Wilmington, DE, United States

Information Assurance

ia-corp.com
Wilmington, DE, United States
SEARCH FILTERS
Time filter
Source Type

News Article | May 23, 2017
Site: www.prweb.com

As company executives become increasingly aware of their organization’s cybersecurity vulnerabilities, they learn that network defense, data security, secure coding, professional cybersecurity expertise, and safe computing practices are necessary for their survival. Community and technical colleges are responding to this workforce shortage by infusing cybersecurity into their curriculum thanks to the Community College Cyber Summit (3CS). This one-of-a-kind conference is the resource community and technical colleges use to obtain accurate information that jumpstarts their cybersecurity courses. The fourth annual 3CS will be held June 28 to 30, at Prince George’s Community College and National Harbor, Maryland. This national conference is unique as it caters to cybersecurity education at community colleges. Faculty and administrators receive training to adequately instruct students in cybersecurity and also serves as a resource to implement cybersecurity into curricula. This summit gives community colleges leverage to best support the needs of critical infrastructure sectors such as banking services, emergency services, transportation, water systems, and energy. "3CS is a place where instructors can learn about emerging cybersecurity threats, by those who know WHAT to teach to cybersecurity students, technicians or workers in other disciplines,” said Dr. Bob Spear, chair of 3CS. “It’s where participants can fashion new answers with colleagues and meet the cybersecurity professionals who can help!” The 3CS has four tracks for participants to follow: new to cybersecurity, experienced in cybersecurity and CAE2Y aspirants, cybersecurity across the curriculum, and student track. On the morning of June 28, students and recent graduates can attend a 3CS Pre-Summit Job Fair, new this year. For more information or to register, visit my3CS.org. About Community College Cyber Summit:  The Community College Cyber Summit (3CS) is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), Cyber Security Education Consortium (CSEC), Broadening Advanced Technological Education Connections (BATEC), and Advanced Cyberforensics Education (ACE) Consortium, which are all funded by the National Science Foundation (NSF). The outcomes of 3CS leverage community college cybersecurity programs across the nation by introducing the latest technologies, best practices, curricula, products, and more. To learn more, visit my3CS.org.


A distinguished panel of experts, professionals, and technology leaders including board members of Enterprise Security Magazine has chosen and included R&K Cyber Solutions LLC in the Top 10 list. “We take pride in honoring R&K Cyber Solutions LLC as one among the 10 companies that are featured in the Vulnerability Management Special Edition,” said Michael Brown, Managing Editor of Enterprise Security Magazine. R&K Cyber Solutions LLC strives to be a leader in cyber security innovation, while maintaining the highest quality of our training, products, and services. It provides Intrusion Detection, Incident Response, Malware Reverse Engineering, and Information Assurance (IA) services, as well as Certified Security processes to the U.S. Federal Government (Civilian, Department of Defense (DoD), and Intelligence Community (IC)) and to customers in selected commercial markets. About R&K Cyber Solutions LLC Incorporated in 2010, R&K Cyber Solutions LLC (R&K) is a leading and award winning provider of Computer Network Defense (CND) Services, Enterprise Information Technology (IT) Management, and Application Development. It is a privately owned company dedicated in providing Computer & Network Security solutions to the clients. For more info, visit: rkcybersolutions.com Enterprise Security Magazine—is a technology magazine that gives information about the security solutions, which helps organizations to get adapted to the radical changes that are taking place in their information security infrastructure. A panel of experts, technology leaders and board members of the Enterprise Security Magazine has decided the “Top 10 Vulnerability Management Solution Providers 2017” and shortlisted the best vendors and consultants in the Vulnerability Management arena. For more info, visit: http://www.enterprisesecuritymag.com


