News Article | February 14, 2017
Dr. William Whyte, Chief Scientist for Security Innovation, a leader in automotive, embedded, and IoT cyber security, will be presenting at the 2017 RSA Conference in San Francisco, CA. His presentation, titled Choosing Parameters for NTRUEncrypt in the Public Key Implementations session, will give guidance to cryptographic professionals on choosing the best parameters for NTRU, the world’s most trusted quantum-resistant crypto algorithm. The session on Tuesday Feb 14th at 1:15 PM - 2:00 PM in Yerba Buena 10 at the Marriott Marquis will also feature Marc Joye, Security Technologist from NXP Semiconductors. About RSA Conference 2017 Held on Feb 13-17 at San Francisco’s Moscone Center, the RSA Conference’s mission is to connect you with the people and insights that will empower you to stay ahead of cyber threats. RSA Conference is your best resource for exchanging ideas, learning the latest trends and finding the answers you are looking for. About Security Innovation For over 10 years, the world-renowned experts at Security Innovation’s Embedded Security Division, OnBoard Security, have been pioneering technologies that protect the Internet of Things, now and for the future. We address three significant challenges: ensuring the security and privacy of connected vehicles, making hardware roots of trust easy to use, and avoiding the existential threat from quantum computers to the integrity of the internet. Headquartered in Wilmington, MA, we are best known for the award-winning Aerolink® V2X libraries that are the de facto standard for connected vehicle security and privacy; our patented NTRU algorithm which is the most tested and trusted quantum-resistant cryptosystem; and our TSS 2.0 & 1.2 middleware that simplifies implementation of Trusted Platform Modules. For more information please visit: www.securityinnovation.com or connect with us on LinkedIn or Twitter.
News Article | March 1, 2017
LOS ANGELES--(BUSINESS WIRE)--Gurucul, a leader in user and entity behavior analytics (UEBA) and identity analytics (IdA) for on-premises and the cloud from the context of big data with machine learning, today announced that Borderless Behavior Analytics - Who’s Inside? What’re They Doing? by CEO Saryu Nayyar is now available for Kindle. According to Jim Routh, CSO of Aetna, this book “is a collection of thought-provoking content from industry luminaries presenting practical guidance based on expertise essential to the impact of models on security risk-based maturity, for enterprises large and small, moving at customer speed.” WHO: Borderless Behavior Analytics features chapters by Gary Eppinger, CISO of Carnival Corporation; Jerry Archer, CSO of a Major Financial Services Company; Joe Sullivan, CSO of Uber; Teri Takai, former CIO of the Department of Defense (DoD); Robert Rodriguez, chairman, founder of Security Innovation Network (SINET); Leslie K. Lambert, former CISO of Juniper Networks and Sun Microsystems; Gary Harbison, CISO of Monsanto. WHAT: Borderless Behavior Analytics is a compilation of articles by these top CISOs and CSOs on how identity has become the fulcrum for most of today’s more serious attacks and data theft. The book captures shared experiences and best practices, while exploring the growing importance and lack of awareness of identity as an access risk and threat plane, also known as the CIO and CISO divide. WHERE: Borderless Behavior Analytics for Kindle can be downloaded at https://www.amazon.com/Borderless-Behavior-Analytics-Inside-Whatre-ebook/dp/B06X9T3PSL/. The free Kindle App is available at: https://www.amazon.com/kindle-dbs/fd/kcp. WHEN: Borderless Behavior Analytics is available immediately for $0.99 until March 3rd. The cost beginning March 4th will be $8.95. HOW: Visit https://www.amazon.com/Borderless-Behavior-Analytics-Inside-Whatre-ebook/dp/B06X9T3PSL/ to download Borderless Behavior Analytics for the Kindle App. The editorial team has already started working with new contributors and an early preview of their articles is included in the first edition of the book. Jairo Orea, Chief Information Security Architect for a Fortune 10 company, weighs in on hybrid environment architecture and the role of data brokers, cloud brokers and identity brokers. Devin Bhatt, CISO and Chief Privacy Officer for the U.S. Federal Government, provides a focused perspective on insider threats as a new chapter in the second edition. Those individuals interested in future editions, supporting blogs and comments about the book should visit www.borderlessbehavioranalytics.com. Gurucul is changing the way enterprises protect themselves against insider threats, account compromise and data exfiltration on-premises and in the cloud. The company’s user behavior analytics and identity access intelligence technology use machine learning anomaly detection and predictive risk-scoring algorithms to reduce the attack surface for accounts, unnecessary access rights and privileges, and to identify, predict and prevent breaches. Gurucul technology is used globally by organizations to detect insider threats, cyber fraud, IP theft, external attacks and more. The company is based in Los Angeles. To learn more, visit http://www.gurucul.com/ and follow us on LinkedIn and Twitter.
