A family in South Sudan used Facebook to auction off their 16 yo daughter as a child bride, and Facebook only noticed 2 weeks later. According to children's rights organization Plan International, the girl was bid on by five men, some of whom were reportedly high-ranking South Sudanese government officials, and reminiscent of 'Slave Markets'

Child Bride Auctioned on Facebook in ‘Barbaric Use of Technology’ (Video)

November 20, 2018 - In Breaking News - CNN Facebook has come under fire for a "barbaric use of technology" that allowed the sale of a child bride to be held on...
As the defense sector continues investing in connected devices, thereby increasing the complexity of its networks, it’s creating additional access points for hackers to exploit. It may also be making it more challenging for federal IT professionals to lock their agencies’ virtual doors, monitor their networks, and keep data protected. (The National Cybersecurity and Communications Integration Center (NCCIC))

Arming Against Attack: Three Strategies to Fight Foreign Hackers

By Paul Parker, Chief Technologist, Federal and National Government, SolarWinds As we move closer to the United States midterm elections, cybersecurity has become a hot topic of conversation. From Facebook to the Department...
Unmatched scalability and performance makes Axiomatics Policy Server the preferred choice for implementing Attribute Based Access Control in many global enterprises and government agencies.

Axiomatics Federal Named a Finalist in 2018 ‘ASTORS’ Awards (Videos)

Axiomatics Federal, the leader in fine-grained dynamic authorization for customers and partners of the federal government, is delighted to announce Axiomatics' Policy Server has been named a Finalist in the 2018 'ASTORS' Homeland...
Attivo Launches Counterintelligence; Bolsters Current Threat and Adversary Intelligence Functionality for Offense-driven Countermeasures

Attivo Networks Makes Deception Technology Deceptively Simple (Learn More, Multi-Video)

Attivo Networks®, Triple-Award Winner in the 2017 ‘ASTORS’ Homeland Security Awards Program, a Finalist in the 2018 'ASTORS' Awards, and a leader in deception for cyber security threat detection, includes new advanced capabilities that...
CyberArk’s Privileged Account Security Solution provides a multi-layered security solution that includes privileged password management, session recording, least privilege enforcement and privileged data analytics to help organizations defend against advanced persistent threats and insider threats.

Cyber Hygiene: A Programmatic Approach to Improving Security

By Kevin Corbett, Director of U.S. Federal Business, CyberArk Government agencies and departments face a wide range of security challenges – and they have a lot at risk. Just consider the U.S. Office...
Designed to support video surveillance and security deployments of 500TB or more, the platform provides the performance, resiliency, scalability and ease of use that is required for large scale environments at a lower cost than any other enterprise solution.

Pivot3 Sees Over 50% Growth in 2018, Named 2018 ‘ASTORS’ Award Finalist

Pivot3, a hyperconverged infrastructure (HCI) performance and technology leader and a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, has announced the company experienced more than 50-percent growth in bookings...
Fortanix SDKMS, a Finalist in the 2018 'ASTORS' Homeland Security Awards Program, uniquely delivers key management and cryptography services to any environment, any cloud while ensuring the customer remains in complete control of their keys and data.

Fortanix & Alibaba Launch SDKMS Runtime Encryption Key Mngmt

Fortanix, a leader in Runtime Encryption®, and a Finalist in the 2018 ‘ASTORS’ Awards Program, is partnering with Alibaba Cloud, the cloud computing arm of Alibaba Group, to integrate its Self-Defending Key Management Service™...

Mapping Apps are Endangering Special Operators, Anger US Troops

By Susan Crabtree, the Washington Free Beacon U.S. special operators and other troops have been using advanced war-fighting applications for hand-held devices that contain software weaknesses that render them vulnerable to hacking...
NG Firewall delivers enterprise-grade cybersecurity features in a package that is easy to purchase, configure, deploy and maintain for state and local government, educational institutions,  nonprofit organizations as well as SMBs.

Untangle Goes for 2nd Consecutive Win in 2018 ‘ASTORS’ Awards (Video)

Untangle, a leader in comprehensive network security for small-to-medium business (SMB), and a Winner in the 2017 'ASTORS' Homeland Security Awards Program, is pleased to announce NG Firewall v14.0 has been nominated to...
The CDM Program was designed to help government teams identify and prioritize cybersecurity risks and enable cyber personnel to quickly mitigate these problems.

Feds Weigh In on Impact of CDM Program, Forcepoint Survey Explores

Forcepoint, a global leader in cybersecurity and a Finalist in the 2018 ‘ASTORS’ Homeland Security Award Program, has released the results of its new Federal CDM Survey, which explores how the U.S....