Receive press releases from The Knowledge Group: By Email DiliVer's CEO Neil Kleinberg and LP3's CEO Scott Lawler to Speak at The Knowledge Group’s Cybersecurity in M&A Transactions: Negotiating the Deal with Due Diligence New York, NY, April 17, 2017 --( For further details, please visit: https://www.theknowledgegroup.org/webcasts/risk-and-compliance/business-and-corporation-risk-and-compliance/cybersecurity-in-ma-transactions-negotiating-the-deal-with-due-diligence-live-webcast About Neil Kleinberg As founder and CEO, and inventor of its intellectual property, Mr. Kleinberg is responsible for leading DiliVer’s Corporate organizational unit, which includes overseeing its performance and growth functions. With 25 years of experience as an entrepreneur, executive, management consultant, and lead technology engineer, his expertise spans the commercial and government sectors, including the information technology, financial services, national security, healthcare, judicial, public safety, and telecommunications industries. In his previous role, Mr. Kleinberg led corporate development buy-side and sell-side M&A activities at enterprise software market leader ASI, and participated in more than 20 initiated transactions, including a private equity raise. About Scott Lawler Mr. Lawler provides leadership as well as subject matter expertise to LP3 customers in the areas of Enterprise Architecture, Information Assurance, Security Architecture, and Enterprise Management Operations. Mr. Lawler served for 21 years in the Air Force beginning his career in F-15 avionics, attending Officer Training School, and becoming a Communications Officer. During Desert Storm, he was commander of the 54th Combat Communications Squadron. He served at Air Combat Command providing leadership in enterprise architecture, computer networking, and information assurance. Standing up the Department of Defense Computer Emergency Response Team, Mr. Lawler led a team delivering network security services supporting 2.2 million computers. He was a key leader in activating the Joint Task Force-Global Network Operations (JTF-GNO) creating a mission critical global showplace and center of technical excellence. Mr. Lawler drafted and hand-carried the memo for DEPSECDEF signature that created the Information Assurance Vulnerability Alert (IAVA) program. He developed industry leading vulnerability management as well as tactical and strategic IA analysis techniques. Abstract Traditionally, M&A due diligence is solely focused on the traditional risks areas. However, due to the increasing developments and advancements in technology, asset due diligence evolved dramatically and now includes software escrow and open source software. With this, cybersecurity has become one of the most vital parts of the M&A process for any deal and transaction especially those which involve targets with any kind of online presence. In this live Webcast, a panel of thought leaders brought together by The Knowledge Group will provide the audience with an in-depth analysis of the fundamentals as well as all the important cybersecurity issues in M&A transactions. Speakers will also present best strategies in negotiating deals with due diligence. About The Knowledge Group/The Knowledge Congress Live Webcast Series The Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org/ New York, NY, April 17, 2017 --( PR.com )-- The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that DiliVer's CEO Neil Kleinberg and LP3's CEO Scott Lawler will speak at The Knowledge Group’s webcast entitled: “Cybersecurity in M&A Transactions: Negotiating the Deal with Due Diligence.” This event is scheduled for April 25, 2017 from 12:00 pm to 2:00 pm ET.For further details, please visit: https://www.theknowledgegroup.org/webcasts/risk-and-compliance/business-and-corporation-risk-and-compliance/cybersecurity-in-ma-transactions-negotiating-the-deal-with-due-diligence-live-webcastAbout Neil KleinbergAs founder and CEO, and inventor of its intellectual property, Mr. Kleinberg is responsible for leading DiliVer’s Corporate organizational unit, which includes overseeing its performance and growth functions. With 25 years of experience as an entrepreneur, executive, management consultant, and lead technology engineer, his expertise spans the commercial and government sectors, including the information technology, financial services, national security, healthcare, judicial, public safety, and telecommunications industries. In his previous role, Mr. Kleinberg led corporate development buy-side and sell-side M&A activities at enterprise software market leader ASI, and participated in more than 20 initiated transactions, including a private equity raise.About Scott LawlerMr. Lawler provides leadership as well as subject matter expertise to LP3 customers in the areas of Enterprise Architecture, Information Assurance, Security Architecture, and Enterprise Management Operations. Mr. Lawler served for 21 years in the Air Force beginning his career in F-15 avionics, attending Officer Training School, and becoming a Communications Officer. During Desert Storm, he was commander of the 54th Combat Communications Squadron. He served at Air Combat Command providing leadership in enterprise architecture, computer networking, and information assurance. Standing up the Department of Defense Computer Emergency Response Team, Mr. Lawler led a team delivering network security services supporting 2.2 million computers. He was a key leader in activating the Joint Task Force-Global Network Operations (JTF-GNO) creating a mission critical global showplace and center of technical excellence. Mr. Lawler drafted and hand-carried the memo for DEPSECDEF signature that created the Information Assurance Vulnerability Alert (IAVA) program. He developed industry leading vulnerability management as well as tactical and strategic IA analysis techniques.AbstractTraditionally, M&A due diligence is solely focused on the traditional risks areas. However, due to the increasing developments and advancements in technology, asset due diligence evolved dramatically and now includes software escrow and open source software. With this, cybersecurity has become one of the most vital parts of the M&A process for any deal and transaction especially those which involve targets with any kind of online presence.In this live Webcast, a panel of thought leaders brought together by The Knowledge Group will provide the audience with an in-depth analysis of the fundamentals as well as all the important cybersecurity issues in M&A transactions. Speakers will also present best strategies in negotiating deals with due diligence.About The Knowledge Group/The Knowledge Congress Live Webcast SeriesThe Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org/ Click here to view the company profile of The Knowledge Group Click here to view the list of recent Press Releases from The Knowledge Group


