News Article | February 15, 2017
It has long been known that community colleges have the flexibility needed to respond to the cybsersecurity workforce needs in a timely manner. Community College Cyber Summit (3CS) is the only national conference that focuses bringing community colleges up to par with the best cybersecurity resources, curricula and technologies. Beat the rush and sign up now for the early bird discount for the 3CS, which takes place June 28-30 at Prince George’s Community College and National Harbor, Maryland. “I love the support and networking opportunities you find at 3CS. There is incredible diversity: geographic, background, work and educational experience, gender, and cultural. And everyone I've met shares a passion for meeting the cybersecurity workforce and educational needs of our Nation and the global world in which we live. I am inspired!”, states Susan Svane, North Central Texas College. The 3CS brings together community college educators and leaders to exchange information on cybersecurity in all technology fields. Students also are invited to participate, as there is a pre-summit job fair on June 28 as well as a student track. This year’s theme is “Strengthening Our Cyber IQ.” Presentations and workshops will be available for community college faculty and administration interested in any of these four tracks: 1) for faculty and colleges new to cybersecurity education, 2) for experienced faculty and programs, and for those colleges aspiring to apply for recognition as a Center of Academic Excellence in Cyber Defense – Two Year (CAE2Y), 3) for teaching cybersecurity across the curriculum and throughout the nation’s critical infrastructure, and 4) for students attending the 3CS Pre-Summit Job Fair. Early bird registration is $150 and ends March 31. Community college faculty, administration and students are encouraged to register early due to limited seating. Register here: my3cs.org/registration-accommodations About Community College Cyber Summit: The Community College Cyber Summit (3CS) is organized and produced by the National CyberWatch Center, National Center for Systems Security and Information Assurance (CSSIA), CyberWatch West (CWW), Cyber Security Education Consortium (CSEC), Broadening Advanced Technological Education Connections (BATEC), and Advanced Cyberforensics Education (ACE) Consortium, which are all funded by the National Science Foundation (NSF). The outcomes of 3CS will leverage community college cybersecurity programs across the nation by introducing the latest technologies, best practices, curricula, products, and more. To learn more, visit my3CS.org.
News Article | February 15, 2017
MANCHESTER, 13-Feb-2017 — /EuropaWire/ — UKFast CEO Lawrence Jones MBE today announces the acquisition of another cloud and cybersecurity service provider, Secure Information Assurance (S-IA), following the announcement of a £2.3 million investment to bolster his firm’s government data centre space. S-IA provides secure cloud hosting and cybersecurity services to the UK Ministry of Defence, the Cabinet Office and a raft of other UK government organisations. The deal gives UKFast access to IL3 and IL4/Official-Sensitive accreditations as well as the UK’s highest security rated hosting, known as List-X. The move is a further step towards the high-level security services market, just six months after the acquisition of cybersecurity specialists Pentest Limited by Jones’ security business Secarma in July 2016. Jones said: “This deal has been exactly a year in the making. Acquiring S-IA is a strategic move, not only because of its high-profile government clients, but also because of its security product set. They are already delivering accredited services from List-X facilities to a number of clients. “It’s a business that’s very much on the rise and the deal was an extremely competitive process, but the S-IA management team sees the clear advantage of partnering with UKFast, seeing the instant scalability of our eCloud platform as the perfect offering for the government. “We’re bolting on a new level of expertise and technical capability to UKFast’s existing product range, and combined with our exclusively UK-based data centres and best of British service, it’s an offering that other large providers dealing with the public sector simply can’t match.” Established in 2003, S-IA is focussed exclusively on government and public sector services, bringing 14 years’ experience of managing process and procedure for the highest level of government to UKFast. S-IA CEO Martin Knapp is set to head up Jones’ G-Cloud team as part of the move, targeting a share of the £1.69bn currently spent through the government procurement framework. Knapp said: “This is a hugely exciting move for all of us at S-IA. The conversation started when we went to UKFast to look at their data centre facilities. We initially planned to host our cloud with UKFast, but we were so impressed that we started a conversation about becoming partners and that quickly became a conversation about Lawrence buying the business. “There are so many technical synergies between us and UKFast; at the hardware level, the software level and at the service level too. Their technical capabilities and infrastructure are like none I’ve seen elsewhere. “Wholly owned, UK-based data centres are such an important factor for the sector we’re dealing with.” UKFast co-founder and commercial director Gail Jones and director of mergers and acquisitions Catherine Houghton oversaw the deal. Gail