April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Homepage

GSN ASB Winner Profile: PureTech Systems

Beginning this July 17, GSN will publish detailed descriptions by Winners and Finalists of the reasons their entries were selected by the Judges; Don’t miss these in-depth descriptions , which will be available every day in the GSN Airport, Searport, Border Security Weekly; the Daily Insider and Cybersecurity Weekly newsletters!

We would like to nominate the PureTech Systems’ geospatial (map-based) video management command and control, combined with the PureActiv® long range patented video analytics for the GSN Border Security and Immigration“Best Long Range Surveillance Solution” award.

The solution has been selected, deployed, thoroughly tested and fully accepted through a rigorous multi-year process by the Department of Homeland Security’s Custom’s and Border Protection to provide long range border surveillance along the southern border of the United States and Mexico. It is now being considered by the CBP for its mobile deployment solution along the same border.

Most Video Management Systems manage cameras that extend to a few hundred yards at most. As such, the capabilities of the user interface reflect this relatively short distance. However, for border situation, cameras must utilize higher resolutions and larger lenses, and the VMS must include additional technologies to manage these greater distances and larger view volumes.In addition to its capability as a robust VMS system with video analytics, for border applications, several capabilities set it apart from other solutions:

a. Detection and Classification – The ability to detect and classify IOIs (Items of Interest) at extreme ranges and under difficult environmental conditions sets the PureActiv analytics part from others. The ability to not only accurately detect, but also track actual map locations (latitude, longitude and elevation) of IOIs in real time, using only video, provides the CBP officers critical information to monitor and apprehend targets.

b.Advanced camera control algorithms. Providing the user the ability to control a camera with precision at zoom ranges of 5 miles and beyond. This includes pointing accuracies of a few meters at extreme ranges. This feature also extends to camera auto follow, which locks onto the video image of the target and automatically controls the camera to retain lock, allowing the operator to take other response actions.

c.Map-Based sensor control. Manually steering a camera to a target at a range of 5 miles is an almost insurmountable task. The PureActiv map based control, allows a user to steer a camera to a specific map location by clicking on a map, by receiving coordinates from another sensor system or by manually entering target information given by a field officer.

d. The ability to add user landmarks. This provides the ability to direct responders to a geo-location and quicklyre-aim cameras to a location of interest, which can be time consuming when securing a vast area such as a country’s border.

e. Viewshed capability: As viewing distances become greater, more potential obstructions and terrain can block thecamera’s view. Having a map-based visual guide to indicate what the camera can view, and what the camera cannot view, based on these obstructions, can save valuable time in selecting the proper viewing camera.

Michigan city picks Leidos to manage its smart grid initiative

RESTON, VA July 19, 2017 Leidos (NYSE: LDOS), a FORTUNE 500® science and technology company, will implement the Lansing Board of Water and Light's new smart grid initiative using its new Smart Grid Select™ offering. Through this contract, Leidos will manage the installation of the municipal utility's advanced metering infrastructure (AMI), as well as provide meter data management (MDM), customer support portals and advanced grid and business analytics.

Leidos will deliver a state-of-the-art solution crafted to meet Lansing's specific needs with an expected completion by 2020.  The Smart Grid Select™ solution leverages information from Honeywell's Elster business for electric metering technology, Mueller Systems for water metering technology, and Corix Utility Services for metering installation services. This advanced metering system solution will deliver cutting-edge analytics and insights, which will improve system capacity and transmission and distribution infrastructure, efficiently manage outages, and provide the ability to develop new rates based on customer usage patterns.

"As smart grid technologies become more sophisticated, Leidos has expanded its service offerings to meet the complex needs of today's utilities. We will provide Lansing with future-ready solutions that will optimize their smart grid approach," said Jim Baxter, senior vice president for Leidos' energy and systems solutions business. "We want to ensure the best value and solution for Lansing's rate payers, while reducing risk and lowering costs for the utility."

The Lansing Board of Water and Light was founded in 1885 and is the largest municipally owned electric utility in Michigan. The utility provides electric service and street lighting to approximately 95,000 residential, commercial and industrial customers in the greater Lansing, Michigan area, and serves potable water to approximately 55,000 customers.

Leidos' Smart Grid Select™ solution is a suite of smart grid technology and service products for the utility market. Whether implementing the entire suite or choosing one component, like the Next-Level Analytics product, Leidos has the answer for utilities' smart grid needs during any phase of implementation or operation—whether a full, managed service or turnkey solution.

About Leidos

Leidos is a FORTUNE 500® science and technology solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 32,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $7.04 billion for the fiscal year ended December 30, 2016. For more information, visit www.Leidos.com.  