News Article | May 12, 2017
Site: www.prnewswire.com

TURNERSVILLE, N.J., May 12, 2017 /PRNewswire/ -- Information Assurance Specialists Inc. responds to customer demand with the announcement of a family of NIAP Common Criteria Certified and NSA Commercial Solutions for Classified Component List listed small form factor, low-power,...


News Article | May 12, 2017
Site: co.newswire.com

Information Assurance Specialists Inc. responds to customer demand with the announcement of a family of NIAP Common Criteria Certified and NSA Commercial Solutions for Classified Component List listed small form factor, low-power, high-performance embeddable IP Router VPN Gateway Modules. The latest addition to the IAS cutting-edge IP networking and security appliance portfolio has been designed to address Government and Military IP networking users and system integrators’ requirement for a board level embeddable NSA pre-certified enterprise class VPN/Router module that offers high performance, low power, ease of use and embedment. The IAS VPN Gateway Modules are highly network interface flexible, board level embeddable form factors that leverage the commercial COM Express embeddable computer standards. IAS VPN Gateway Modules are available in three different form factors, and two different levels of processing performance and power consumption, offering integrators complete configuration flexibility for any application. All product variants support a wide range of WAN/LAN technologies and offer an unrestricted number Gigabit Ethernet inferences, Wi-Fi radios, 3G/4G LTE cellular modems and serial ports. The embeddable IAS VPN Gateway Modules run IAS’s FIPS 140-2 Validated, NIAP Common Criteria Certified IAS Router firmware. And because the modules are listed on the NSA CSfC component list, integrators only need to add an off the shelf or application specific carrier card to create a new NSA CSfC complaint product. The IAS VPN Gateway modules come in COM Express Type 10 and Type 6 form factors, ensuring ease of embedment into current and further Government and Military applications and integration efforts. “The IAS VPN Gateway Modules were designed from the ground up so that communications integrators can easily create small form factor, NSA CSfC compliant solutions to support the diverse routing protocols, capabilities, and applications used in Government and Military networks. Our VPN Gateway Modules are unlike any other solution in the market, and have been NSA CSfC Component List listed at the module level to ensure integrators the easiest path to integration and customers to the easiest path to fielding in a CSfC Comprised Solution,” said Keir Tomasso, President of IAS. The IAS Routers and the VPN Gateway Modules are unique in the enterprise class IP networking market because they bake in support for many different commercial WAN connectivity technologies not found in current market offerings.  Technologies supported include RJ45 and fiber gigabit Ethernet, 802.11 a/b/g/n/ac Wi-Fi, 3G and 4G cellular modems, satellite terminals, and even legacy RS-232/RS485. The IAS VPN Gateway Modules support these without number of interface restrictions, and do so with a simple-to-use, logically organized, web browser-based graphical user interface. IAS will showcase several of its Commercial Solutions for Classified products, including the cutting-edge IAS VPN Gateway Modules in partner and NSA trusted system integrator, Intelligent Waves’ booth 1927 at the upcoming Special Operations Forces Industry Conference (SOFIC) in Tampa, Florida, from May 15 to 18.


