LRAD Competes in AST Homeland Security Awards (Learn More)

Safeguarding the Public & Protecting Officers Increasing demands on law enforcement agencies have stretched resources to the limit and the tools they use must be portable, rugged, easy to use, cost effective,...

Simple Steps for Internet Safety, by the FBI

In today’s digital world, online safety should be of paramount concern for all individuals and organizations because the threats posed by cyber criminals can’t be ignored. And to counteract these threats, there...

SolarWinds Competes in AST Homeland Security Awards (Video)

SolarWinds Log & Event Manager (LEM) is a comprehensive security information and event management (SIEM) solution that delivers powerful real-time event correlation and analysis for immediate, actionable threat intelligence to thwart...

MD5 Launches with Disaster Relief Hackathon in NYC

The MD5 National Security Technology Accelerator, a public-private partnership between the Department of Defense, New York University and a large network of top U.S. research universities, was officially launched at a...

10 Questions to Ask Before Buying Data Classification – Tim Upton

By Tim Upton, CEO, TITUS  Navigating the Buyer’s Journey for Data Classification With more data to manage than at any time in history, data classification helps organizations discover, identify, protect and analyze their...

EITC To Fight Internal & External Cyber Threats to DoD Networks

The federal government awarded Enlighten IT Consulting (EITC) its $3.3 million Cyberstrike contract. Under Cyberstrike, EITC has teamed with industry partners and government agencies charged with cyber threat awareness, reporting, and threat elimination...
Gurucul

Gurucul Risk Analytics in AST Homeland Security Awards (Video)

Gurucul is changing the way government entities and enterprises protect themselves against insider threats, account compromise, data exfiltration and external intruders, both on premise and in the cloud. Gurucul’s user behavior analytics...

DHS S&T: Cybersecurity Needed for Autos, Too (Video)

Most people are familiar with the process of updating the software on their computer and mobile phone, but cyber components—and cybersecurity—are not limited to computers and smart phones. Today’s automobile is a...

Claroty Competes in ASTOR Homeland Security Awards Program

Claroty possesses the right executive team, the right technology, at the right time to leverage the burgeoning, yet underserved critical infrastructure protection market. This represents the third time that vendors have attempted...

WatchDox in AST Homeland Security Awards Program

Connect people to the files they need to get work done, from anywhere on any platform or any device. Always be in full control, even after files are downloaded and shared with...