Active Cypher: Empowering Enterprises with Impermeable File Protection and Unprecedented Power

Active Cypher: Empowering Ente...

Data is the backbone of any organization, an invaluable source of vital information that drives crucial business decisions and goals. Even though data is the lifeblood of an enterprise, numerous compa

Read More
'Argoscope' Detelix Software: Preventing Online Frauds using the capabilities of Israel Defence Force elite intelligence unit approach.

'Argoscope' Detelix Software: ...

Online financial transactions are becoming a norm each passing day and consumers are increasingly at risk citing safe processing of their transactions. At a time where online transactions are accentua

Read More
Ultra Electronics, 3eTI and Milestone Systems partner to bring best-in-breed physical security to DOD

Ultra Electronics, 3eTI and Mi...

3eTI Partners with Milestone to Elevate its Perimeter Security Management Platform for Federal Customers  Nashville TN – February, 25, 2019 - Ultra Electronics, 3eTI announces it is now

Read More
The Modern Cybersecurity Problem

The Modern Cybersecurity Probl...

We are in the era of the connected vehicle. Connected cars are here to stay, and autonomous vehicles are fast approaching. One forecast goes as far as predicting 117 million new connected vehicles wil

Read More
SudoLynx: Committed to Making Cyber Security Compliance Easy and Affordable

SudoLynx: Committed to Making ...

The U.S. Government is making cyber security compliance mandatory for all business’ interested in future contracts, as defined by NIST Pub 800-171.  For the Department of Defense, that dead

Read More
Hacker House: Empowering and Protecting Global Enterprises in the Cyber-Crime Era

Hacker House: Empowering and P...

The exponential rise of connected devices and critical dependence on digital infrastructure has led information technologies to proliferate every part of our lives. While this trend has made our lives

Read More
Octopus System: Provider of integrated and automated cybersecurity solutions helping unify disparate security devices into one platform.

Octopus System: Provider of in...

Organizations these days depend on several business relations in order to receive expert and trusted solutions to ensure their business continuity. Similarly, in the cyber world, as the security indus

Read More
BAI Security: Leading the Security Auditing and Compliance Bandwagon

BAI Security: Leading the Secu...

Prior to 2017, industries ranging from film production to healthcare witnessed a record-breaking surge in cyber-attacks.  State-sponsored attacks used brute force tactics that resulted in embarra

Read More
CSPi's ARIA SDS platform to transform the cybersecurity world

CSPi's ARIA SDS platform to tr...

Cybersecurity technology and methods are struggling to catch up with the way organizations build and deploy critical applications today. There is a need for a better approach to protect applications a

Read More
Cybersecurity: Securing Personal Information

Cybersecurity: Securing Person...

Technology has come a long way. The advancement of technology has paved the way for much more development in the fields of medicine, transportation, economics, finance, and many more. Along with the m

Read More
Cyber security is failing society

Cyber security is failing soci...

Cyber security is failing society.The unsustainable level of cyber-crime, cyber espionage, and cyber war is a serious issue with the potential to drastically impact the fabric of our society. 

Read More
How cybercriminals hacking the electrical grid could become a grim reality in the not-so-distant future

How cybercriminals hacking the...

It''s no exaggeration to say that without access to electricity, almost every developed nation on earth would grind to a halt. A well running, and well protected, electrical grid is crucial fo

Read More
What can your barista teach us about security solutions?

What can your barista teach us...

Millions of people all over the world rely on coffee for a functioning work day. This is, to say the least, stating the obvious. People''s accepted addiction to coffee is the subject of a multi-billio

Read More
It's the Place Where Everyone Knows Your Name

It's the Place Where Everyone ...

Cheers was a popular television show based on characters that stopped by the bar in Boston named “Cheers.” The bartender knew their names and what each wanted to drink and where they would

Read More
Why Every Organization Needs to Be in the Cybersecurity Business

Why Every Organization Needs t...

Don’t read this post, instead take action on cybersecurity right now It’s a widely believed view by leaders that their organization is either one that has already experienced a cyber-

Read More
The Holy Grail of Cyber Prevention

The Holy Grail of Cyber Preven...

With the malware variant WannaCry still wreaking havoc across the globe, most business leaders are finding themselves discussing Cybersecurity within their organization. As these types of

Read More
Don't let the lights go out - Cybersecurity readiness of Electric Grids

Don't let the lights go out - ...

The U.S. Energy Department's landmark Quadrennial Energy Review warned that a widespread power outage caused by a cyber-attack could undermine "critical defense infrastructure" as wel

Read More
Cyber-security and Privacy, 2020

Cyber-security and Privacy, 20...

Today We live in an era of ever-increasing cyber security threats and data breaches. As security professionals we know that it is not whether our systems have been compromised as much as it is w

Read More
Creating a Culture of Cybersecurity

Creating a Culture of Cybersec...

The rise in corporate cyber-attacks costs businesses billions of dollars per year. From startups to large publicly-traded corporations, it is rare that a day goes by without another story of a cyberse

Read More