Wilmington, MA, United States
Wilmington, MA, United States

Time filter

Source Type

BROOKFIELD, Wis.--(BUSINESS WIRE)--Fiserv, Inc. (NASDAQ: FISV), a leading global provider of financial services technology solutions, today announced that its clients Bangkok Bank and Gesa Credit Union were recognized for their innovative use of technology by Retail Banker International (RBI) at the Retail Banking Conference and Awards 2017. Thailand’s Bangkok Bank won Best Mobile Banking Strategy for delivering ‘everyday, everywhere’ banking to its customers with Mobiliti Edge™ from Fiserv. Gesa Credit Union, located in Richland, Washington, won Retail Banking Security Innovation of the Year for pioneering the use of biometrics in their branches with Verifast™: Palm Authentication from Fiserv. The Retail Banking Awards by RBI highlight the achievements of retail banking organizations throughout the past year. Award winners are highly regarded within the industry as top performers representing an exceptional level of achievement. “These awards are a testament to the vision of Bangkok Bank and Gesa Credit Union, both of which are powerful examples of financial institutions that are using technology innovation to deliver experiences that fit seamlessly into people’s everyday lives,” said Andrew Steadman, vice president, Product Management and Marketing, International Group, Fiserv. Further details of the winning entries include: With fast-growing smartphone adoption in Thailand and the rising demand from customers for on-the-go banking tools to complement their mobile lifestyles, Bangkok Bank has been continually adding new functionality to its mobile banking proposition, Bualuang mBanking. With Bualuang mBanking, which is built on the Mobiliti Edge mobile banking and payments platform from Fiserv, Bangkok Bank customers have the ability to access financial services via a mobile phone, tablet or the Apple Watch. Additionally, the bank added mobile peer-to-peer (P2P) payments and advanced push notifications and alerts that can be received directly through the app. Almost one year after launching the P2P service and other enhancements of the user experience, the average payment transaction volume per month increased by 350 percent and revenue increased by 300 percent. Gesa Credit Union piloted the use of Verifast: Palm Authentication, a fast, secure and convenient biometric authentication solution based on near-infrared scanning of an individual’s palm vein patterns. Gesa reduced the time to authenticate a member in the branch by 93 percent, speeding up the teller line while enhancing security and improving the customer experience. On a 1-to-5-point scale with 5 being the best, about 99.9 percent of Gesa members using the solution rated the palm vein technology a 5 on both the registration process and use. In a world that is moving faster than ever before, Fiserv helps clients deliver solutions that are in step with the way people live and work today - financial services at the speed of life. Learn more at fiserv.com. Bangkok Bank, established in 1944, is one of Southeast Asia’s leading regional banks and Thailand’s market leader in international, corporate and business banking. It has the country’s largest customer base, more than 1200 branches, and a modern self-service network that includes its award-winning mobile banking service. The bank's ongoing market leadership is due to its philosophy of developing long-term supportive partnerships with customers. The bank’s scope of operations and complementary synergies means its offers an impressive breadth and depth of services to both local and international clients. Gesa Credit Union has served Washington State’s Tri-Cities community since 1953, and is one of the state’s largest credit unions with $1.8 billion in assets and 150,000 members. Gesa is a full service financial institution that offers a complete array of consumer, mortgage and business products and services. Headquartered in Richland, Washington, Gesa operates 18 branch offices in the Kennewick, Richland, Pasco, West Richland, Walla Walla, Wenatchee, East Wenatchee, Spokane, Spokane Valley, Yakima and Moses Lake communities. Gesa also supports ten student-operated high school branches – the most in the state. Gesa’s commitment to local communities includes support for Junior Achievement, Habitat for Humanity, annual youth scholarships, and free financial seminars open to members and the general public. For more information visit www.gesa.com. Fiserv, Inc. (NASDAQ: FISV) enables clients worldwide to create and deliver financial services experiences that are in step with the way people live and work today. For more than 30 years, Fiserv has been a trusted leader in financial services technology, helping clients achieve best-in-class results by driving quality and innovation in payments, processing services, risk and compliance, customer and channel management, and insights and optimization. Fiserv is a member of the FORTUNE® 500 and has been named among the FORTUNE Magazine World's Most Admired Companies® for four consecutive years, ranking first in its category for innovation in 2016 and 2017. For more information, visit fiserv.com.


