NYPD Chief of Department Kenneth Corey at 'ASTORS' 2022

2022 ‘ASTORS’ a Hit in NYC: Honoring Homeland Security Winners (N-Sl)

In addition to Commission Bill Bratton joining the 2022 'ASTORS' Homeland Security Awards Ceremony and Banquet Luncheon, New York's Finest, New York City Police Department (NYPD) Chief of Department Kenneth Corey,...
Commissioner Bill Bratton accepts a 2022 'ASTORS' Excellence in Public Safety & Community Resilience Award at the 2022 'ASTORS' Awards Ceremony and Banquet Luncheon in New York City.

2022 ‘ASTORS’ a Hit in NYC: Honoring Homeland Security Winners (De-M)

In addition to DEAC Sabatino, AST was also joined by Legendary Police Commissioner William Bratton who spoke, as always, about his love for the City of New York, the Profession of...
Cutting-edge innovations in the transport industry such as cloud migration have transformed efficiency, paving the way for consumer ease – but they have also introduced a complex threat landscape where attackers have more places to hide. Darktrace

Darktrace Reveals Increased Cyber Incidents in U.S. Transport & Logistics

The increasing digitization of transportation networks allows organizations in the transport and logistics industry to optimize their operations, from scheduling to the transportation of passengers and goods, but the complex intersection...

Seraphic Brings Home the Gold in the 2022 ‘ASTORS’ Awards Program

Seraphic Security is pleased to announce its been named a Gold 'ASTORS' Award Winner in the 2022 ‘ASTORS’ Homeland Security Awards from American Security Today for its innovation in Cyber Security...
Protecting government agencies from software supply chain attacks—and interrupting the Cyber Kill Chain—requires a concerted effort. Let’s look at three key practices agencies can follow to better protect against the growing threat of supply chain attacks and help ensure the software they procure doesn’t serve as a threat vector. (Courtesy of SolarWinds)

3 Ways Govt IT Pros Can Prevent Software Supply Chain Attacks

Guest OpEd by Brandon Shopp, GVP, Product Strategy, SolarWinds Software supply chain hacks are on the rise. According to the 2022 Verizon® Data Breach Investigations Report, 62% of cyberattacks originate through an...
Each passing year sees more businesses and government agencies embrace the benefits of IoT infrastructures, yet, these benefits can come with an unseen threat in the form of RF attacks that may lead to high-level data breaches and foreign government espionage. As we move towards a more interconnected world, it’s imperative that CISOs and their security teams recognize the threat of RF attacks and take all necessary measures to plug their security gaps. (Courtesy of GBT Technologies)

Learn How RF Security Can Ensure Your IoT Safety

Guest Editorial by Dr. Danny Ritttman, Chief Technology Officer at GBT Technologies Government organizations and commercial businesses understand the need to protect themselves from malicious cyberattacks intent on stealing their trade secrets,...
The 2022 'ASTORS' Awards Ceremony and Exclusive Luncheon Banquet will be held on Wednesday, November 16th, 2022, from 12:00 pm through 2:30 pm at none other than the Jacob Javits Convention Center in New York City during ISC East!

Are You a 2022 ‘ASTORS’ Finalist or Honoree? Join Us to Celebrate in NYC!

It's time to receive the Recognition you and your organization deserve among your Industry-Leading Peers, and Government Colleagues at the 2022 'ASTORS' Awards Presentation Ceremony and Luncheon Banquet in New York...
SolarWinds

SolarWinds Worldwide Nominated in 7th Consecutive ‘ASTORS’ Awards

The job of the technology professional is hard. Technology is pervasive, complex and always changing. End users can be demanding, and businesses need constant access to an ever-expanding ecosystem of applications and infrastructure. The...
Application platforms like Interplay – a low-code AI platform developed by Iterate.ai – make all of this easier. This new type of application platform marries middleware connectivity with built-in containerization (leveraging Docker and Kubernetes), data layer abstraction, and robust security at all layers to provide a new type of application server that provides an environment for quick development and integration while also continuing the benefits that came from containerization.

The Emergence of Application Servers is Increasing Application Security

Guest Editorial by Brian Sathianathan, Dave Jenkins, and Marek Suscak of Iterate.ai Application Servers are re-emerging in the enterprise, and they are classified by analysts as App Platforms. The demand for faster...
There has been an explosion in human and machine identities with the rapid acceleration of major initiatives such as digital transformation, cloud migration and more. While the attack paths from internal and external threats have not changed, the complexity of managing cyber risks has magnified. (Courtesy of CyberArk)

CyberArk Returns to Compete in Fifth Annual ‘ASTORS’ Awards Program

Escalating numbers of high-profile breaches impacting federal entities and private organizations have revealed the depth and breadth of enterprises’ cybersecurity debt (a combination of expanding attack surfaces, rising numbers of identities,...