Jones said: “The moment I looked at this business I knew it was perfect for us. We’ve looked at 15 potential deals in the last year and this one was really head and shoulders above the rest. It was further reinforced when we spoke with the cabinet office, who gave S-IA a glowing report.” Houghton said: “This is an exciting step change for the UKFast group, allowing us to provide a full range of hosting services at the higher IL3/Official-Sensitive standard. With an estimated 30% of all cloud spend coming from the public sector this opens up a massive market opportunity for us and is an area we expect to see rapid growth in.” S-IA has hosted services for the UK Cabinet Office since 2003 and is a long-standing, trusted partner of the Ministry of Defence. Lawrence Jones continued: “As a British businessman, hosting for the government is the biggest honour I could ever imagine. When we set up UKFast 17 years ago I could only dream of being in a situation like this. “Britain needs world-class businesses looking after its critical infrastructure, especially during times of uncertainty. We’re completely focussed on building a stronger, more secure Britain.” Sarah Walton, Corporate Partner at Weightmans LLP and advisor to the sellers said: “We are delighted to have worked on a deal which secured a great result for both companies, their customers and staff. UKFast is an innovative and ambitious company and S-IA has an exciting future ahead.” Financial due diligence was carried out by Nicola Merritt at Dow Schofield Watts and Legal due diligence by Nabarro, with UKFast legal team leading on the deal documents. For media enquiries, please contact Elizabeth Donevan on 0844 576 3909.
News Article | February 20, 2017
Leading-edge data security and privacy protection technology company demonstrates new product, Trivalent Protect™, and sponsors webinar for HIMSS attendees ORLANDO, FL--(Marketwired - Feb 20, 2017) - Trivalent, the leading provider of Next Generation Data Protection, today announces Trivalent Protect™ to secure sensitive and private healthcare information on the Windows OS platform. Trivalent will be providing on-site, registered demonstrations of its data protection solution, and also invites HIMSS attendees to register for an educational webinar on "How to Address Compliance Gaps by Protecting Healthcare Data". As healthcare organizations continue to digitize information, from patient data to sensitive business information, on mobile or laptop devices, they are increasingly exposed to non-compliance penalties and the high-impact consequences of data loss. According to a 2017 Data Breach Industry Forecast, healthcare organizations are the most targeted sector with new, sophisticated attacks emerging. Trivalent Protect provides healthcare IT security and risk professionals with a seamless, scalable and proven solution that is National Information Assurance Partnership (NIAP) certified. It is easy to deploy on any computing device that supports Windows 7, 8 and 10 in both ambulatory and out-patient environments. Different than traditional full disk encryption solutions, Trivalent Protect provides data security and privacy protection through a proprietary process called Data Alchemy™. This process of file-encryption, shredding, and local or cloud storage transforms the properties of sensitive and regulated data to make it completely unusable to hackers and unauthorized users. Trivalent protects critical data, such as protected health information (PHI), personally identifiable information (PII), and Primary Account Number (PAN), in both connected and disconnected modes. This enables healthcare data to remain compliant in the event of a data breach or a stolen device. "We are excited to invite HIMSS attendees to an on-site, registered demonstration of our product on Feb. 21 at 2 p.m. The demo showcases Trivalent Protect's capability to re-constitute only the portions of a shredded file that are needed by an authorized user in real-time," said Jyoti Wadhwa, VP of Marketing. "With this technology, healthcare organizations can now effectively control their data on any Windows OS device at all times, providing freedom to operate without risk of non-compliance or data theft." As part of Trivalent's healthcare debut at the HIMSS 2017 Health IT Conference from Feb. 19-23, Trivalent is sponsoring a free healthcare data security and privacy protection webinar taking place on March 22, 2017 at 1:30 p.m. (EDT). On-line attendees will learn how to improve their data risk profile through an end-to-end HIPAA compliant platform from security and privacy experts. Webinar panelists include healthcare security and privacy risk practitioner and trainer, Marco Polizzi, HCISPP, HIT, LHRM, MHA, Joe DeWenter, Snr. Product Marketing Mgr., Getac, and Yiannis Vassiliades, VP Products, Trivalent. For those who cannot attend HIMSS 2017, a post-event Trial of Trivalent Protect is also available. Companies interested in becoming an approved Trivalent Partner, or seeking general information, can contact: firstname.lastname@example.org. About Trivalent Trivalent is the leading provider of next generation data protection. It protects critical data by transforming the properties of data, making sensitive information unusable to unauthorized users. Trivalent's security stays with the data through every process and transaction, giving industries a solution that provides real-time data protection in even the most unpredictable environments. For more information, please visit www.trivalent.co.