MCLEAN, Va.--(BUSINESS WIRE)--BAE Systems’ Peder Jungck has been named president of the Information Technology - Information Sharing and Analysis Center (IT-ISAC), an influential not-for-profit organization composed of member companies dedicated to enhancing cyber security by sharing threat information and collaborating on effective mitigations of cyber risk. IT-ISAC members include C-suite technology and security leaders from the world’s largest technology companies, including Intel, Oracle, and Hewlett Packard Enterprise. IT-ISAC members actively collaborate to protect their enterprises and the collective global information infrastructure. The exclusive, industry-only forum also works closely with the U.S. Department of Homeland Security to help companies around the world minimize threats, manage risk, and provide near real-time responses to real-world cybersecurity challenges. “IT-ISAC engages a global network of subject-matter experts from the world’s leading technology companies to enhance cross-industry awareness of emerging cyber threats,” said Jungck, chief technology officer of BAE Systems’ Intelligence & Security sector. “The organization is itself a cyber defense force multiplier that is helping to protect global commerce and enhance international security.” Cyber security is of paramount importance for BAE Systems. The company shares more information about cyber threats than any other member of the defense industrial base. BAE Systems also made international news in May 2016 for its strategic cyber threat intelligence (CTI) sharing partnership with Fujitsu of Japan. “As a best practice, BAE Systems harnesses all of the data surrounding cyber-attack strings, etc. that target our network,” Jungck said. “When we identify and neutralize these threats to our own network, we can share this cyber threat data with our industry partners. Industry collaboration through crowdsourcing is an effective way to share the rewards of a safer cyberspace, at a reduced cost. CTI sharing is the logical first step for any organization seeking to implement a holistic cyber defense strategy.” Jungck has more than 20 years of experience within the IT industry, dealing with information assurance, secure computing, and network security challenges. Over the course of his career, Jungck has served as a CTO of a Silicon Valley venture capital firm and led a variety of IT and cybersecurity businesses, which have developed large-scale managed service offerings providing trusted IT infrastructure and cyber defense for commercial enterprises, telecommunications carriers, and the U.S. government. In recognition of his work, Jungck has earned 26 patents in networking and security, as well as published a book and peer-reviewed works on secure computing and software defined networking. He has also spent considerable time and effort with start-ups and developing industry communities related to cyber, including being an early board member of Cyber Maryland, a member of the National Initiative for Cybersecurity Education’s NICE365 Industry Advisory Board, a Security Innovation Network (SINET) 16 Advisor, and a STARS Mentor for Mach37 (Virginia Cyber Accelerator). BAE Systems provides intelligence and security services to manage big data, inform big decisions, and support big missions. BAE Systems delivers a broad range of solutions and services including intelligence analysis, cyber operations, IT, systems development, systems integration, and operations and maintenance to enable militaries and governments to recognize, manage, and defeat threats. The company takes pride in supporting critical national security missions that protect the nation and those who serve.


