Ben Smith, CTO with Netwitness, explains How Distributed Workforces and Decentralized Security Policies Leave Government Networks Vulnerable sase

How SASE Adoption Today – Can Resolve Tomorrow’s Threats

Guest Editorial by Ben Smith, CTO, Netwitness Cyberattacks and cyber warfare have only worsened as geopolitical tensions rise and digital proxy battles rage. But while these threats have remained ubiquitous for more...
The New Rajant Sparrow is an IP67 Kinetic Mesh® network device ideally suited for use in industrial IoT applications and light-duty vehicles.

Rajant Sparrow for Heavy-Duty & Light-Duty Vehicle Applications

RAJANT Corporation, the pioneer of Kinetic Mesh® wireless networks, and Multi-Award Winner in the 2022 ‘ASTORS’ Homeland Security Awards Competition, recently Nominated in the 2023 'ASTORS' Program, debuted its new Sparrow BreadCrumb® on...
Fūsus delivers the industry's only completely technology-agnostic RTCC platform used by law enforcement agencies as the backbone of their public safety and criminal intelligence operations.

Fūsus Competes in Fourth ‘ASTORS’ Homeland Security Awards

Fūsus, the company that took Platinum in the 2022 'ASTORS' Homeland Security Awards Program for Best Investigation/ Surveillance/Detection Solution, is pleased to announce its Real-Time Crime Center in the Cloud (RTC3)...
Josh Stephens, BackBox CTO

BackBox Launches Cisco CIS Benchmark Automation Templates

BackBox, a market leader in network automation, security, and management solutions that took Platinum for Best Network Automation Solution in the 2022 'ASTORS' Homeland Security Awards Program, is pleased to announce it...
Stellar's Open XDR platform features enterprise-class NDR capabilities and correlates and analyzes that data with data from its SIEM, UEBA, and TIP functions to detect complex attacks before they can do real damage.

Stellar Open XDR Nominated for Two 2023 ‘ASTORS’ Cybersecurity Awards

In most situations, Network Detection & Response (NDR) tools alone are not enough to provide comprehensive security. The analysts must also be able to see logs, real-time traffic, and user behaviors...
‘ASTORS’ competitors who return year to year, establish a legacy of wins that span over years. Those are a special breed never satisfied but strive to excel each year to provide first responders, security industry professionals, and government practitioners with the capabilities and technologies to create a safer world for generations to come.

Establishing a Legacy of Wins in the Annual ‘ASTORS’ Awards Program

American Security Today’s Annual ‘ASTORS’ Awards, the preeminent U.S. Homeland Security Awards Program, now in its Eighth Year, recognizes industry leaders of Physical and Border Security, Cybersecurity, Emergency Preparedness – Management...
Mark43 Communities are grappling with an increase in violent crime. Learn how agencies can leverage technology to drive data-informed violence reduction strategies?

Mobility is a Necessity in Today’s Public Safety Software Environment

Guest Editorial by Matt Polega, Cofounder and Head of External Affairs at Mark43 In 2023, community members expect their local first responders to have the same mobile, modern technology that civilians use...
Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...
Learn about GRAYPATH, a software-defined, cloud-hosted, Distributed Virtual Network (DVN) that uses Spread Spectrum IP technology to provide unprecedented security, performance, and reliability.

Intelligent Waves’ Returns to Compete in Third Consecutive ‘ASTORS’

Intelligent Waves, a leading tech integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, is pleased to announce its GRAYPATH Next-Generation Cyber-Defense Solution has been...