BlueLine Grid develops app connecting mobile devices to land radios

BETHESDA, MD July 19, 2017 BlueLine Grid today announced another first-of-its-kind application to advance collaboration, this time between land mobile radios and BlueLine Grid's GeoGrid mobile push-to-talk (PTT) app.    

The Bethesda-based startup created the technology to enable global users of Cisco's Instant Connect server (converting analog mobile radios to VOIP) to encrypt radio channels, connect to cell phones and record conversations. The initial use case involves connecting information silos between government agencies and corporations to advance public safety and emergency communications.

BlueLine Grid and Cisco will jointly market the application as an extension to Cisco Instant Connect and Cisco's Spark collaboration platform.

"BlueLine Grid is enthusiastic to expand the Instant Connect and Spark collaboration use cases to include encrypted, location based channels," said Jack Weiss, BlueLine Grid President. "Think of this as a mashup of the 90's Nextel walkie-talkie phones with iOS, Android, and Spark. Our goal is to remove the collaboration barriers between users, providing a means to connect any user and device."

BlueLine Grid has received a strategic investment from In-Q-Tel, the investment arm of the U.S. Intelligence Community, as well as Motorola Solutions, which is integrating BlueLine Grid's innovative software with Motorola's public safety radio systems. 

About BlueLine Grid
BlueLine Grid operates the nation's premier, trusted collaboration network for law enforcement, first responders, and security teams. For more, visit www.bluelinegrid.com.

Lockheed Martin wins contract to redesign cruise missile wing

ORLANDO July 19, 2017 Lockheed Martin (NYSE: LMT) received an Undefinitized Contracting Action for $37.7 million from the U.S. Air Force for continued development of a new wing design for the Joint Air-to-Surface Standoff Missile – Extended Range (JASSM-ER).

The new wing design will add greater range to the cruise missile, which currently has a range of more than 500 nautical miles. Analysis on an enhanced wing design began in March 2016.

"We've developed a novel design that provides additional standoff range to further increase pilot survivability in an Anti-Access-Area Denial threat environment," said Jason Denney, program director for Long Range Strike Systems at Lockheed Martin Missiles and Fire Control. "Our customers trust our already proven design and we look forward to enhancing its capabilities for warfighters."

The current phase of the design work is progressing as anticipated and is on schedule to be incorporated into production lot 17.

Armed with a penetrating blast-fragmentation warhead, JASSM-ER can be used in all weather conditions. The stealthy 2,000-pound cruise missile employs an infrared seeker and enhanced digital anti-jam GPS receiver to dial into specific points on high-value, well-fortified, fixed and relocatable targets. The B-1B carries JASSM-ER. Integration on other aircraft platforms is ongoing. More than 2,150 JASSM and JASSM-ER missiles have been delivered.

About Lockheed Martin
Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 97,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

San Jose among five global cities to receive consulting through IBM's Smarter Cities Challenge

ARMONK, NY, July 20, 2017 IBM's (NYSE:  IBM) Smarter Cities Challenge program (@CitiesChallenge) will be sending teams of company experts to five municipalities through 2018 to provide pro bono consultative advice on issues such as affordable housing, economic development, immigration, and public safety.

The five recipients – Busan, Korea; Palermo, Italy; San Isidro, Argentina; San Jose, USA; and Yamagata City, Japan -- were selected from a highly competitive pool of more than 100 cities around the world that applied for a grant of consulting services from IBM.

Since 2010, IBM's citizenship arm has made such Smarter Cities Challenge grants to more than 130 cities worldwide chosen from more than 600 applicants, with nearly 800 of IBM's top experts delivering pro bono services valued at more than USD $68 million. Each consulting engagement has a commercial value of USD $500,000.

For the upcoming pro bono consultative engagements, IBM may use Watson's cognitive analytics capabilities to identify and understand city data such as transportation patterns or public health trends. Or, natural and human-influenced meteorological events may be parsed, taken from the world's largest weather data sets, recorded by The Weather Company, an IBM Business. Analysis of such information may help inform IBM's recommendation to city stakeholders to address their local challenges.

Here's how a typical Smarter Cities Challenge engagement works: After intense preparation, IBM Smarter Cities Challenge teams, comprising six IBM experts, spend three weeks working closely with city staff in each winning city, analyzing data about a critical issue facing the municipality. Team members consider diverse perspectives on the topic through meeting with local officials, citizens, businesses, and not-for-profits. Best practices used by other cities are studied. After working closely with city leadership, the IBM team then recommends innovative and specifically tailored ways to address the issue.

