Infrastructure Can Deter Government Breaches

By Heman Mehta, Director of Product Management, Faronics Corporation The Office of Personnel Management (OPM) breach of 21.5 million plus records was perhaps the most notorious hack of government agencies, but it...
Canon U.S.A. uniFLOW, imageRUNNER ADVANCE, imageWARE Secure Audit Manager Express were Honored as the 2017 ‘ASTORS’ Platinum Award Winner for Best Access Control & Authentication Solution

Canon U.S.A. Wins Again, Accolades from Keypoint Intelligence Buyers Lab

In its continued commitment to delivering advanced office solutions to enterprises, Canon U.S.A., a leader in digital imaging solutions, celebrates the receipt of multiple industry accolades awarded to the Company by...
FFRI yarai's multi-layered FIVE core protection engines and hybrid security approach provides in-depth endpoint defense.

FFRI Yarai in 2018 ‘ASTORS’ Awards Program (Multi-Video, Demonstration)

FFRI, a leading provider of Next Generation Endpoint Security solutions, is pleased to announce that FFRI yarai has been nominated to compete in the 2018 ‘ASTORS’ Homeland Security Awards for Anti-Malware...

Feds Bust $530M Infraud Cybercrime Ring: 36 Global Indictments Unsealed

A federal indictment was unsealed on Wednesday charging 36 individuals for their alleged roles in the Infraud Organization, an Internet-based cybercriminal enterprise engaged in the large-scale acquisition, sale, and dissemination of...
Consumer Reports found that Samsung and Roku Smart TVs were vulnerable to hacking through a web-based attack. (Pictured here, the Samsung UN49MU8000 TV)

Your Smart TV May Be Collecting More Info than you Realize (Video)

By Consumer Reports Consumer Reports has found that millions of smart TVs can be controlled by hackers exploiting easy-to-find security flaws. The problems affect Samsung televisions, along with models made by TCL and...

Old Logins are White Hot on the Dark Market

By Jeff Bohren, Chief Software Engineer at Optimal IdM Employee turnover creates vulnerabilities that are hard to control Employers have faith that most of their workers are trustworthy. So when an employee falls for a...