News Article | March 2, 2017
WILMINGTON, Mass., March 02, 2017 (GLOBE NEWSWIRE) -- Security Innovation, a pioneer in software security, announced the hiring of Christina Howe as VP of Marketing. Chris will be responsible for all facets of the company’s go to market, thought leadership, and demand generation strategies. Additionally, Chris will be a major stakeholder in the company’s sales strategy, ensuring that revenue growth accelerates. 2016 was the company’s 4th consecutive year of record sales and is rapidly expanding into new markets. Chris is a proven leader in the successful development and implementation of global marketing strategies that drive revenue. Prior to joining Security Innovation, she was the Director of Digital Marketing for Compuware’s Application Performance Management business unit. Prior to that, she held various executive marketing positions at technology firms such as Avid, Rational/IBM, and Sybase where she honed her customer experience and market analytical skills. Chris also founded C Change Consulting where as Principal, she provided strategic consulting services including interim and transitional leadership. “Security Innovation has a long-standing reputation as a trusted advisor for organizations in need of enterprise grade application security solutions,” said Edward Adams, CEO. “Chris is an exceptional leader with a remarkable track record. Her creative thinking and next generation marketing skills will build the platform we need to elevate our expert profile and scale our business globally.” Chris’s experience at Rational/IBM and Compuware brings specialized knowledge into how software applications are built and the pressures put on development teams. Leveraging this insight, Chris will be tasked with building strategic programs that elevate the company’s profile as the foremost experts in application security assessment and training. “I’m excited by the opportunity to join the Security Innovation team and look forward to contributing to greater success,“ said Howe. “We have already established a leading position in application security solutions space and now have the opportunity to extend our solutions and services to new markets. I look forward to helping support our next phase of growth.” Since 2002, Security Innovation has been the trusted partner for software security for the world’s leading companies. Security Innovation is dedicated to securing and protecting sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information please visit: www.securityinnovation.com or connect with us on LinkedIn or Twitter.
News Article | February 15, 2017
SAN FRANCISCO--(BUSINESS WIRE)--Today Intel Security outlined a new, unifying approach for the cybersecurity industry that strives to eliminate fragmentation through updated integrated solutions, new cross-industry partnerships and product integrations within the Intel Security Innovation Alliance and Cyber Threat Alliance (CTA). “Transforming isolated technologies into a cohesive security system is without a doubt the most daunting challenge facing practitioners today,” said Chris Young, senior vice president and general manager of Intel Security Group. “The battle against our adversaries cannot be fought alone; it will take people, products, organizations and industries working together to eliminate the fragmentation of security through automation, partnerships and unified architectures.” The workforce shortage facing the cybersecurity industry makes it increasingly difficult to hire and retain employees. These scarce resources make it harder to maintain a coherent security architecture to prevent damage from and minimize the cost of emerging threats while embracing the potential of new open source, digital, cloud and security technologies. Our research and customer discussions have underscored the need for trusted partners that work cooperatively to reduce the burden of fragmented technologies and help organizations stay focused on securing their business assets and productivity. With this in mind, Intel Security is pleased to announce several new product integrations and updates, new industry partnerships and increased open source and standards-based collaboration that will strengthen the effectiveness of cybersecurity infrastructure across the industry’s largest open ecosystem. At the heart of a unified strategy for cybersecurity is the need for integrated solutions that tie into the enterprise’s framework to address top-of-mind challenges. Intel Security announces new and updated solutions that do exactly that: McAfee® Enterprise Security Manager (ESM) 10 and McAfee® Virtual Network Security Platform (vNSP). With the high cost of detecting and resolving cyberattacks, the need for SIEM solutions that are intelligent