Wilmington, DE, United States
Wilmington, DE, United States

Time filter

Source Type

News Article | May 12, 2017
Site: www.prnewswire.com

TURNERSVILLE, N.J., May 12, 2017 /PRNewswire/ -- Information Assurance Specialists Inc. responds to customer demand with the announcement of a family of NIAP Common Criteria Certified and NSA Commercial Solutions for Classified Component List listed small form factor, low-power,...


News Article | May 10, 2017
Site: www.prnewswire.com

EAST BRUNSWICK, N.J., May 10, 2017 /PRNewswire/ -- RIVA Networks Inc. and Information Assurance Specialists, Inc. —  both veterans of providing custom solutions to the Department of Defense — have signed a Teaming Agreement to deliver secure, encrypted, wireless solutions ensuring first mo...


News Article | May 23, 2017
Site: www.prweb.com

As company executives become increasingly aware of their organization’s cybersecurity vulnerabilities, they learn that network defense, data security, secure coding, professional cybersecurity expertise, and safe computing practices are necessary for their survival. Community and technical colleges are responding to this workforce shortage by infusing cybersecurity into their curriculum thanks to the Community College Cyber Summit (3CS). This one-of-a-kind conference is the resource community and technical colleges use to obtain accurate information that jumpstarts their cybersecurity courses. The fourth annual 3CS will be held June 28 to 30, at Prince George’s Community College and National Harbor, Maryland. This national conference is unique as it caters to cybersecurity education at community colleges. Faculty and administrators receive training to adequately instruct students in cybersecurity and also serves as a resource to implement cybersecurity into curricula. This summit gives community colleges leverage to best support the needs of critical infrastructure sectors such as banking services, emergency services, transportation, water systems, and energy. "3CS is a place where instructors can learn about emerging cybersecurity threats, by those who know WHAT to teach to cybersecurity students, technicians or workers in other disciplines,” said Dr. Bob Spear, chair of 3CS. “It’s where participants can fashion new answers with colleagues and meet the cybersecurity professionals who can help!” The 3CS has four tracks for participants to follow: new to cybersecurity, experienced in cybersecurity and CAE2Y aspirants, cybersecurity across the curriculum, and student track. On the morning of June 28, students and recent graduates can attend a 3CS Pre-Summit Job Fair, new this year. For more information or to register, visit my3CS.org. About Community College Cyber Summit:  The Community College Cyber Summit (3CS) is organized and produced by the National CyberWatch Center, National Resource Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), Cyber Security Education Consortium (CSEC), Broadening Advanced Technological Education Connections (BATEC), and Advanced Cyberforensics Education (ACE) Consortium, which are all funded by the National Science Foundation (NSF). The outcomes of 3CS leverage community college cybersecurity programs across the nation by introducing the latest technologies, best practices, curricula, products, and more. To learn more, visit my3CS.org.


A distinguished panel of experts, professionals, and technology leaders including board members of Enterprise Security Magazine has chosen and included R&K Cyber Solutions LLC in the Top 10 list. “We take pride in honoring R&K Cyber Solutions LLC as one among the 10 companies that are featured in the Vulnerability Management Special Edition,” said Michael Brown, Managing Editor of Enterprise Security Magazine. R&K Cyber Solutions LLC strives to be a leader in cyber security innovation, while maintaining the highest quality of our training, products, and services. It provides Intrusion Detection, Incident Response, Malware Reverse Engineering, and Information Assurance (IA) services, as well as Certified Security processes to the U.S. Federal Government (Civilian, Department of Defense (DoD), and Intelligence Community (IC)) and to customers in selected commercial markets. About R&K Cyber Solutions LLC Incorporated in 2010, R&K Cyber Solutions LLC (R&K) is a leading and award winning provider of Computer Network Defense (CND) Services, Enterprise Information Technology (IT) Management, and Application Development. It is a privately owned company dedicated in providing Computer & Network Security solutions to the clients. For more info, visit: rkcybersolutions.com Enterprise Security Magazine—is a technology magazine that gives information about the security solutions, which helps organizations to get adapted to the radical changes that are taking place in their information security infrastructure. A panel of experts, technology leaders and board members of the Enterprise Security Magazine has decided the “Top 10 Vulnerability Management Solution Providers 2017” and shortlisted the best vendors and consultants in the Vulnerability Management arena. For more info, visit: http://www.enterprisesecuritymag.com


