Stellar's Open XDR platform features enterprise-class NDR capabilities and correlates and analyzes that data with data from its SIEM, UEBA, and TIP functions to detect complex attacks before they can do real damage.

Stellar Open XDR Nominated for Two 2023 ‘ASTORS’ Cybersecurity Awards

In most situations, Network Detection & Response (NDR) tools alone are not enough to provide comprehensive security. The analysts must also be able to see logs, real-time traffic, and user behaviors...
‘ASTORS’ competitors who return year to year, establish a legacy of wins that span over years. Those are a special breed never satisfied but strive to excel each year to provide first responders, security industry professionals, and government practitioners with the capabilities and technologies to create a safer world for generations to come.

Establishing a Legacy of Wins in the Annual ‘ASTORS’ Awards Program

American Security Today’s Annual ‘ASTORS’ Awards, the preeminent U.S. Homeland Security Awards Program, now in its Eighth Year, recognizes industry leaders of Physical and Border Security, Cybersecurity, Emergency Preparedness – Management...
Mark43 Communities are grappling with an increase in violent crime. Learn how agencies can leverage technology to drive data-informed violence reduction strategies?

Mobility is a Necessity in Today’s Public Safety Software Environment

Guest Editorial by Matt Polega, Cofounder and Head of External Affairs at Mark43 In 2023, community members expect their local first responders to have the same mobile, modern technology that civilians use...
Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...
Learn about GRAYPATH, a software-defined, cloud-hosted, Distributed Virtual Network (DVN) that uses Spread Spectrum IP technology to provide unprecedented security, performance, and reliability.

Intelligent Waves’ Returns to Compete in Third Consecutive ‘ASTORS’

Intelligent Waves, a leading tech integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, is pleased to announce its GRAYPATH Next-Generation Cyber-Defense Solution has been...
When disaster strikes, public safety keeps working. So should your technology. Mark43's Alternate CAD is designed to serve as a backup to your community’s primary CAD, providing the modern technology needed to keep your agency operating and constantly connected.

Mark43 Returns to Compete in 2023 ‘ASTORS’ Homeland Security Awards

Mark43, a leading cloud-native public safety software company that took home the Gold for Best Public Safety Workforce Management in the 2021 'ASTORS' Homeland Security Awards Program, is pleased to announce its...
When employees are let go, sometimes they leave upset, angry, and disgruntled. These down-on-their-luck employees can threaten company IP and privileged information – especially if they are privy to sensitive and private company information. (Courtesy of NetSfere)

What Does Mass Layoffs & Angry Workers Mean for Your Cybersecurity?

Guest Editorial by Anurag Lal, CEO of NetSfere Rising inflation, reduced consumer spending, and over-staffing during the pandemic have left the tech industry with the difficult decision of laying off staff. As the...
If you’re struggling with custom interfaces, privacy issues, broken APIs, or meeting rooms expiring, learn how the experts at Cordoniq can deliver a customized video collaboration solution to meet these needs and more. (Courtesy of Cordoniq)

Cordoniq Newest Competitor in 2023 ‘ASTORS’ Homeland Security Awards

Cordoniq, a secure, smart enterprise video collaboration platform recently launched to address enterprise business needs beyond standard legacy video conferencing software and toward truly secure video collaboration solutions, is pleased to...
When it comes to the threat of corporate espionage and eavesdropping, some organizations aren’t listening. The troublesome aspect of Chinese spy balloons is that they can potentially be outfitted with cameras, radars, and radio devices. These radio devices can be utilized to infiltrate organizations via a number of wireless protocols, potentially giving them access to sensitive information, critical discussions, and more. Radio-based attacks are a constant threat with something as small as a compromised cell phone able to wreak havoc in the enterprise, let alone a high-tech spy balloon.

The Current State of Wireless (In)security, by Bastille CTO

Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is...