and intuitive has never been greater. The newly released McAfee ESM 10 joins an expanded McAfee® Foundstone™ security operations center (SOC) services portfolio to help security analysts to be far more effective. New capabilities include: The need for advanced malware protection within the public cloud environment calls for integrated virtual solutions. McAfee® vNSP now extends virtual network protection to Amazon Web Services* (AWS) cloud and OpenStack* cloud deployments, with new simplified multi-cloud licensing, easily protecting virtual networks. New capabilities include: Transforming fragmentation requires the industry to work cooperatively to build meaningful integrations. Today, the Intel Security Innovation Alliance, the industry’s premier technology partnering program, announces 15 new partnerships, bringing the total number of partners to more than 135 globally. Over the past year, 35 partners have integrated or planned integrations with the McAfee Data Exchange Layer (DXL), the industry-endorsed communication fabric, providing real-time interaction between applications. Since announcing the OpenDXL initiative – an open industry standard for all developers to increase integration flexibility, simplicity and opportunity – Intel Security has expanded its commitment to open source and community adoption. Today, Intel Security is publishing more open source software on github.com/opendxl to further reduce high-integration complexity and cost, and replacing lengthy manual and repetitive processes for enterprises. These advancements include: Intel Security also announced that it is now sharing and consuming advanced threat intelligence through the Cyber Threat Alliance Platform (CTAP) and that it has a plan to further integrate CTAP with its products. CTAP is a platform that scores and shares threat intelligence among members of the Cyber Threat Alliance. Shared CTAP Indicators of Compromise help Intel Security and other CTA members detect and better understand new, emerging attack campaigns. This allows CTA members to more quickly protect their customers’ systems. As announced earlier today by the Cyber Threat Alliance, it is now formally incorporated as an independent, 501(c)(6) entity, with a president, board of directors and permanent standing committees. It is generously funded by the founding members – Intel Security, Fortinet*, Palo Alto Networks*, Symantec*, Check Point* and Cisco Systems*. Each founding member has committed $1 million over the next two years to the success of the Cyber Threat Alliance. For more information on McAfee ESM 10, visit mcafee.com/esm. For more information on McAfee vNSP, visit mcafee.com/us/products/virtual-network-security-platform.aspx. For more information on McAfee NSP, visit mcafee.com/us/products/network-security-platform.aspx. For more information on the Intel Security Innovation Alliance, visit securingtomorrow.mcafee.com/business/sia-ecosystem-updates. For more information on the OpenDXL initiative, visit mcafee.com/dxl or https://github.com/opendxl. For more information on the Cyber Threat Alliance, see the full announcement at http://cyberthreatalliance.org. For all press materials related to Intel Security’s RSA announcement, visit https://newsroom.intel.com/press-kits/2017-rsa/. Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone. Intel Security is a division of Intel. www.mcafee.com Intel Security technologies’ features and benefits depend on system configuration and may require enabled hardware, software, or service activation. Learn more at intelsecurity.com. No computer system can be absolutely secure. This document contains information on products, services and/or processes in development. All information provided here is subject to change without notice. Contact your Intel Security representative to obtain the latest forecast, schedule, specifications, and roadmaps. Intel, the Intel logo, McAfee and the McAfee logo are registered trademarks of Intel Corporation in the United States and other countries. Amazon Web Services and AWS are trademarks of Amazon.com, Inc. or its affiliates in the United States and/or other countries. The OpenStack Word Mark is either a registered trademark/service mark or trademark/service mark of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. Intel is not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community. *Other names and brands may be claimed as the property of others.
News Article | November 7, 2016
PARAMUS, New Jersey, November 7, 2016 /PRNewswire/ -- Qognify, formerly NICE Security, today announced that Denver Regional Transportation Security Program has been awarded Security Technology Executive Magazine's (STE) top prize in its 10th annual Security Innovation Awards, winning...
