Trending Now
Vendor Spotlight
We Are at The Edge of Realizing the Potentials of Bug Bounties and Crowdsourced Security – Hackerone
More organizations are taking advantage of bug bounty programs to strengthen their security postures. It simply makes sense – crowdsource the best cyber talent at scale to find those security gaps before the bad actors find them, and exploit...
The Cloud in 2018: Trends in Cloud Security With 5nine
5nine's Vince Arneja talks to ITWatchIT about current trends in cloud computing, with a focus on security, operational efficiency and unity across platforms. 5nine offers end-to-end cloud management for Hyper-V, and the first and only agentless, multilayered security solution for Hyper-V and...
MasterPeace LauchPad Converts Ideas Involving Complex Technologies to Successful Businesses
Steve Horn, Founder and Chief Strategy Officer at MasterPeace Solutions talks about empowering engineers to build their own companies, through an approach that “incubates” an idea, nurturing it to become a success.
MasterPeace Solutions
MasterPeace Solutions consists of two business elements that...
Removal of Net Neutrality Will Create a High-Speed Lane for Those Who Can Pay – BeyondTrust
BeyondTrust’s Morey Haber addresses the use of legacy systems by federal agencies, repeal of net neutrality rules, shortage of cybersecurity experts and the WannaCry ransomware attack.
FCC Votes to Reverse Net Neutrality Rules
The removal of net neutrality by the FCC...
Autonomous Vehicles are a Huge Market for Data Analytics – Cloudera
Cloudera's Dave Shuman talks about the value of big data from autonomous vehicles, and using analytics to counter new and emerging cyber threats.
Autonomous Vehicles are a big Market for Data
There will be several areas where data can be collected and...
Files as Attack Weapons: Glasswall’s Strategy Focuses on ‘Known Good’ to Secure Documents
Glasswell CTO, Sam Hutton talks about using ‘known good’ to provide protection against document-based cyberattacks
Why Glasswall?
The key selling point of Glasswall is that we are looking for good, and are enforcing good within business documents. We are able to...
Security is an Afterthought for Most IoT Device Manufacturers – Akamai
Josh Shaul is the Vice President for web security at Akamai. He and his team are responsible for Akamai’s web security products, and they build the products that Akamai uses to protect their customers from attacks on the internet.
Akamai’s...
Virtru is Like a Spell Check for Security: We Take Privacy Very Seriously – Virtru CEO
John Ackerly is the cofounder, CEO of Virtru Corporation. He spent the earlier part of his career working as the lead policy adviser on technology issues at the White House, and Policy Director at the Department of Commerce. Ackerly...
ROMAD’s Genetic Sequencing of Malware Families Offers Unique Prevention and Detection Capabilities
Igor Volovich, the CEO and Co-Founder of ROMAD Cyber Systems talks about enabling genetic sequencing of entire malware families to deny cybercriminals the ability to exploit the inherent shortcomings of traditional security solutions.
Understanding the business of cybercrime is very important, said...
We Are Outnumbered and Outresourced by Hackers: Bug Bounties are Here to Stay – Bugcrowd CEO
Bug bounty programs are an increasingly popular way of discovering security bugs, with many organizations turning to this cost-effective model of crowdsourcing cybersecurity where they leverage the expertise of well-meaning hackers. The U.S. Department of Defense ran a pilot...
The Information Technology Infrastructure is Too Outdated to Keep Pace With Current Threats – MIRACL CEO
Undoubtedly, multifactor authentication solutions offer tremendous benefits to enterprises. The only problem is the complexity of the technology, and the variety of tools among various vendors. MIRACL recently launched its multifactor authentication as a service platform. It extends multifactor...
Just About Every Agency Has Failed With Regards to Securing Information: EIM Sensor CEO
EIM Sensor's Mark Judson explains best practices for data security
Cybersecurity is a real threat, whether you’re a Fortune 1000 company or government agency – the ability to secure your data is paramount, no matter what. Unfortunately, all you have...
IoT and Social Have a Huge Impact When it Comes to Security Within an Organization – Saviynt COO
Cloud Security
One of the things we have seen in the federal space, and taking into consideration FedRAMP requirements, is that government organizations want to have lean operations, especially when it comes to data centers. We have seen a lot...
Force3 Forges Ahead With Network Management in a Software-Defined Future
Force3 is an IT solutions provider, with an emphasis on the federal government. Our federal contracts grant us access to our customers, allowing us to deliver IT solutions to the government. We have differentiated ourselves with two things: software-defined networking, and...
Personalization Is The Future Of Content Management – Acquia
Acquia was founded by the inventor of Drupal, Dries Buytaert, and our business model is similar to other open source companies where we provide enterprise support and additional products, said Acquia's Federal Solutions Manager, Rohan Oswal.
Acquia Offers Security Products
Security...
Cisco Ups Its Stake In Web Conferencing By Extending WebEx To Federal Agencies
The global market for web conferencing is projected to reach US$3.9 billion by 2020, fueled by the rising demand for real-time collaboration among globally dispersed business enterprises and workforce. Cisco’s WebEx offers web collaboration solutions for both the private...
For BlackMesh, Scaling And Securing Sites Makes Business Sense As Demand For IaaS Soars
Cloud and infrastructure-as-a-service (IaaS) currently hold sway in the realm of IT, and with the growth in mobility, no other platform offers quite as much solutions to meet the rigorous demands.
According to Gartner, public cloud service revenue will...