SYDNEY--(BUSINESS WIRE)--Speedcast International Limited (ASX: SDA), the world’s most trusted provider of highly reliable, fully managed, remote communication and IT solutions, today announced it has signed an agreement with leading government satellite connectivity provider COMSAT to establish a common global service offering of Ku-band very small aperture terminal (VSAT) services for the government and maritime markets. The combined network will leverage Speedcast’s greater than 8 GHz of global satellite capacity and COMSAT’s security-cleared teleports in the United States to deliver a robust, secure network for customers needing advanced, resilient connectivity for critical operations. “The opportunity for collaboration with COMSAT fits very well with Speedcast’s commitment to delivering robust, reliable, secure global communications solutions to government and military customers, no matter where operations take them,” said PJ Beylier, CEO, Speedcast. “COMSAT’s experience in the government segment combined with our unmatched capacity, global network and customer support enable us to offer highly reliable and secure solutions to our customers.” COMSAT will provide teleport and hosting services at their owned teleports in various U.S. sites, as well as hands-on technical and engineering assistance to help interconnect and migrate network segments. Through over 50 years of serving government customers requiring critical communications, COMSAT brings expertise in solution development, architecture design and service delivery support. “COMSAT has always been at the forefront of satcoms technology, innovating to provide enhanced services and support for our customers’ benefit,” said David Greenhill, president, COMSAT. “We recognize the same passion in the Speedcast team. This collaboration will allow us to mutually broaden our markets and better serve our customers.” Through this partnership, government customers will have access to the largest private iDirect Bandwidth network accessed from teleports and terrestrial nodes in NATO/Five Eyes nations. Support staff and facilities are Information Assurance (IA) certified and cleared, ensuring necessary security for government furnished equipment (GFE) baseband. Commercial customers will benefit from the cost and operational efficiencies of highly scalable service plans and access to the world’s largest iDirect network, combined with superior customer support and network security measures. With a direct lineage from the COMSAT organization created by the Communications Satellite Act of 1962, COMSAT has played an important role in the SATCOM industry from its inception to present day. Some of COMSAT’s key milestones include being a founding member of Intelsat operating the Marisat fleet network that provided the first mobile satellite communications services to the United States Navy. COMSAT also founded Inmarsat’s initial operating system from the company’s two earth stations. COMSAT delivers a full portfolio of satellite solutions in C-Band, Ku-Band, Ka-Band, X-Band and Ultra High Frequency (UHF) as well as Inmarsat, Thuraya and Iridium services to U.S. civilian and military agencies for their most critical missions. Headquartered in Herndon, Virginia, COMSAT is a trusted leader in the design and delivery of customized, secure, managed end-to-end (ME2E) satellite services for aeronautical, land, and maritime service environments. http://www.comsat.com/ Speedcast International Ltd (ASX: SDA) is the world’s most trusted provider of highly reliable, fully managed, end-to-end remote communication and IT solutions. The company utilizes an extensive worldwide footprint of local support, infrastructure and coverage to design, integrate, secure and optimize networks tailored to customer needs. With differentiated technology, an intense customer focus and a strong safety culture, Speedcast serves more than 2,000 customers in over 140 countries via 39 teleports, including offshore rigs and cruise ships, 10,000+ maritime vessels and 4,500+ terrestrial sites. Speedcast supports mission-critical applications in industries such as maritime, oil and gas, enterprise, media, cruise and government. Learn more at www.speedcast.com. Speedcast® is a trademark and registered trademark of Speedcast International Limited. All other brand names, product names, or trademarks belong to their respective owners. © 2017 Speedcast International Limited. All rights reserved.


ROSALYN, Va., May 23, 2017 /PRNewswire/ -- Curtis Dukes, the former Director of Information Assurance at the U.S. National Security Agency will discuss global cybersecurity including proven methods to stop cyber attacks at The Telegraph's Cybersecurity Conference...