News Article | February 14, 2017
WILMINGTON, Mass., Feb. 14, 2017 (GLOBE NEWSWIRE) -- Security Innovation, the worldwide leader in application security training and testing services, today has announced that it intends to spin off its SI-Embedded business unit and create a sister company called OnBoard Security. The company will comprise the SI-Embedded business unit that has in recent years emerged as a leading provider to the Vehicle-to-Vehicle (V2V) security, trusted computing and advanced cryptography markets. The move sharpens the strategic focus and shareholder value of both companies. “Security Innovation is thrilled to bring OnBoard Security into the world,” said Ed Adams, CEO of Security Innovation and Chairman of OnBoard Security. “I’m confident that they will flourish and become an even more potent force for the future of IoT security. As a sister company with complementary solutions, we expect to enjoy a close and mutually profitable relationship long after the divestment.” Peter Samson will be named president of the new company. He is currently the senior vice president responsible for the SI-Embedded business. “We will continue to be the security expert that car makers, PC manufacturers, cryptographers and IoT companies have admired and trusted for years,” Samson said. “As an independent company, we will intensify the already laser-like focus on our niche products and global customers while accelerating the new research and development needed to continue delivering innovation and thought leadership.” OnBoard Security products will include the award-winning Aerolink® Vehicle-to-Vehicle (V2V) security libraries and related products, the NTRU post-quantum cryptography algorithm that solves the existential threat to internet security and TCG Software Stacks (TSS) that simplify the implementation of Trusted Platform Modules (TPMs). Services include Transportation Infrastructure Security Consulting, Connected and Autonomous Vehicle Security Consulting and IoT Secure Boot/Attestation Consulting. This divestiture is expected to be completed within the first quarter. About Security Innovation Since 2002, Security Innovation has been the trusted partner for cybersecurity risk analysis and mitigation for the world’s leading companies. Security Innovation is dedicated to securing and protecting sensitive data in the most challenging environments - automobiles, desktops, web applications, mobile devices and in the cloud. Security Innovation is privately held and headquartered in Wilmington, MA USA. For more information please visit: www.securityinnovation.com or connect with us on LinkedIn or Twitter.
News Article | November 29, 2016
DarkMatter, an international cyber security firm headquartered in the UAE, announces its participation at the forthcoming World Islamic Banking Conference (WIBC) 2016, taking place between 5 - 7 December, 2016 at the ART Rotana Hotel, Amwaj Islands, Manama, Bahrain. DarkMatter is the Cyber Security Innovation Partner to the event. Celebrating its 23rd year of existence, the conference theme this year is "Economic Uncertainties: Vigilance & Growth". WIBC 2016 is aimed at enabling Islamic finance to converge, strengthen and grow as an ecosystem whilst equipping leaders with breakthrough insights to navigate the complexity of the global financial system, and securing digital assets is part of that mandate. The banking and finance sector is of strategic significance to DarkMatter and is clearly an economic area heavily targeted by cyber criminals looking to steal, extort, or corrupt digital information with the view to benefiting financially. In the Middle East, cyber security generally remains an area of concern with a recent industry report estimating that the financial cost of cyber crime to the UAE alone has reached US$1.4 billion to date this year, an increase of 4.9 per cent year-on-year. Globally, the financial cost decreased by 16 per cent to US$125.9 billion during the same period, the report estimates, highlighting that in the UAE, and indeed other markets across the region, financial institutions need to take pro-active steps to defend and secure their digital assets from internal and external cyber threats. During its participation at WIBC 2016, DarkMatter is keen to emphasise the requirement for financial institutions to assume heightened security postures, with Harshul Joshi, Senior Vice President of Cyber Governance, Risk and Compliance set to make a keynote address considering 'Cyber Security Challenges Facing The Banking Industry in the Middle East'. Rabih Dabboussi, DarkMatter's Senior Vice President of Sales, Marketing and Business Development is set to offer his insights on why 'Cyber Security is an imperative in the Digital Banking Era', during a presentation to the assembled audience, where he will focus his comments on the requirement for the banking sector to develop a strong cyber security posture as institutions continue to adopt new technologies and advanced processes at a fast pace. Commenting on DarkMatter's participation at WIBC 2016, Rabih Dabboussi said, "The banking and finance community is well aware of the cyber threats their industry attracts, and our interest in being present at this important meeting of Islamic financiers is to bring home the message that there are technologies, tools, processes and specialists who can help them navigate this potentially hazardous landscape." WIBC is a premier gathering for top-level, global Islamic finance and banking industry figures drawn from institutional investors, asset managers, policy makers, and academics among other stakeholders. Key features for WIBC 2016 include a Governors' power table; specialised streams focused on banking leadership opportunities and asset management best practices; thought leadership from leading strategy consultants; and panel sessions focused on SMEs and entrepreneurs considering the impact of innovation in financial technology. DarkMatter is transforming the cyber security landscape. Headquartered in the UAE and operating globally, we're the region's first and only fully integrated digital defence and cyber security consultancy and implementation firm. Our elite team of global experts deliver advanced, next-generation solutions to governments and enterprises across the cyber security spectrum. We help clients simplify the enormous complexity of today's ever-evolving cyber threats. Our vision is to secure the future by protecting its technologies. Innovation and Research are cornerstones to our development and the activities in these areas underpin our entire range offerings, including Secure Communications, Public Key Infrastructure and Big Data & Analytics products. They also extend to our activities in Governance, Risk & Compliance, Cyber Network Defence, Managed Security Services, Infrastructure & System Integration, Test & Validation Labs, and Smart Solutions.
