News Article | April 17, 2017
XCube R&D Inc, a leader in massively parallel data management and analytics and software infrastructure for automotive manufacturers and ADAS suppliers to accelerate the development of autonomous vehicle programs announced today the appointment of Michael Mark to its Board of Directors. For more information about XCube, visit us at www.x3c.com Michael Mark brings extensive knowledge and experience to XCube having served on numerous boards including as Chairman of Progress Software from 2006-2013. He earned a B.S. in Mathematics from MIT and began his career by co-founding Intercomp, which was sold to Logicon, as well as Cadmus Computer Corporation, which was sold to Apple Computer. Since then he has been involved in personally mentoring and investing in companies such as Stonyfield Farm Yogurt (sold to Groupe Danone), Netegrity (sold to Computer Associates), Kurzweil Educational Technologies (sold to Cambium Learning), Constant Contact, and Corbus Pharmaceuticals. Mr. Mark finds XCube compelling because "Each and every autonomous vehicle on the road today generates about 7.2 terabytes of data per hour. Such huge masses of data, distributed around the globe, produce unprecedented requirements for data organization, retrieval and analysis. I became excited in XCube when I saw how intelligently and economically their technology managed this data and the arrays of machines processing it." Welcoming Michael Mark, XCube's Chairman and CEO Satish Jha said that "XCube is delighted to have the benefit of the guidance of Michael Mark who is a legend in mentoring start-ups in the Boston area." Mikael Taveniku, XCube's founder and President expresses "Michael Mark has been deeply involved in driving the computing technologies from the very beginning and his insights and knowledge will be an invaluable addition to the XCube team."
News Article | May 13, 2017
WannaCry - first of its kind "RansomWorm" to traverse the Globe must be stopped according to SnoopWall SnoopWall, Inc., the global leader in breach prevention, today is announcing this consumer advisory not only as a warning about what may be the worst piece of ransomware traversing the globe and locking up computers in most major countries but how to stop it. According to SnoopWall, Inc.'s CEO and as disclosed on their website, today, the United Kingdom's National Health Service, www.NHS.uk was hit with a massive ransomware attack that demands $300 in bitcoins for each system it infects - in the NHS this could total $500,000 USD in ransomware demands so far, due to malware propagation across more than one thousand Windows computers. According to the FBI.gov, the WannaCry attack has since spread across the globe to more than 74 countries and hitting additional targets such as the Russian Interior Ministry and US-based FedEx. According to Gary S. Miliefsky, The Shadow Brokers leaked a bunch of NSA hacking tools onto the Internet. One of these tools is called EternalBlue, which, according to experts, is a perfect exploit for creating a Windows worm - software that attacks a Microsoft windows vulnerability and then installs on the next vulnerable windows system as it traverses the Internet. WannaCry is the first piece of ransomware ever to propagate using this kind of worm technology. According to Gary S. Miliefsky, the CEO of SnoopWall, Inc., a cybersecurity expert, "this is a watershed moment in cyber crime history, when automated exploitation of vulnerabilities in an operating system are using a worm to spread ransomware. This is the first, not the last, ransomworm." As shown on a map from another independent security researcher, MalwareTech, a large number of U.S. organizations have been hit. Source: https://intel.malwaretech.com/botnet/wcrypt According to the researcher, so far, at least 1,600 have been infected with WannaCry in America, compared