News Article | February 28, 2017
BETHESDA, Md., Feb. 28, 2017 /PRNewswire-USNewswire/ -- GIAC Global Industrial Cyber Security Professional (GICSP) certification now meets the requirements of the DoD Manual 8570.01 "Information Assurance Workforce Improvement Program" and is approved for the Department of Defense (DoD)...
News Article | February 23, 2017
HERNDON, Va.--(BUSINESS WIRE)--DLT Solutions (DLT), an award winning, public sector technology leader, and Pure Storage (NYSE: PSTG), the market’s leading independent solid-state array vendor, today announced a partnership. By joining the Pure Storage Partner Program (P3), DLT Solutions and Pure Storage can accelerate and de-risk the critical agency initiatives across the public sector. Pure Storage’s all-flash based technology helps address government’s modernization efforts to achieve results that drive operations forward – like going mobile, transforming to cloud IT, or unlocking insights with analytics. “The simplicity, automation and resiliency provided by Pure Storage are all essential to our public sector customers as they look to cut costs, and reduce power and space requirements despite growing data sets,” said Jim Propps, VP, Enterprise Platforms and Enterprise Data Management. “Pure Storage will be a strong partner to enhance our data management offering and help keep DLT on the cutting edge of industry technology as they modernize the storage market.” Pure Storage's FlashArray//M delivers the simplicity, ease of implementation, power efficiency, security and performance needed to run data intensive applications within federal agencies. The Pure Storage FlashArray, now available on DLT’s GSA Schedule, also meets the availability, reliability and scalability requirements of government agencies while users experience as much as 10x the performance of disk drives with easy set-up and operation, data-at-rest encryption and Rapid Data Lock technology for all-inclusive security. "IT departments have to get the most out of every dollar spent on technology and ensure they are improving business outcomes," said Michael Sotnick, VP of Global Channels and Alliances, Pure Storage. "This is especially true for government agencies who are held accountable by their citizens. We are thrilled to work with DLT to ensure that these agencies have an innovative, secure and efficient storage solution.” Pure's FlashArray//M has earned the National Information Assurance Partnership (NIAP) Common Criteria Certification (Network Device Protection Profile, v1.1). This certification validates that products in the Pure Storage FlashArray portfolio meet the stringent testing and technical requirements for security mandated by the NSA in alignment with DLT’s best-in-class solutions enabling the public sector to meet compliance and streamline the procurement process. DLT is a leading technology partner to the federal, state and local government, education, utilities and healthcare markets. For more than 25 years, the company’s dedication to helping the public sector make smart technology choices and simplify their technology procurements ensures its customers have the best options for Cybersecurity, Cloud, Application Lifecycle, Digital Design, IT Consolidation and IT Management solutions. The DLT advantage includes strategic partnerships with industry leading and emerging technology companies - including Amazon Web Services, Autodesk, ForeScout, Google, Informatica, Intel Security, Oracle, Quest Software, Red Hat, SolarWinds, Symantec and Veritas - whose products and services can be easily procured through DLT by leveraging its broad portfolio of government IT contracts including, GSA, SEWP V, U.S. Communities and Texas DIR. To learn more, visit DLT’s Resource Center, call 800.262.4358 or email email@example.com. Also on LinkedIn and Twitter (@DLTSolutions).