News Article | April 17, 2017
Site: www.prweb.com

Lumeta Corporation, the authority on providing cyber situational awareness for rapid security response, today announced that its Lumeta Enterprise Situational Intelligence (ESI) platform now integrates with McAfee ePolicy Orchestrator® (McAfee® ePO™). This technology integration provides customers real-time visibility to proactively identify, manage and respond to endpoint security issues and threats across dynamic cloud, virtual, mobile and physical networks. Lumeta ESI recursively and authoritatively indexes all connected endpoints, networks and devices across environments and immediately detects new devices connecting to the network, allowing companies to quickly and effectively identify and remediate threats. McAfee® ePO™ includes McAfee® Active Response, a comprehensive Endpoint Detection and Response (EDR) feature for Indicator of Attack (IoA). The integrated Lumeta ESI and McAfee® ePO™ solutions are now available and deliver continuous, real-time detection of and response to advanced security threats to help security practitioners monitor security posture, improve threat detection, and expand incident response capabilities through forward-looking discovery, detailed analysis, forensic investigation, comprehensive reporting and prioritized alerts and actions. Users can launch directly into McAfee® ePO™, including McAfee® Active Response, to deliver continuous detection of and response to advanced security threats. Forward-looking discovery, detailed analysis, forensic investigation, comprehensive reporting, and prioritized alerts and actions enable security practitioners to monitor security posture, improve threat detection and expand incident response capabilities. “Lumeta uniquely provides companies with accurate endpoint visibility to automate and expose threats in real-time so companies gain the foundational intelligence needed to properly secure their networks,” said Reggie Best, chief product officer at Lumeta. “The integrated Lumeta ESI and McAfee® ePO™ solutions deliver comprehensive endpoint threat detection and response capabilities to help companies achieve a new level of cyber situational awareness that gives them the context and intelligence required to detect and remediate threats before a breach.” With Lumeta ESI, McAfee® Active Response can now manage, on average, more than 20 percent of devices on an IT infrastructure (including networks and endpoints) that are unknown to other solutions, providing better infrastructure protection. Optimized to meet stringent endpoint detection and response (EDR) criteria, McAfee® Active Response uses predefined and user-customizable collectors to search deeply across all accessible systems to find indicators of attack (IoAs) that are not only present via running processes, but also may be lying dormant or may have been deleted. “Providing our mutual customers with better data protection and an improved Threat Defense Lifecycle are the top priorities for the McAfee Security Innovation Alliance,” said D.J. Long, head of the McAfee Security Innovation Alliance. “Partnering with Lumeta to combine the strengths of both companies is key to being able to deliver on those goals and minimizing the toll of advanced threats troubling business, government and consumer data.” ABOUT LUMETA Lumeta delivers real-time cyber situational awareness that quickly and effectively identifies and remediates threats before a breach impacts an organization. Lumeta’s cyber situational awareness platform, ESI, reduces the risk to companies by streamlining network response and change, and adding security intelligence to dynamic network elements, endpoints, virtual machines, cloud-based infrastructure, policies and segmentation changes. Lumeta complements and optimizes existing network and security product investments by feeding them accurate, comprehensive network intelligence. Headquartered in Somerset, New Jersey, Lumeta has operations and clients throughout the world. Visit us at http://www.Lumeta.com or follow us on Twitter at @Lumeta.


News Article | June 6, 2017
Site: globenewswire.com

WILMINGTON, Mass., June 06, 2017 (GLOBE NEWSWIRE) -- Security Innovation, a leader in software security assessment and consulting services, announced today its upcoming participation in a mobile security training session at Black Hat USA, to be held on July 22-25 in Las Vegas, NV. Dinesh Shetty, Senior Manager and Mobile Center of Excellence Lead, Security Innovation, will be lead instructor for the session entitled “Offensive Mobile Application Exploitation.”  In this course, Shetty along with Prateek Gianchandani from Cognosec, will explain and give hands-on demonstrations of the application vulnerabilities for the latest jailbroken version of iOS and Android. This session is targeted at security professionals and mobile developers who are interested in learning about effective mobile application security. “The biggest issue I have with traditional conference trainings has been the lack of a practical, hands-on approach toward testing vulnerabilities,” said Shetty. “With this in mind, we have revamped our Practical Android and iOS course - sold out at past conferences - to include an interactive component for each vulnerability. Gone are the days of looking at instructions on bland PowerPoint slides and wondering if it will actually work.” About Dinesh Shetty Dinesh leads Security Innovation's Mobile Center of Excellence. A mobile security expert for more than 6 years, Dinesh is a prolific researcher, writer, and speaker. He is published in more than a dozen magazines and has presented at numerous conferences around the world including Black Hat (US and Europe), DEFCON, and OWASP (US and AsiaPac). He is a member of the Apple Security Hall of Fame and holds a number of professional certifications. Shetty recently authored and release the iOS Hacking Guide, a free resource providing hackers, developers and managers alike an in-depth guide to the different kinds of iOS hacking tools and techniques. About Security Innovation Since 2002, organizations have relied on Security Innovation for our unique software and application security expertise to help secure and protect sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud.  A best in class security training, assessment and consulting provider, Security Innovation has been recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Training for three years in a row.  Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.