News Article | May 24, 2017
Site: www.businesswire.com

SALT LAKE CITY--(BUSINESS WIRE)--Venafi®, the leading provider of machine identity protection, today announced the National Information Assurance Partnership’s (NIAP) Common Criteria Testing Laboratory (CCTL) is currently evaluating the Venafi Trust Protection Platform as a candidate for Common Criteria Certification, a requirement for hardware and software devices to be used by Federal government and national security systems. The Venafi Trust Protection Platform manages and secures the cryptographic keys and digital certificates that make up machine identities, delivering an enterprise-grade platform that provides in-depth security, operational efficiency and organizational compliance. Keys and certificates are used to uniquely identify and create trusted relationships between machines, devices and systems. They control the flow of information to trusted machines and prevent the flow of information to those that are not trusted. With the Venafi Trust Protection Platform, organizations can efficiently orchestrate the entire machine identity lifecycle, keeping communications between machines secure and private. “Government agencies face unique and complex cybersecurity threats, from sophisticated nation state attacks to malicious insiders,” said Jeff Hudson, chief executive officer for Venafi. “The Common Criteria Testing Laboratory places the most stringent demands for system and data integrity, confidentiality and availability. Achieving this milestone demonstrates our commitment to providing government organizations the most secure and effective machine identity solutions.” Currently twenty-six nations recognize the Common Criteria. In the United States the NIAP — a partnership between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) — is responsible for Common Criteria evaluation and implementation. For more information on Venafi’s Common Criteria evaluation, please visit: https://www.niap-ccevs.org/Product/PINE.cfm?ID624=36 To learn more about the Venafi Trust Protection Platform, please visit: https://www.venafi.com/platform/trust-protection-platform Venafi is the cybersecurity market leader in machine identity protection, securing all machine-to-machine connections and communications. Venafi protects all machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, IoT, mobile, code-signing, and SSH. Venafi provides global visibility of all machine identities and the risks associated with them for the extended enterprise — on premise, mobile, virtual, cloud and IoT — at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted. With over 30 patents, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 2000 organizations, including, the top five U.S. health insurers, the top five U.S. airlines, four of the top five U.S., U.K. and South African banks and four of the top five U.S. retailers. Venafi is backed by top-tier investors, including Foundation Capital, Intel Capital, Origin Partners, Pelion Venture Partners, QuestMark Partners, and Sliver Lake Partners. For more information, visit www.venafi.com.