Security Innovation | Date: 2014-07-22
A method for signing a digital message, including the following steps: selecting parameters that include first and second primes, a ring of polynomials related to the primes, and at least one range-defining integer; deriving private and public keys respectively related to a random polynomial private key of the ring of polynomials, and to evaluations of roots of unity of the random polynomial to obtain a public key set of integers; storing the private key and publishing the public key; signing the digital message by: (A) generating a noise polynomial, (B) deriving a candidate signature by obtaining a hash of the digital message and the public key evaluated at the noise polynomial, and determining the candidate signature using the private key, a polynomial derived from the hash, and the noise polynomial, (C) determining whether the coefficients of the candidate signature are in a predetermined range dependent on the at least one range-defining integer, and (D) repeating steps (A) through (C) until the criterion of step (C) is satisfied, and outputting the resultant candidate signature as an encoded signed message.
Security Innovation | Date: 2015-01-05
A method for signing and subsequently verifying a digital message, including the following steps implemented using at least one processor-based subsystem: selecting parameters including an integer q and a relatively smaller integer p that is coprime with q; generating random polynomial f relating to p and random polynomial g relating to q; producing a public key that includes h, where h is equal to a product that can be derived using g and the inverse of f mod q; producing a private key from which f and g can be derived; storing the private key and publishing the public key; producing a message digest by applying a hash function to the digital message; producing a digital signature using the message digest and the private key; and performing a verification procedure utilizing the digital signature and the public key to determine whether the signature is valid.
News Article | February 15, 2017
CAMPBELL, CA--(Marketwired - Feb 8, 2017) - Bitglass, the total data protection company, today announced that it won the "Security Innovation of the Year" category in the 2016-2017 Cloud Awards, coming out ahead of several first-generation cloud security solutions. Bitglass is the only Cloud Access Security Broker (CASB) on the market offering real-time data protection on any device without agents. Now entering its seventh year, the cloud computing awards program celebrates excellence and innovation in the rapid-growth cloud computing market. The awards program accepts entries from across the globe, from organizations of any size. "Cloud adoption is at an all-time high and enterprises of all sizes and in all verticals are searching for ways to secure sensitive corporate data across applications," said Nat Kausik, CEO, Bitglass. "Bitglass is the leader in real-time data protection and we are continually innovating to address the changing threat landscape and meet the needs of our customers." Bitglass offers comprehensive end-to-end data protection for SaaS, IaaS, custom apps and workloads. In minutes, Bitglass can be configured to protect any application, whether hosted in the public cloud or in private infrastructure, all supported with Bitglass' agentless proxy architecture. Only Bitglass secures traffic from any app without cumbersome software or agents on the endpoint. "We live in a rapidly-changing world, and the sands are shifting every day in the cloud space," said Cloud Awards organizer Larry Johnson. "Cloud service providers need to be constantly innovating to stay relevant, which is why the awards program is so relevant year-on-year. As ever, the entrants for the Software-as-a-Service category have been particularly strong, and we would encourage everyone to keep their eyes on the upcoming SaaS Awards, catering specifically to this area of cloud computing." Visit Bitglass at booth #2244 in the South Expo Hall at the Moscone Center to learn more about CASBs and for a chance to win an Oculus Rift. About Bitglass Bitglass is a global next-generation Cloud Access Security Broker and agentless mobile security company based in Silicon Valley. The company's solutions enable real-time end-to-end data protection, from the cloud to the device. Bitglass is backed by tier-1 investors and was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. About the Cloud Awards The Cloud Awards is an international program which has been recognizing and honoring industry leaders, innovators and organizational transformation in cloud computing since 2011. The awards are open to large, small, established and start-up organizations from across the entire globe, with an aim to find and celebrate the pioneers who will shape the future of the Cloud as we move into 2017 and beyond. Categories include Most Promising Start-Up, Best SaaS, and "Best in Mobile" Cloud Solution. Finalists were selected by a judging panel of international industry experts. For more information about the Cloud Awards please visit http://www.cloud-awards.com/.