News Article | June 6, 2017
Site: globenewswire.com

WILMINGTON, Mass., June 06, 2017 (GLOBE NEWSWIRE) -- Security Innovation, a leader in software security assessment and consulting services, announced today its upcoming participation in a mobile security training session at Black Hat USA, to be held on July 22-25 in Las Vegas, NV. Dinesh Shetty, Senior Manager and Mobile Center of Excellence Lead, Security Innovation, will be lead instructor for the session entitled “Offensive Mobile Application Exploitation.”  In this course, Shetty along with Prateek Gianchandani from Cognosec, will explain and give hands-on demonstrations of the application vulnerabilities for the latest jailbroken version of iOS and Android. This session is targeted at security professionals and mobile developers who are interested in learning about effective mobile application security. “The biggest issue I have with traditional conference trainings has been the lack of a practical, hands-on approach toward testing vulnerabilities,” said Shetty. “With this in mind, we have revamped our Practical Android and iOS course - sold out at past conferences - to include an interactive component for each vulnerability. Gone are the days of looking at instructions on bland PowerPoint slides and wondering if it will actually work.” About Dinesh Shetty Dinesh leads Security Innovation's Mobile Center of Excellence. A mobile security expert for more than 6 years, Dinesh is a prolific researcher, writer, and speaker. He is published in more than a dozen magazines and has presented at numerous conferences around the world including Black Hat (US and Europe), DEFCON, and OWASP (US and AsiaPac). He is a member of the Apple Security Hall of Fame and holds a number of professional certifications. Shetty recently authored and release the iOS Hacking Guide, a free resource providing hackers, developers and managers alike an in-depth guide to the different kinds of iOS hacking tools and techniques. About Security Innovation Since 2002, organizations have relied on Security Innovation for our unique software and application security expertise to help secure and protect sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud.  A best in class security training, assessment and consulting provider, Security Innovation has been recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Training for three years in a row.  Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.


Patent
Security Innovation | Date: 2016-12-16

A secure vehicle communication system relies on credentials to provide security. A credential includes a private key and a digital certificate. A generic credential file format that is generalized to hold information from multiple credential file formats is provided. Various optimizations enhance the efficiency of the security system, keys may be pre-derived to reduce latency and digital certificates may be sorted and pre-loaded to reduce start-up time. An API may be provided to provide a common interface that abstracts away hardware dependency of secure hardware.


News Article | July 17, 2017
Site: globenewswire.com

WILMINGTON, Mass., July 17, 2017 (GLOBE NEWSWIRE) -- In partnership with Women in Security and Privacy (WISP), Security Innovation, cybersecurity provider and leader in the Gartner Magic Quadrant for Security Training three years in a row, will be running a conference-wide interactive web application contest at DEF CON 25 Las Vegas, NV this year. The contest, hand-selected by the DEF CON contest committee, is called CMD+CTRL.  CMD+CTRL is a highly interactive learning event where development and IT teams come together to put their security skills to the test. Players learn offensive and defensive tactics in real-world environment where they compete to find vulnerabilities in web applications and defend IT infrastructure.  At DEF CON, the contest will be based on Security Innovation’s Web Application CMD+CTRL Hackathon. “We are excited to run our second DEF CON contest with CMD+CTRL this year,” said Joe Basirico, VP of Services.  “It’ll be another fun opportunity to test out skills and compete with friends and other attendees. See you on the scoreboard!” "Security competitions are a valuable way to develop and demonstrate a sound understanding of technical security," said Kenesa Ahmad, Co-Founder and Chair, Women in Security and Privacy. "It's important to make these opportunities available for those just entering or exploring the security industry as well as seasoned professionals looking to expand and refine their skills." Recently Security Innovation has run their CMD+CTRL Hackathon at several industry association meetings and events including: RSA, ToorCon, OWASP AppSec California, SecureWorld Portland, Connected Security Expo; as well as for many enterprise clients around the globe. About Security Innovation Since 2002, organizations have relied on Security Innovation for our unique software and application security expertise to help secure and protect sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud.  A best in class security training, assessment and consulting provider, Security Innovation has been recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Training for three years in a row.  Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter. About Women in Security and Privacy (WISP) Women in Security and Privacy is a 501(c)(3) organization advancing women to lead the future of privacy and security. Its programs and initiatives empower women to steer the converging industry through technical and professional development. For more information, visit www.wisporg.com. About DEF CON Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge hacking research from the most brilliant minds in the world and test their skills in contests of hacking might.  For more information, visit www.defcon.org.