to 11,200 in Russia and 6,500 in China as it continues to spread. Miliefsky continued, "WannaCry opens the door for similar exploits on other operating systems such as SmartPhones and all Internet of Things (IoT) devices. Because these devices are sold with vulnerabilities and backdoors, expect worm-like ransomware outbreaks to spread to them next." If you have not yet been exploited, move quickly to close the hole: WannaCry leverages a hole, Microsoft fixed 2 months ago. If you have not installed Windows Security Update MS17-010, please take the time to install the proper patch for your version of Windows and do it quickly: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx Any computing device that connects to the internet should be frequently hardened. The latest patches should be installed. Contact manufacturers of your 'smart' equipment and demand security by design and frequent security patches to avoid this kind of risk. While WannaCry spreads by exploiting vulnerabilities, most ransomware has spread through SpearPhishing attacks. SnoopWall has provided a simple training video to avoid these kinds of attaches. Training link: https://www.youtube.com/watch?v=TiBlXZWotxY Simply put, don’t’ click links and don’t download attachments. Make sure you can trust the source before you do so. Do daily backups and test them when you can. If you know how to use encryption, it's best to encrypt important information before it gets hacked or stolen. About Gary Miliefsky Gary is the CEO of SnoopWall, Inc. and a co-inventor of the company's innovative breach prevention technologies. He is a cyber-security expert and a frequently invited guest on national and international media, commenting on mobile privacy, cyber security, cyber crime and cyber terrorism, also covered in both Forbes and Fortune Magazines. He has been extremely active in the INFOSEC arena, he is an active member of Phi Beta Cyber Society (http://cybersecurityventures.com/phi-beta-cyber/), an organization dedicated to helping high school students become cyber security professionals and ethical hackers. He founded and remains the Executive Producer of Cyber Defense Magazine. Miliefsky is a Founding Member of the US Department of Homeland Security (http://www.DHS.gov), the National Information Security Group (http://www.NAISG.org) and the OVAL advisory board of MITRE responsible for the CVE Program (http://CVE.mitre.org). He also assisted the National Infrastructure Advisory Council (NIAC), which operates within the U.S. Department of Homeland Security, in their development of The National Strategy to Secure Cyberspace, as well as the Center for the Study of Counter-Terrorism and Cyber Crime at Norwich University. Previously, Gary has been founder and/or inventor for technologies and corporations sold and licensed to Hexis Cyber, Intel/McAfee, IBM, Computer Associates and BlackBox Corporation. Gary is a member of ISC2.org and is a CISSP®. Learn more about him at http://www.snoopwall.com/media and http://www.garymiliefsky.com/ About SnoopWall SnoopWall is the world's first breach prevention security company delivering a suite of network, mobile and app security products as well as cloud-based services protecting all computing devices from prying eyes and new threats through patented counterveillance cloaking technology. SnoopWall secures mission critical and highly valuable confidential information behind firewalls with our award-winning patented NetSHIELD appliances and with WinSHIELD on windows and MobileSHIELD on Google Android and Apple iOS mobile devices with next generation technology that detects and blocks all remote control, eavesdropping and spying, based on the patented AppSHIELD SDK. SnoopWall's software products and hardware appliances are all proudly made in the U.S.A. Visit us at http://www.snoopwall.com and follow us on Twitter: @SnoopWallSecure.