News Article | May 10, 2017
Site: www.prnewswire.com

EAST BRUNSWICK, N.J., May 10, 2017 /PRNewswire/ -- RIVA Networks Inc. and Information Assurance Specialists, Inc. —  both veterans of providing custom solutions to the Department of Defense — have signed a Teaming Agreement to deliver secure, encrypted, wireless solutions ensuring first mo...


Jones & Bartlett Learning, a division of Ascend Learning, announced today upgraded 3.0 Virtual Security Cloud Labs to be released this summer. Partnering with Hatsize Learning Corporation to upgrade its features, this lab environment offers students a fully immersive mock IT infrastructure where they can test their skills with realistic security scenarios in a safe learning environment. Hatsize Learning Corporation is a leading provider of hands-on virtual training that enables its clients to provide virtual desktop training to students and learners anywhere on earth. With the 3.0 upgrade, the Virtual Security Cloud Labs will include new content, features, and functionalities on the Hatsize lab environment. All 80 labs are expanded to include a new Applied Learning section and updated Lab Challenge and Analysis section to supplement the existing Hands-On Demonstration. The new StateSaves feature allows students the opportunity to save their work and return to it later. Other new features include Progress Tracking, collapsible lab frame, and system checker. Updates to the latest operating systems and software provide students with a comprehensive hands-on experience using real-world software “Cybersecurity is increasingly important to our daily lives, and as a result, the demand for qualified professionals is growing dramatically. To help meet the need, Jones & Bartlett Learning has developed a comprehensive program solution with our Information Systems Security & Assurance Curriculum,” said Ed Moura, General Manager of Academic and Professional Publishing at Jones & Bartlett Learning. “We are pleased to announce a partnership with Hatsize Learning Corporation to offer an enhanced 3.0 version of the Virtual Security Cloud Labs to accompany our series. This hands-on learning experience provides invaluable, cutting edge-technology for the next generation of cybersecurity professionals.” The Information Systems Security & Assurance Curriculum (http://www.issaseries.com) is mapped to leading certifications and offers a complete curriculum solution for IT Security, Cybersecurity, Information Assurance, and Information Systems Security programs at both the bachelor and master’s levels. Included in the series is content for fifteen titles, in print or electronic form, as well as both case study labs and Virtual Security Cloud Labs. "We are thrilled to be partnering with Jones & Bartlett Learning on their newest Virtual Security Cloud Labs offering,” stated Ryan Hoult, CEO of Hatsize Learning Corporation. “This collaboration, pairing their experience in online security and cyber defense training with our world-class training environments, will ensure students gain all the skills needed to excel in a competitive industry." About Jones & Bartlett Learning Jones & Bartlett Learning is a world-leading provider of instructional, assessment, and learning-performance management solutions for the secondary education, post-secondary education, and professional markets. Jones & Bartlett Learning develops educational programs and services that improve learning outcomes and enhance student achievement by combining authoritative content written by respected authors with innovative, proven, and engaging technology applications that meet the diverse needs of today's instructors, students, and professionals. For more information on Jones & Bartlett Learning, visit http://www.jblearning.com. About Hatsize Learning Corporation Since 2000, Hatsize Learning Corporation has been a global leader in providing cloud-based training labs for software and IT hardware products. Hatsize enables its clients to provide virtual desktop training to students and learners anywhere on earth, conveniently using any modern day internet browser, available 24/7/365. Our feature rich environment and cutting edge infrastructure empower trainers to deliver hands-on labs that are easy to use, more effective, and available at a fraction of the cost as seen with traditional in-classroom learning. We offer solutions for any size of business, organization or institution, with both instructor led and unscheduled self-paced training options that are customizable and ready to fit any requirements. With the cloud, training is more practical, better equipped, and no longer bound by physical limitations. To learn more, or to request a free demo and see how we can work for you, visit http://www.hatsize.com.