News Article | March 2, 2017
PHOENIX--(BUSINESS WIRE)--Axway (Paris:AXW) (Euronext: AXW.PA), a catalyst for transformation, today announced that it has received the access control and policy management Common Criteria certification for Axway API Gateway, meeting the latest requirements from the U.S. Federal Government to conduct business within government and international agencies and other highly regulated industries. Axway API Gateway is the only product in the web access control category to meet the strict requirements for achieving Common Criteria certification. With the completion of the Common Criteria evaluation, Axway is now certified to sell solutions to highly regulated entities such as the U.S. Federal Government, international governments and other managed industries around the world. The importance of security has never been more visible and important given the increase of security breaches in recent years. Whether it’s helping to protect against security threats, speeding up the approval of patents critical to work conducted by regulated entities or safeguarding digital assets, organizations today need software solutions that have built in visibility, security and governance capabilities. “The certification of Axway API Gateway further demonstrates our commitment to delivering products that meet the highest international standards for IT and support the needs of the federal government and other highly regulated industries around the globe,” said Jeanine Banks, executive vice president, global products and solutions, Axway. “Axway is leading the API economy with certification and this latest recognition is an important accomplishment that validates the leading security capabilities of Axway’s API solutions. We are proud to achieve this milestone.” The Common Criteria is a set of internationally recognized standards used by the federal government to assess the security and assurance of technology products. The certification of Axway API Gateway was made against the most recent version of the access control and policy management Protection Profiles (PP) – v2.1 – which contains many more security requirements than previous versions. The National Information Assurance Partnership (NIAP) is responsible for the U.S. implementation of the Common Criteria and other certifications critical to U.S. government customers. To read more about Axway API Management, click here. Learn more about how regulated entities can benefit from Axway solutions here. Read why Axway is positioned as a Leader in the Gartner Magic Quadrant for Full Life Cycle API Management, here. Axway (Euronext: AXW.PA) is a catalyst for transformation. With Axway AMPLIFY™, our cloud-enabled data integration and engagement platform, leading brands better anticipate, adapt and scale to meet ever changing customer expectations. Our unified, API-first approach connects data from anywhere, fuels millions of apps and delivers real-time analytics to build customer experience networks. From idea to execution, we help make the future possible for more than 11,000 organizations in 100 countries. To learn more about Axway, visit www.axway.com.
News Article | February 23, 2017
ORLANDO, Fla.--(BUSINESS WIRE)--ZeroChaos, a global provider of workforce management solutions, today announced the opening of the ZeroChaos Cybersecurity Lab in Fall 2017 on the campus of Bethany College in Bethany, West Virginia. The lab, funded by ZeroChaos, will allow students to simulate cyberattacks in a controlled environment without harming any networks. The state-of-the-art facility will feature both an air gap and a forensics laboratory for Bethany’s Cybersecurity and Cybersecurity-Information Assurance majors. The institution hopes these majors will become signature programs for the college and enroll a significant student population. “We are pleased to be a corporate partner with Bethany College, which has a long history of educating future leaders in various disciplines who make an impact on their communities and professions,” says Doug Goin, ZeroChaos chief administrative officer. “We believe combining the technical expertise gained from these programs with the quality liberal arts program at Bethany College will cultivate well-rounded professionals who enter the workforce ready to make a positive impact on companies like ours.” As a global corporation that offers human resources and procurement counsel to some of the world’s most reputable brands, ZeroChaos understands the importance of sustained growth in the IT field as the industry faces an increasing shortage in skilled talent. “There is a global talent deficiency when it comes to cybersecurity, in part because students have limited opportunities to learn how to prepare for and respond to these attacks,” Goin said. “Conducting simulated attacks in the lab will help us begin closing the talent gap by providing well-rounded education theory and practical application that equips students in this area.” The lab will be designed with the assistance of cybersecurity experts who work in both the private sector and some of the