News Article | May 10, 2017
SANTA CLARA, CA--(Marketwired - May 10, 2017) - Cohesity, the pioneer of hyperconverged secondary storage, today announced that Todd Palmer has been hired to serve as vice president of worldwide channels to continue building the company's partner network to keep pace with exponential revenue growth. With his proven ability to multiply revenue through channel programs, Palmer will use his long-term, trusted relationships with the partner community to expand Cohesity's channel presence and further advance its world-class Revolution Partner Program for resellers. Click to Tweet: .@Cohesity Expands Worldwide Channel Program with New Vice President of Worldwide Channels Todd Palmer: https://ctt.ec/0isfn+ In this new role, Palmer will be responsible for growing the company's footprint in the Americas, EMEA and APAC, bringing Cohesity's radically efficient secondary storage platform to more mid-sized and large enterprise customers. Palmer joins Cohesity from Palo Alto Networks, where he served as vice president of channel sales in the Americas, and will report directly to Cohesity's recently announced vice president of worldwide sales, Mark Parrinello. "Cohesity has experienced incredible growth in North America and Europe, and we knew it would be very important to bring someone with Todd's experience and talent to continue to build out our channel sales program," Parrinello said. "All of our business is ultimately executed through the channel, and Todd's expertise at building and promoting leveraged selling models with partners will be invaluable as we continue to bring on bigger customers from across the globe. Prior to joining Cohesity, Palmer was directly responsible for building a comprehensive channel coverage model, spanning distributors, regional partners, national partners and direct market resellers (DMRs) at Palo Alto Networks. During his tenure, overall revenue grew more than two-fold, driven largely by the company's national partners and DMRs. Before that, Palmer worked at NetApp, again doubling revenues over his five-year tenure by expanding DMR and national reseller relationships. Palmer's international experience includes serving as vice president of worldwide sales at Endace and vice president of worldwide channel programs at Computer Associates. "Cohesity already has a strong channel program that is expanding at an impressive rate," Palmer said. "This is a fantastic opportunity for me to help build momentum for the leader in hyperconverged secondary storage by taking this channel program to the next level." About Cohesity Cohesity makes your data work for you by consolidating secondary storage silos onto a hyperconverged, web-scale data platform that spans both private and public clouds. Enterprise customers begin by radically streamlining their backup and data protection, then converge file and object services, test/dev instances and analytic functions to provide a global data store. Cohesity counts many Global 1000 companies among its rapidly growing customer base. CRN named Cohesity a Top 25 Disrupter and one of the 10 Coolest Hyperconverged Products of 2016. For more information, visit www.cohesity.com and follow @cohesity on Twitter.
Computer Associates | Date: 2014-08-12
A method, system and program product comprise communicating, to a server, a users request for a report comprising a name associated with a portfolio of patent applications, a first value indicating a time frame, and a second value indicating a period of time. The server is operable for using the name for extracting patent application data from databases to a second database and filtering the extracted data using the first value. The filtered data is organized by offices of filing, patent families, classifications, and status. Costs for patent applications associated with the filtered data are determined using the second value. Filing patterns are determined using the offices of filing and the patent families. Filing activity are determined using the classifications. Times to grant for the offices of filing are determined. At least one report is generated and received over the network.
Computer Associates | Date: 2013-10-14
A system and method is provided for generating a one-time passcode (OTP) from a user device. The method includes providing a passcode application and a cardstring defined by a provider account to the user device. The passcode application is configured to generate a passcode configured as a user OTP for the provider account, using the cardstring. The cardstring is defined by at least one key camouflaged with a personal identification number (PIN). The key may be camouflaged by modifying and encrypting the modified key under the PIN. The key may be configured as a symmetric key, a secret, a seed, and a controlled datum. The cardstring may be an EMV cardstring; and the key may be a UDKA or UDKB. The cardstring may be an OTP cardstring, and the key may be a secret configurable to generate one of a HOTP, a TOTP, and a counter-based OTP.