Receive press releases from The Knowledge Group: By Email DiliVer's CEO Neil Kleinberg and LP3's CEO Scott Lawler to Speak at The Knowledge Group’s Cybersecurity in M&A Transactions: Negotiating the Deal with Due Diligence New York, NY, April 17, 2017 --( For further details, please visit: https://www.theknowledgegroup.org/webcasts/risk-and-compliance/business-and-corporation-risk-and-compliance/cybersecurity-in-ma-transactions-negotiating-the-deal-with-due-diligence-live-webcast About Neil Kleinberg As founder and CEO, and inventor of its intellectual property, Mr. Kleinberg is responsible for leading DiliVer’s Corporate organizational unit, which includes overseeing its performance and growth functions. With 25 years of experience as an entrepreneur, executive, management consultant, and lead technology engineer, his expertise spans the commercial and government sectors, including the information technology, financial services, national security, healthcare, judicial, public safety, and telecommunications industries. In his previous role, Mr. Kleinberg led corporate development buy-side and sell-side M&A activities at enterprise software market leader ASI, and participated in more than 20 initiated transactions, including a private equity raise. About Scott Lawler Mr. Lawler provides leadership as well as subject matter expertise to LP3 customers in the areas of Enterprise Architecture, Information Assurance, Security Architecture, and Enterprise Management Operations. Mr. Lawler served for 21 years in the Air Force beginning his career in F-15 avionics, attending Officer Training School, and becoming a Communications Officer. During Desert Storm, he was commander of the 54th Combat Communications Squadron. He served at Air Combat Command providing leadership in enterprise architecture, computer networking, and information assurance. Standing up the Department of Defense Computer Emergency Response Team, Mr. Lawler led a team delivering network security services supporting 2.2 million computers. He was a key leader in activating the Joint Task Force-Global Network Operations (JTF-GNO) creating a mission critical global showplace and center of technical excellence. Mr. Lawler drafted and hand-carried the memo for DEPSECDEF signature that created the Information Assurance Vulnerability Alert (IAVA) program. He developed industry leading vulnerability management as well as tactical and strategic IA analysis techniques. Abstract Traditionally, M&A due diligence is solely focused on the traditional risks areas. However, due to the increasing developments and advancements in technology, asset due diligence evolved dramatically and now includes software escrow and open source software. With this, cybersecurity has become one of the most vital parts of the M&A process for any deal and transaction especially those which involve targets with any kind of online presence. In this live Webcast, a panel of thought leaders brought together by The Knowledge Group will provide the audience with an in-depth analysis of the fundamentals as well as all the important cybersecurity issues in M&A transactions. Speakers will also present best strategies in negotiating deals with due diligence. About The Knowledge Group/The Knowledge Congress Live Webcast Series The Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org/ New York, NY, April 17, 2017 --( PR.com )-- The Knowledge Group/The Knowledge Congress Live Webcast Series, the leading producer of regulatory focused webcasts, has announced today that DiliVer's CEO Neil Kleinberg and LP3's CEO Scott Lawler will speak at The Knowledge Group’s webcast entitled: “Cybersecurity in M&A Transactions: Negotiating the Deal with Due Diligence.” This event is scheduled for April 25, 2017 from 12:00 pm to 2:00 pm ET.For further details, please visit: https://www.theknowledgegroup.org/webcasts/risk-and-compliance/business-and-corporation-risk-and-compliance/cybersecurity-in-ma-transactions-negotiating-the-deal-with-due-diligence-live-webcastAbout Neil KleinbergAs founder and CEO, and inventor of its intellectual property, Mr. Kleinberg is responsible for leading DiliVer’s Corporate organizational unit, which includes overseeing its performance and growth functions. With 25 years of experience as an entrepreneur, executive, management consultant, and lead technology engineer, his expertise spans the commercial and government sectors, including the information technology, financial services, national security, healthcare, judicial, public safety, and telecommunications industries. In his previous role, Mr. Kleinberg led corporate development buy-side and sell-side M&A activities at enterprise software market leader ASI, and participated in more than 20 initiated transactions, including a private equity raise.About Scott LawlerMr. Lawler provides leadership as well as subject matter expertise to LP3 customers in the areas of Enterprise Architecture, Information Assurance, Security Architecture, and Enterprise Management Operations. Mr. Lawler served for 21 years in the Air Force beginning his career in F-15 avionics, attending Officer Training School, and becoming a Communications Officer. During Desert Storm, he was commander of the 54th Combat Communications Squadron. He served at Air Combat Command providing leadership in enterprise architecture, computer networking, and information assurance. Standing up the Department of Defense Computer Emergency Response Team, Mr. Lawler led a team delivering network security services supporting 2.2 million computers. He was a key leader in activating the Joint Task Force-Global Network Operations (JTF-GNO) creating a mission critical global showplace and center of technical excellence. Mr. Lawler drafted and hand-carried the memo for DEPSECDEF signature that created the Information Assurance Vulnerability Alert (IAVA) program. He developed industry leading vulnerability management as well as tactical and strategic IA analysis techniques.AbstractTraditionally, M&A due diligence is solely focused on the traditional risks areas. However, due to the increasing developments and advancements in technology, asset due diligence evolved dramatically and now includes software escrow and open source software. With this, cybersecurity has become one of the most vital parts of the M&A process for any deal and transaction especially those which involve targets with any kind of online presence.In this live Webcast, a panel of thought leaders brought together by The Knowledge Group will provide the audience with an in-depth analysis of the fundamentals as well as all the important cybersecurity issues in M&A transactions. Speakers will also present best strategies in negotiating deals with due diligence.About The Knowledge Group/The Knowledge Congress Live Webcast SeriesThe Knowledge Group was established with the mission to produce unbiased, objective, and educational live webinars that examine industry trends and regulatory changes from a variety of different perspectives. The goal is to deliver a unique multilevel analysis of an important issue affecting business in a highly focused format. To contact or register for an event, please visit: http://theknowledgegroup.org/ Click here to view the company profile of The Knowledge Group Click here to view the list of recent Press Releases from The Knowledge Group


Wang J.,Information Assurance
Scientometrics | Year: 2013

This paper aims to inform choice of citation time window for research evaluation, by answering three questions: (1) How accurate is it to use citation counts in short time windows to approximate total citations? (2) How does citation ageing vary by research fields, document types, publication months, and total citations? (3) Can field normalization improve the accuracy of using short citation time windows? We investigate the 31-year life time non-self-citation processes of all Thomson Reuters Web of Science journal papers published in 1980. The correlation between non-self-citation counts in each time window and total non-self-citations in all 31 years is calculated, and it is lower for more highly cited papers than less highly cited ones. There are significant differences in citation ageing between different research fields, document types, total citation counts, and publication months. However, the within group differences are more striking; many papers in the slowest ageing field may still age faster than many papers in the fastest ageing field. Furthermore, field normalization cannot improve the accuracy of using short citation time windows. Implications and recommendations for choosing adequate citation time windows are discussed. © 2012 Akadémiai Kiadó, Budapest, Hungary.


Patent
Information Assurance | Date: 2015-08-12

Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device.

Loading Information Assurance collaborators
Loading Information Assurance collaborators