nation’s leading cyber research laboratories. Their expertise will help determine the development and implementation of the simulations based on insights derived from similar systems in place at the U.S. Naval Academy. The addition of the ZeroChaos Cybersecurity Lab plays a significant role in Bethany College’s overarching strategy of enhancing its academic programs as students prepare to compete in an ever-changing global workforce. As part of this approach, the private liberal arts institution which was founded in 1840, will add three new majors for the 2017-2018 academic year: Cybersecurity, Cybersecurity-Information Assurance and International Business. Students who major in Cybersecurity must take extensive math courses to learn encryption and software applications while those who major in Cybersecurity-Information Assurance will also be required to take business courses. Students in both majors will be encouraged to take psychology and ethics courses so they can better understand the motivations of hackers. Students can also minor in criminal justice so they can gain legal and investigatory system knowledge. “We must remain vigilant as technology – and its inherent threats – evolve,” says Goin. “ZeroChaos is proud to contribute to a long-term solution that addresses the serious shortage in skilled talent in the IT security space and prepares students to prevent and respond to imminent attacks on our systems.” ZeroChaos is a global provider of workforce management solutions that help organizations achieve greater management and financial control of their workforce and talent supply chains. ZeroChaos' award-winning solutions, including its vendor-neutral Managed Services Program, enable procurement and human resources to improve visibility into contingent labor spend and talent pools, effectively manage and optimize contingent workforce program performance, and mitigate risks. Headquartered in Orlando, ZeroChaos has global operations in the Americas, Europe, and Asia. For more information visit www.zerochaos.com, follow on Twitter @ZeroChaos, or connect with ZeroChaos on LinkedIn.
Wang J.,Information Assurance
Scientometrics | Year: 2013
This paper aims to inform choice of citation time window for research evaluation, by answering three questions: (1) How accurate is it to use citation counts in short time windows to approximate total citations? (2) How does citation ageing vary by research fields, document types, publication months, and total citations? (3) Can field normalization improve the accuracy of using short citation time windows? We investigate the 31-year life time non-self-citation processes of all Thomson Reuters Web of Science journal papers published in 1980. The correlation between non-self-citation counts in each time window and total non-self-citations in all 31 years is calculated, and it is lower for more highly cited papers than less highly cited ones. There are significant differences in citation ageing between different research fields, document types, total citation counts, and publication months. However, the within group differences are more striking; many papers in the slowest ageing field may still age faster than many papers in the fastest ageing field. Furthermore, field normalization cannot improve the accuracy of using short citation time windows. Implications and recommendations for choosing adequate citation time windows are discussed. © 2012 Akadémiai Kiadó, Budapest, Hungary.
Information Assurance | Date: 2011-03-02
A system and method for a terminal adapter including a telephony station interface, a data communications interface, and a processing unit. The processing unit is configured to establish a first connection over the data communications interface and a second connection over the telephony station interface. The processing unit is configured to communicate secure information between the first connection and the second connection. The processing unit includes a V.150 internetworking function, an Assured Services Session Initiation Protocol (AS-SIP) stack and/or a Datagram Transport Layer Security (DTLS)/Secure Real-time Transport Protocol (SRTP) stack.
Information Assurance | Date: 2015-08-12
Systems enable secure communication links with classified or unclassified networks using a single mobile computing device. In one embodiment, the system includes: a mobile computing device without an integrated data storage device that is configured to interchangeably receive an unclassified or classified data storage device; an encrypter device in signal communication with the mobile computing device; network security device in signal communication with the encrypter device; a classified data storage device loaded with a computer readable code configured for booting the mobile computing device when the classified data storage device is connected to the mobile computing device; and an unclassified data storage device loaded with a computer readable code configured for booting the mobile computing device when the unclassified data storage device is connected to the mobile computing device.