Category: Cyber Security – American Security Today

SolarWinds SEM Nominated in 2021 ‘ASTORS’ Awards Program

The job of the technology professional is hard. Technology is pervasive, complex and always changing. End users can be demanding, and businesses need constant access to an ever-expanding ecosystem of applications and infrastructure. The expectations for IT performance and availability…

Rajant Recognized by ‘Philadelphia Inquirer’ as Best Employer

Read the original article: Rajant Recognized by ‘Philadelphia Inquirer’ as Best Employer Rajant Corporation, the provider of Kinetic Mesh® wireless networks headquartered in Malvern, Pennsylvania, and the Platinum Award Winner for ‘Best Wireless Network Security Solution’ in the 2020 ‘ASTORS’…

RangeForce & BCA to Create Cyber Career Advancement Opportunities

Read the original article: RangeForce & BCA to Create Cyber Career Advancement Opportunities RangeForce, a new competitor in the 2021 ‘ASTORS’ Awards Program which is revolutionizing cybersecurity training, has announced a new partnership with the Black Cybersecurity Association (BCA) to…

Infrastructure Intrusion: America Under Attack

Read the original article: Infrastructure Intrusion: America Under Attack Guest OpEd by Chris Risley, CEO at Bastille Networks It could have been worse. Much, much worse. On February 5th, 2021, the city of Oldsmar, Florida was targeted for a cyberattack.…

What Does the Future of DDoS Attacks Look Like?

Read the original article: What Does the Future of DDoS Attacks Look Like? Guest OpEd by MJ Shoer, SVP, Executive Director at CompTIA ISAO A DDoS attack is a malicious attempt to sabotage someone’s online business. It occurs when a…

Redefining Communications for Today’s Mobile Workforces

Read the original article: Redefining Communications for Today’s Mobile Workforces Guest OpEd by Chief Technologist Dave George Communicating with personnel was already a challenge for companies with workers in the field, widespread workforces in siloed divisions and office locations, or deskless…

Why Water Plants are So Vulnerable to Hackers

Read the original article: Why Water Plants are So Vulnerable to Hackers February 10, 2021 – In Breaking News – Fortune A hacker’s botched attempt to poison the water supply of a small Florida city is raising alarms about just…

Minimizing Cognitive Bias in Cybersecurity

Read the original article: Minimizing Cognitive Bias in Cybersecurity Guest OpEd by Margaret Cunningham, Principal Research Scientist, Forcepoint It is 7am, and ten minutes into the morning you have already dismissed the first round of notifications littering your screen. Respond,…

5 Common Accidental Sources of Data Leaks

Read the original article: 5 Common Accidental Sources of Data Leaks In cybersecurity and infosec, it’s common to assume that criminals are behind all data breaches and major security events. Bad actors are easy to blame for information leaks or…

World’s Largest Cruise Line Operator Suffers Ransomware Attack

Read the original article: World’s Largest Cruise Line Operator Suffers Ransomware Attack Carnival Corporation detected a ransomware attack that accessed and encrypted a portion of one brand’s information technology systems, and the unauthorized access also included the download of certain…

Thycotic Free Digital Toolkit Helps Secure Remote Worker Access

Read the original article: Thycotic Free Digital Toolkit Helps Secure Remote Worker Access Thycotic, provider of Privileged Access Management (PAM) solutions, and a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has released a free digital toolkit for…

5G Cyber Security: Threats and Possible Solutions

Read the original article: 5G Cyber Security: Threats and Possible Solutions Guest OpEd by Gilad David Maayan Digital transformation is sweeping over the world, demanding new and better solutions for connectivity, user experience, and communication. 5G is a new cellular networking…

Is Remote Working as Secure as it Needs to Be?

