Next-Gen Web App Protection Launched by Cayuga Networks (Video)

Organizations have focused security efforts on protecting the network perimeter with firewalls and IDS. However, recently some of the most damaging breaches at major banks and healthcare entities started at the application...

ICE Investigators Expose Darknet Criminals to the Light (Learn More)

The stark, white walls of the Cyber Crimes Center are a direct contradiction to the work that takes place within them. The Department of Homeland Security (DHS) U.S. Immigration and Customs Enforcement...

Claroty Competes in ASTOR Homeland Security Awards Program

Claroty possesses the right executive team, the right technology, at the right time to leverage the burgeoning, yet underserved critical infrastructure protection market. This represents the third time that vendors have attempted...

WatchDox in AST Homeland Security Awards Program

Connect people to the files they need to get work done, from anywhere on any platform or any device. Always be in full control, even after files are downloaded and shared with...

DHS S&T: Cybersecurity Needed for Autos, Too (Video)

Most people are familiar with the process of updating the software on their computer and mobile phone, but cyber components—and cybersecurity—are not limited to computers and smart phones. Today’s automobile is a...
Gurucul

Gurucul Risk Analytics in AST Homeland Security Awards (Video)

Gurucul is changing the way government entities and enterprises protect themselves against insider threats, account compromise, data exfiltration and external intruders, both on premise and in the cloud. Gurucul’s user behavior analytics...

EITC To Fight Internal & External Cyber Threats to DoD Networks

The federal government awarded Enlighten IT Consulting (EITC) its $3.3 million Cyberstrike contract. Under Cyberstrike, EITC has teamed with industry partners and government agencies charged with cyber threat awareness, reporting, and threat elimination...

10 Questions to Ask Before Buying Data Classification – Tim Upton

By Tim Upton, CEO, TITUS  Navigating the Buyer’s Journey for Data Classification With more data to manage than at any time in history, data classification helps organizations discover, identify, protect and analyze their...

MD5 Launches with Disaster Relief Hackathon in NYC

The MD5 National Security Technology Accelerator, a public-private partnership between the Department of Defense, New York University and a large network of top U.S. research universities, was officially launched at a...

SolarWinds Competes in AST Homeland Security Awards (Video)

SolarWinds Log & Event Manager (LEM) is a comprehensive security information and event management (SIEM) solution that delivers powerful real-time event correlation and analysis for immediate, actionable threat intelligence to thwart...