News Article | May 10, 2017
Site: co.newswire.com

RIVA Networks Inc. and Information Assurance Specialists, Inc. —  both veterans of providing custom solutions to the Department of Defense — have signed a Teaming Agreement to deliver secure, encrypted, wireless solutions ensuring first mover advantage in the cyber warfare theater of operations. Under the agreement, RIVA will be working with IA Specialists, Inc. to integrate their NSA Validated, Suite B encryption into RIVA’s best-in-class Cyber VauLTETM platform. Cyber VauLTETM creates a “no attribution” communications bubble for key management personnel. The Cyber VauLTETM automatically connects your cellphone voice, text and data anonymously. The platform also provides its own Wi-Fi network to protect against unsecured Wi-Fi hubs and foreign cellular networks. The Suite B mode of IPSEC is so strong mathematically that the NSA has approved this VPN technology as robust enough to protect up to Top Secret classified information. Keith Dyson, head of RIVA’s Cyber Ops group, said: “By teaming with IA Specialists, Inc., we have raised the bar for security using the Cyber VauLTETM platform.” Dyson said that RIVA would be integrating IA Specialists products into many of their mobile platforms. Keir Tomasso, President and CTO of IA Specialists, Inc., said: “We are proud to have been chosen by RIVA Networks as their IP Router/Security appliance teammate for Government and Commercial applications. We feel the combination of the two companies’ leading edge technologies will allow for RIVA Networks to be even further out in front of the deployable cellular communications technology companies.” RIVA Networks will be showcasing their secure, mobile platforms at the SOFIC conference in Tampa the week of May 15th.  Visit us in the SES/O3B Booth 05. RIVA Networks designs and builds advanced wireless networks. A leader in secure wireless technology, RIVA Networks is uniquely capable of addressing the complex and dynamic Command, Control, Communication, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) requirements of Department of Defense transformation. RIVA’s nanoCELL networks are production proven stationary or man portable cellular systems currently deployed with over 200 customers in the Government and Enterprise sectors. The Company’s flagship product, the Cyber VauLTETM is capable of transmitting numerous HD video streams simultaneously. The Cyber VauLTETM was specifically developed to deliver no attribution, secure, encrypted, high-speed data to meet the objectives of transformational communication systems. For further information on RIVA products and services, please visit www.Riva-Networks.com. Located in Turnersville, NJ, Information Assurance Specialists (IAS) designs and manufactures software and hardware based IP networking router solutions for the commercial and defense markets. As NSA Commercial Solutions for Classified (CSfC) experts, IAS delivers secure, enterprise-level products that meet the most stringent mission requirements where ruggedization, security, size, weight, and power are critical.  The company also provides a full range of specialized support services in the form of custom design engineering, engineering support, and COMSEC and INFOSEC segment consulting. IAS products are already trusted by government agencies, including the Department of Defense, Federal Bureau of Investigation, National Security Agency, the National Security Council, Executive Office of the President and many others. For further information on IAS products and services, please visit www.iaspecialists.com.


Wang J.,Information Assurance
Scientometrics | Year: 2013

This paper aims to inform choice of citation time window for research evaluation, by answering three questions: (1) How accurate is it to use citation counts in short time windows to approximate total citations? (2) How does citation ageing vary by research fields, document types, publication months, and total citations? (3) Can field normalization improve the accuracy of using short citation time windows? We investigate the 31-year life time non-self-citation processes of all Thomson Reuters Web of Science journal papers published in 1980. The correlation between non-self-citation counts in each time window and total non-self-citations in all 31 years is calculated, and it is lower for more highly cited papers than less highly cited ones. There are significant differences in citation ageing between different research fields, document types, total citation counts, and publication months. However, the within group differences are more striking; many papers in the slowest ageing field may still age faster than many papers in the fastest ageing field. Furthermore, field normalization cannot improve the accuracy of using short citation time windows. Implications and recommendations for choosing adequate citation time windows are discussed. © 2012 Akadémiai Kiadó, Budapest, Hungary.


Patent
Information Assurance | Date: 2015-08-12

Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device.

Loading Information Assurance collaborators
Loading Information Assurance collaborators