Agency: Department of Health and Human Services | Branch: National Institutes of Health | Program: SBIR | Phase: Phase I | Award Amount: 149.10K | Year: 2015
DESCRIPTION provided by applicant Our research is focused on the use of advanced ontological models as a foundation for computerized Clinical Decision Support CDS systems that link hospitalized patient data routinely captured in electronic medical records EMRs with medical knowledge to effectively influence timely awareness and treatment choices by clinicians Our phase goal is to demonstrate how our advanced CDS technology has the potential to improve preventable mortality outcomes associated with sepsis in ICU patients We distinguish two types of CDS algorithms available today for detecting and or predicting sepsis using EMR data evidence based andquot knowledge drivenandquot detection algorithms and data driven andquot predictiveandquot algorithms based on machine learning ML techniques Recent studies indicate currently available CDS tools do not reduce risk of death in hospitalized patients We believe this may be because diseases such as sepsis are time sensitive complex syndromes and also due to the challenges of computerized reuse of unstructured EMR data Our sepsis ontology models this complexity to a provide enhanced knowledge driven sepsis risk stratified cohort classifications that help guide interventions b support accurate natural language processing NLP of free text clinical notes to enhance real time sepsis risk detection and c improve the accuracy of data driven prediction models when used in conjunction with ML training algorithms Our CDS is based on proprietary cluster computing technology we call andquot VFusionandquot designed to efficiently deal with the generation and practical use of large application domain specific ontologies Our sepsis ontology employs a family of upper level ontologies combined with granular evidence based domain ontologies configurable rule sets e g first order logic based and required components of reference terminologies Our research will use openly available ICU patient data to establish statistical detection prediction performance metrics using this ontology in modes of use as a knowledge based screening tool to detect subtle signs of sepsis in individualized hospitalized patients used in conjunction with ML to improve data driven predictive performance We will measure specificity sensitivity and positive negative predictive power of our hybrid ontology based technology to demonstrate dramatically improved performance over existing CDS algorithms In Phase II we plan a retrospective demonstration with a much larger sample of patients to include non ICU patients in collaboration with a major healthcare system Our product vision is an early inpatient sepsis detection algorithm with high accuracy embodied as a andquot plug in applicationandquot compatible with any modern EMR platform in use at a client hospital effective in both ICU and non ICU care settings PUBLIC HEALTH RELEVANCE Even with the advent of powerful new computer medical record technologies used in hospitals the risk of death has not been reduced in hospitalized patients The goal of this research effort is to combine medical record systems with advanced cognitive technologies that are commonly used today in products such as the iPhone andquot Siriandquot to improve clinician awareness and decisions that will dramatically reduce preventable mortality Our initial use case will be the management of sepsis the leading cause of death in non coronary intensive care units in hospitals
Computer Associates | Date: 2013-02-08
A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machines online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.
Agency: NSF | Branch: Standard Grant | Program: | Phase: Secure &Trustworthy Cyberspace | Award Amount: 30.29K | Year: 2015
This project supports 10-15 students for their travel to attend the 2015 Annual Computer Security Applications Conference (ACSAC). ACSAC, which just celebrated its 30th year, is a top-tier academic security conference that attracts averages about 250 highly skilled security professionals and student attendees per year. ACSAC has carved a unique role as a security conference equally attended by academia, industry, and government. In addition to the technical papers, the conference program will include keynotes by distinguished speakers, tutorials, case studies, panels, a poster session, and works-in-progress talks. This project will support attendance by students, with particular attention given to those have a paper, poster, or works-in-progress submission accepted at the conference. In so doing, it will help to provide cybersecurity students with a broad perspective of the discipline.
Agency: NSF | Branch: Standard Grant | Program: | Phase: Secure &Trustworthy Cyberspace | Award Amount: 50.00K | Year: 2014
The Learning from Authoritative Security Experiment Results (LASER) workshop series focuses on learning from and improving cyber security experiment results. The workshop explores both positive and negative results, the latter of which are not often published. The workshop strives to provide a highly interactive, collegial environment for discussing and learning from experiment design, issues, and outcomes. Ultimately, it seeks to foster a dramatic change in the paradigm of cyber security research and experimentation, improving the overall quality and reporting of practiced science.
Agency: NSF | Branch: Standard Grant | Program: | Phase: Secure &Trustworthy Cyberspace | Award Amount: 29.94K | Year: 2016
This project provides travel support for 10-15 students attending the 2016 Annual Computer Security Applications Conference (ACSAC). ACSAC, which is celebrating its 32nd year, is a top-tier academic security conference that attracts averages about 250-300 highly skilled security professionals and student attendees per year. ACSAC has carved a unique role as a security conference equally attended by academia, industry, and government. In addition to the technical papers, the conference program will include keynotes by distinguished speakers, tutorials, case studies, panels, a poster session, and works-in-progress talks. This project will help to groom the next generation of cybersecurity professionals by facilitating interaction of students with experts in the field.