Encryption No organization should rely solely on encryption to protect data. You need a more holistic, layered approach, explains Forcepoint Global CTO Petko Soyanov

Chinese Researchers Say They Broke RSA Encryption. Will That Affect You?

Guest editorial by Petko Soyanov, Global CTO of Forcepoint Late last year, Chinese researchers claimed to use quantum computing to break an RSA public-key encryption algorithm. While many quantum experts expressed skepticism, the...
whether it’s lack of awareness, poor asset and device management, insufficient resources and personnel, working with cybersecurity firms that don’t adequately protect themselves, or neglecting to share information—the result is that organizations across a wide range of industries have become increasingly vulnerable to stealthier and more sophisticated methods of cyber espionage. hackers

How to Protect Yourself From Increasingly Sneaky Hacking Tactics

Guest Editorial by Dr. Brian Gant, Assistant Professor of Cybersecurity at Maryville University It turns out that an effective way for hackers to infiltrate networks is not by targeting those networks directly...
2023 OnSolve Global Risk Impact Report

2021 ‘ASTORS’ Champion Releases 2023 Global Risk Impact Report

OnSolve, a leading critical event management provider and, an 'ASTORS' Homeland Security Awards Champion for Four Consecutive years, has released its annual 2023 OnSolve Global Risk Impact Report, which found significant...
HUMAN's modern defense strategy is the foundation for a superior framework for combating tomorrow's cybersecurity threats today - by combining global visibility, network effect, and disruptions to defeat attackers with unmatched scale, speed, and precision.

HUMAN Security Newest Competitor in 2023 Homeland Security Awards

HUMAN Security, a cybersecurity company that protects organizations by disrupting digital fraud and abuse, is pleased to announce its Human Defense Platform has been Nominated to Compete in the 2023 'ASTORS'...
Learn about GRAYPATH, a software-defined, cloud-hosted, Distributed Virtual Network (DVN) that uses Spread Spectrum IP technology to provide unprecedented security, performance, and reliability.

Intelligent Waves’ Returns to Compete in Third Consecutive ‘ASTORS’

Intelligent Waves, a leading tech integrator that delivers mission-focused multi-domain operational expertise and innovation to the Government through high-impact technology solutions, is pleased to announce its GRAYPATH Next-Generation Cyber-Defense Solution has been...
When disaster strikes, public safety keeps working. So should your technology. Mark43's Alternate CAD is designed to serve as a backup to your community’s primary CAD, providing the modern technology needed to keep your agency operating and constantly connected.

Mark43 Returns to Compete in 2023 ‘ASTORS’ Homeland Security Awards

Mark43, a leading cloud-native public safety software company that took home the Gold for Best Public Safety Workforce Management in the 2021 'ASTORS' Homeland Security Awards Program, is pleased to announce its...
When employees are let go, sometimes they leave upset, angry, and disgruntled. These down-on-their-luck employees can threaten company IP and privileged information – especially if they are privy to sensitive and private company information. (Courtesy of NetSfere)

What Does Mass Layoffs & Angry Workers Mean for Your Cybersecurity?

Guest Editorial by Anurag Lal, CEO of NetSfere Rising inflation, reduced consumer spending, and over-staffing during the pandemic have left the tech industry with the difficult decision of laying off staff. As the...
Veracode, a leading provider of intelligent software security solutions, recently launched Veracode Fix, a new AI-powered product. Trained on Veracode’s proprietary dataset, Veracode Fix suggests remediations for security flaws found in code and open-source dependencies. (Courtesy of Veracode)

Securing Public Sector Software Throughout 2023 and Beyond

Guest Editorial by Chris Wysopal, Founder and CTO of Veracode As the year unfolds and the government’s digital transformation develops apace, networks’ attack surfaces continue to expand. Out of necessity, federal IT experts...
If you’re struggling with custom interfaces, privacy issues, broken APIs, or meeting rooms expiring, learn how the experts at Cordoniq can deliver a customized video collaboration solution to meet these needs and more. (Courtesy of Cordoniq)

Cordoniq Newest Competitor in 2023 ‘ASTORS’ Homeland Security Awards

Cordoniq, a secure, smart enterprise video collaboration platform recently launched to address enterprise business needs beyond standard legacy video conferencing software and toward truly secure video collaboration solutions, is pleased to...
When it comes to the threat of corporate espionage and eavesdropping, some organizations aren’t listening. The troublesome aspect of Chinese spy balloons is that they can potentially be outfitted with cameras, radars, and radio devices. These radio devices can be utilized to infiltrate organizations via a number of wireless protocols, potentially giving them access to sensitive information, critical discussions, and more. Radio-based attacks are a constant threat with something as small as a compromised cell phone able to wreak havoc in the enterprise, let alone a high-tech spy balloon.

The Current State of Wireless (In)security, by Bastille CTO

Guest Editorial by Brett T. Walkenhorst, Ph.D., CTO, Bastille From cell phones and Wi-Fi to wearables, peripherals, and IoT, the modern world is swimming in wireless devices, and their wireless data is...