When disaster strikes, public safety keeps working. So should your technology. Mark43's Alternate CAD is designed to serve as a backup to your community’s primary CAD, providing the modern technology needed to keep your agency operating and constantly connected.

Mark43 Returns to Compete in 2023 ‘ASTORS’ Homeland Security Awards

Mark43, a leading cloud-native public safety software company that took home the Gold for Best Public Safety Workforce Management in the 2021 'ASTORS' Homeland Security Awards Program, is pleased to announce its...
When employees are let go, sometimes they leave upset, angry, and disgruntled. These down-on-their-luck employees can threaten company IP and privileged information – especially if they are privy to sensitive and private company information. (Courtesy of NetSfere)

What Does Mass Layoffs & Angry Workers Mean for Your Cybersecurity?

Guest Editorial by Anurag Lal, CEO of NetSfere Rising inflation, reduced consumer spending, and over-staffing during the pandemic have left the tech industry with the difficult decision of laying off staff. As the...
If you’re struggling with custom interfaces, privacy issues, broken APIs, or meeting rooms expiring, learn how the experts at Cordoniq can deliver a customized video collaboration solution to meet these needs and more. (Courtesy of Cordoniq)

Cordoniq Newest Competitor in 2023 ‘ASTORS’ Homeland Security Awards

Cordoniq, a secure, smart enterprise video collaboration platform recently launched to address enterprise business needs beyond standard legacy video conferencing software and toward truly secure video collaboration solutions, is pleased to...
When it comes to the threat of corporate espionage and eavesdropping, some organizations aren’t listening. The troublesome aspect of Chinese spy balloons is that they can potentially be outfitted with cameras, radars, and radio devices. These radio devices can be utilized to infiltrate organizations via a number of wireless protocols, potentially giving them access to sensitive information, critical discussions, and more. Radio-based attacks are a constant threat with something as small as a compromised cell phone able to wreak havoc in the enterprise, let alone a high-tech spy balloon.

The Current State of Wireless (In)security, by Bastille CTO

Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is...
As Trusted Workforce 2.0 continues to roll out, there will be even more professionals within the government’s Continuous Vetting (CV) program, and more opportunities, for personnel to transfer between contracts. That’s good news for business – but bad news for security where paper-based systems and spreadsheets reign supreme. SIMS Software ClearanceJobs

SIMS a Returning ‘ASTORS’ Sponsor: ‘State of 2023 Facility Security Officer’

Behind every security clearance or classified program is a security officer maintaining that eligibility and keeping those classified programs safe. The good news is that security clearance reforms baked into Trusted Workforce...
keeper KSGC equips organizational IT administrators with visibility and control over password security practices across the entire organization on all devices, enabling them to enforce the use of strong, unique passwords, multi-factor authentication (MFA), role-based access control (RBAC), event logging, reporting, and other security policies. KSGC provisions with and integrates into any IT environment and identity stack.

Keeper Security Newest Competitor in 2023 Homeland Security Awards

Keeper Security, a leading provider of zero-trust and zero-knowledge cybersecurity software solutions that protect passwords, privileged access, secrets, and remote connections, is pleased to announce it's FedRAMP Keeper Security Government Cloud...
A successful cybersecurity attack can devastate a small business, leading to financial loss, reputational damage, and potential legal ramifications. (Courtesy of ChamberofCommerce.org)

The Import of Cybersecurity in Small Business – ChamberofCommerce.org

Cybersecurity refers to the practice of protecting digital assets, such as computer systems, networks, and data, from unauthorized access, theft, damage, or disruption. This involves implementing a range of measures, including technological...
“Customers will immediately benefit from seeing gaps in their public-facing infrastructure and through attack path mapping to see how an attacker can traverse the network from on-premises to cloud and cloud to on-premises,” explains Cymulate's CTO and Co-founder Avihai Ben-Yossef. ASM

‘ASTORS’ Champion Cymulate – Ups the Game on Exposure Management

Cymulate, a leader in cybersecurity risk validation and exposure management, and the 2022 Platinum 'ASTORS' Homeland Security Award Winner for Best Breach & Attack Simulation (BAS) Platform in their Cymulate Extended Security...

New Research Spotlights BEC Tactics, Other Emerging Security Trends

Guest Editorial by Ben Brigida, Director, SOC Operations, Expel While there’s no tried-and-true crystal ball, one of the more reliable ways to predict the future is to observe recent trends. As a security...
Hornetsecurity is proud to announce its next-generation Security Awareness Training, which helps better equip employees to counter cyber-attacks, has been Nominated in the 2023 'ASTORS' Awards Program.

Hornetsecurity Returns to Compete in 2023 ‘ASTORS’ Awards Program

Cyber criminals are constantly innovating, and attacks are on the rise: Hornetsecurity’s 2022 Ransomware Report found that 60% of attacks came from phishing attempts. Cybercriminals use increasingly sophisticated spear phishing attacks, a form...