Read the original article: Is Remote Working as Secure as it Needs to Be? By Kayleigh Alexandra For well over a decade, remote working was an option that most businesses left in their back pockets. They knew it to be…

Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards

Read the original article: Singlewire Software Returns to Compete in 3rd ‘ASTORS’ Awards Singlewire Software, a leading provider of IP-based voice applications for emergency communication with mass notification capabilities, and Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards…

ManTech Returns to Compete in 2020 ‘ASTORS’ Awards Program

Read the original article: ManTech Returns to Compete in 2020 ‘ASTORS’ Awards Program Today, every facet of space, from complex ground stations to data transport facilities, to the spacecraft themselves, faces the same challenge: cyberattacks that can disable systems vital…

The Outpour of Personal Information and Cybersecurity

Read the original article: The Outpour of Personal Information and Cybersecurity Guest Editorial by Shahab Nafees Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to…

The Outpour of Personal Information and Cybersecurity

Read the original article: The Outpour of Personal Information and Cybersecurity Guest Editorial by Shahab Nafees Our lives have become all about better and faster connectivity. No matter where we are or what we are doing, we’re always connected to…

BeyondTrust Nominated in Third ‘ASTORS’ Awards Program

Read the original article: BeyondTrust Nominated in Third ‘ASTORS’ Awards Program According to the White House, strengthening the cybersecurity of federal networks, systems, and data is one of the most important challenges the United States faces as a nation. Controlling,…

How Federal Agencies Can Secure Data Services in the Cloud

Read the original article: How Federal Agencies Can Secure Data Services in the Cloud Guest Editorial by Gerry Gebel, VP of Business Development at Axiomatics As businesses continue their mass migration of data, applications, workflows and other business assets to…

Bricata Network Security Offers Support for MITRE ATT&CK®

Read the original article: Bricata Network Security Offers Support for MITRE ATT&CK® Bricata has released the latest version of its network security platform, featuring the addition of BZAR scripts (Bro/Zeek ATT&CK-based Analytics and Reporting) that enable security analysts to gain additional context…

SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards

Read the original article: SolarWinds Access Rights Manager Competes in 2020 ‘ASTORS’ Awards SolarWinds, a leading provider of powerful and affordable IT management software, and Multi-Award Winner for Four Consecutive Years in the Annual ‘ASTORS’ Homeland Security Awards Program, is pleased to…

Leveling Up Encryption for U.S. Federal Agencies

Guest Editorial by Walter Paley, VP of Communications for SafeLogic It’s 2020, and for folks working in the cryptography niche, that means it is time to address a convergence of complications. I don’t want to say that things were simple…

Leveling Up Encryption for U.S. Federal Agencies

Guest Editorial by Walter Paley, VP of Communications for SafeLogic It’s 2020, and for folks working in the cryptography niche, that means it is time to address a convergence of complications. I don’t want to say that things were simple…

Data Theorem Competes in 2020 ‘ASTORS’ Awards Program

Data Theorem, a leading provider of modern application security, is pleased to announce that API Discover and API Inspect have been nominated in the 2020 ‘ASTORS’ Homeland Security Awards Program for Best Application Security . Data Theorem’s API Discover and API…

Forescout eyeSegment for Enterprise Wide Network Segmentation

With the explosive growth of non-traditional endpoints on government networks, it is critically important to gain a consolidated view not only of all government-owned PCs, laptops, servers and mobile devices, but also connected contractor and guest devices, IoT endpoints, operational…

Ransomware Dashboard Tells If and Where Firms Vulnerable to Attack

RiskSense®, a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has announced an industry first. A new Ransomware Dashboard, RiskSense has developed automatically reveals all of an organization’s exposure to specific attacks, including the ransomware family name,…

Ransomware Dashboard Tells If and Where Firms Vulnerable to Attack

RiskSense®, a Gold Award Winner in the 2019 ‘ASTORS’ Homeland Security Awards Program, has announced an industry first. A new Ransomware Dashboard, RiskSense has developed automatically reveals all of an organization’s exposure to specific attacks, including the ransomware family name,…