News Article | August 2, 2017
Site: globenewswire.com

WILMINGTON, Mass., Aug. 02, 2017 (GLOBE NEWSWIRE) -- Security Innovation, the worldwide leader in application security training and assessment services announced today the addition of Jeff Emig as Chief Operating Officer to company’s executive team. In this newly created role, Emig will work closely with Ed Adams, CEO of Security Innovation, on the company’s overall strategy and execution. “I’ve known and worked with Jeff for over 9 years,” said Ed Adams, CEO of Security Innovation. “Jeff’s track record of driving profitable growth and operational excellence make him an exciting addition to the Security Innovation team. I’m proud of the progress Security Innovation has made to date, and now is the time to accelerate our growth with strategic prioritization and execution. His appointment further strengthens our world-class team of executive talent and reflects our belief in becoming the trusted advisor in application security.” Emig brings strong financial, strategy, and management experience to Security Innovation, where he’s served on the company’s Board of Directors since 2008. Previously, he served as Chief Operating Officer for RobbinsKersten Direct, where he drove rapid revenue growth and successfully closed and integrated several acquisitions. Prior to that, Jeff was a Principal at Brook Venture Partners, serving as an active investor in growth stage software companies.  Before Brook, he was a founding team member at Tenor Networks, a firm focused on developing high-end optical networking equipment. While at Tenor, Jeff built the finance and operations groups and assisted in raising over $120M of Venture Capital through three rounds of financing. He started his career in various finance and operations roles in 3Com Corp.’s Switching Division. A Tuck School of Business at Dartmouth College graduate, Emig received his MBA after graduating from the University of Massachusetts in Finance and Operations Management. Jeff will continue to serve on Security Innovation’s Board of Directors. "I’m excited to work closely with Ed and the executive team on growing Security Innovation,” said Emig. “Our company is the most trusted advisor in software security and has enormous potential ahead. I look forward to working with such a talented team and helping to lead the company to its next phase of rapid growth tied with operational excellence." About Security Innovation Since 2002, organizations have relied on Security Innovation for our unique software and application security expertise to help secure and protect sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud.  A best in class security training, assessment and consulting provider, Security Innovation has been recognized as a Leader in the Gartner Magic Quadrant for Security Awareness Training for three years in a row.  Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information, visit www.securityinnovation.com or connect with us on LinkedIn or Twitter.


Patent
Security Innovation | Date: 2014-07-22

A method for signing a digital message, including the following steps: selecting parameters that include first and second primes, a ring of polynomials related to the primes, and at least one range-defining integer; deriving private and public keys respectively related to a random polynomial private key of the ring of polynomials, and to evaluations of roots of unity of the random polynomial to obtain a public key set of integers; storing the private key and publishing the public key; signing the digital message by: (A) generating a noise polynomial, (B) deriving a candidate signature by obtaining a hash of the digital message and the public key evaluated at the noise polynomial, and determining the candidate signature using the private key, a polynomial derived from the hash, and the noise polynomial, (C) determining whether the coefficients of the candidate signature are in a predetermined range dependent on the at least one range-defining integer, and (D) repeating steps (A) through (C) until the criterion of step (C) is satisfied, and outputting the resultant candidate signature as an encoded signed message.


Patent
Security Innovation | Date: 2015-01-05

A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.

Loading Security Innovation collaborators
Loading Security Innovation collaborators