SyncDog Releases SentinelSecure Secure Mobile Container V 2.5

SyncDog, Inc., the leading ISV for mobile application containerization, today announced the version 2.5 release of its SentinelSecure™ containerized mobile workspace with a HIPAA-compliant configuration for healthcare-specific mobile workflows. SentinelSecure™ containerized workspace...

New Endpoint App Tool Provides Visibility into IT Security Risks

Thycotic, a competitor in the 2016 AST Homeland Security Awards ‘ASTORS’ competition, and a provider of privileged account management (PAM) solutions for more than 7,500 organizations worldwide, today announced its Endpoint Application Discovery Tool...

Calling All Amateur Pollsters! Predict and Win with SurveyMonkey

SurveyMonkey, the world’s leading online survey platform, today unveiled its Electoral College Map, an interactive map showing who is leading the presidential race in all 50 states based on exclusive polling...

The Security Challenge of e-Voting – Anthony Giandomenico

Guest Editorial by Anthony Giandomenico, Senior Security Strategist and Office of the CTO at Fortinet Countries where open elections occur have often developed arcane rules and processes for casting, collecting, and...

BeyondTrust PowerBroker in AST Homeland Security Awards (Video)

According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling, monitoring, and auditing...

Pryme BT Headset in AST Homeland Security Awards (Video)

Mobile communications products are only as good as the accessories that optimize them. Hands-free wireless communication is becoming a safety necessity in the most demanding fields, including law enforcement, government, and security. Pryme...

IoT Devices to Blame for Big Internet Attack (Learn More – Video)

By Steven Melendez, Fast Company On Friday, a series of massive distributed denial of service attacks disrupted access to major internet services including GitHub, Twitter, Spotify, and Netflix. The attackers apparently used tens...

EventTracker in ‘ASTORS’ Homeland Security Program (Video)

Cyber criminals are becoming more sophisticated in their approaches to information theft. There is a misconception by enterprises that they need to have large budgets and advanced technologies and solutions to maintain...

Next-Gen Web App Protection Launched by Cayuga Networks (Video)

Organizations have focused security efforts on protecting the network perimeter with firewalls and IDS. However, recently some of the most damaging breaches at major banks and healthcare entities started at the application...

ICE Investigators Expose Darknet Criminals to the Light (Learn More)

The stark, white walls of the Cyber Crimes Center are a direct contradiction to the work that takes place within them. The Department of Homeland Security (DHS) U.S. Immigration and Customs Enforcement...