Smarter Cities Challenge engagements have helped cities around the world to significantly improve the quality of life for their residents. Projects informed by IBM advice have helped to upgrade skills of city staff, enabled cities to win prestigious awards, and made them more competitive. Here are some of the results achieved to date:

 

  • Memphis, USA and IBM worked to successfully design a plan for decreasing demand and improving response time for emergency health services, and for improving long term healthcare, particularly for the city's most vulnerable citizens.
  • Pingtung County, Taiwan won the 2015 Energy Smart Communities Initiative Best Practices Award from among 200 submissions across Asia Pacific for its implementation of a smart microgrid, based on its Smarter Cities Challenge recommendations.
  • Dublin, Ireland worked with IBM to assess the feasibility of adopting solar power, and successfully installed solar panels on the roofs of nearly all city government buildings.
  • Porto Alegre, Brazil created Digital PoA to facilitate online dialogue between citizens and city officials to identify priorities and shape the municipal budget. In one outcome, public transportation routes were adjusted to help underserved residents better access health services.
  • Pyeongchang County, South Korea, host of the 2018 Olympics, is developing and promoting new tourism opportunities that extend beyond its ski areas to the natural beauty in the southern part of the county. This will help close a socioeconomic gap and lay the foundation for a stronger tourism industry beyond the Winter Games.
  • Syracuse, USA, used its Smarter Cities Challenge insights to identify neighborhoods that were at risk of increased home vacancies, then apply resources to stabilize the community and tax base.
  • Townsville, Australia earned the prestigious National Smart Infrastructure Award for a pilot program to reduce water consumption.

Jennifer Ryan Crozier, IBM's Vice President of Corporate Citizenship & President of the IBM Foundation, congratulated the winners, saying, "Over the last seven years, we have seen strong applications from more than 800 cities around the world who have proposed ways that IBM's talent and technology could help them to address their toughest issues, but 2017 really stood out.  We congratulate this year's winners and look forward to collaborating with each of them on the Smarter Cities Challenge."

A video summarizing IBM Smarter Cities Challenge projects can be viewed here and more background about the program and its many successes can be found at www.smartercitieschallenge.org.

Follow all of IBM's citizenship initiatives by visiting the CitizenIBM blog at www.citizenIBM.com and on Twitter, at @citizenIBM. For more information about IBM citizenship, please visit www.ibm.com/ibm/responsibility

DHS awards SBIR Phase II contract to Utah company for identity management initiative

WASHINGTON The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private keys needed for the secure and scalable deployment of blockchain technologies.

Under the SBIR Phase II contract, Evernym will design and implement a decentralized key management system (DKMS) for blockchain technologies based on National Institute of Standards and Technology Special Publication 800-130, titled “A Framework for Designing Key Management Systems.” The research project is being managed by the S&T Cyber Security Division’s (CSD) Identity Management project.

“A better, more secure method is needed to safeguard the identity and privacy of web-users,” said Acting DHS Under Secretary for Science and Technology William N. Bryan. “Research in blockchain holds significant potential to provide a solution that will make it considerably more difficult to hack an online user’s identity.”

Through a project titled “Applicability of Blockchain Technology to Privacy Respecting Identity Management,” Evernym is developing a DKMS—a cryptographic key management approach used with blockchain and other distributed-ledger technologies—to boost online authentication and verification. Within a DKMS, the initial “root-of-trust” for all participants is a distributed ledger that supports a decentralized identifier—a new form of root identity record.

“Managing public and private cryptographic keys in existing public key infrastructure as well as permissioned and permission-less blockchains continues to be a difficult challenge,” said S&T Identity Management Program Manager Anil John. “Through this project, Evernym will push the limits of the emerging decentralized key management system technology to deliver a high level of comfort to the public and American businesses as they integrate blockchain technologies into their technology portfolio.”

Initiated in 2004, the DHS S&T SBIR program is a competitive contract awards program that increases the participation of innovative and creative U.S. small businesses in federal research-and-development (R&D) initiatives and facilitates private-sector commercialization of SBIR-funded solutions. A SBIR Phase II awardee continues its R&D from a completed Phase I project that successfully affirms the scientific and technical merit and feasibility of a proposed effort. S&T’s CSD leverages the SBIR program to fund small business development of new and enhanced cybersecurity solutions. For more about the S&T SBIR program, visit /science-and-technology/sbir.

CSD is part of S&T’s Homeland Security Advanced Research Projects Agency. Its mission is to enhance the security and resilience of the nation’s critical information infrastructure and the Internet by developing and delivering new technologies, tools and techniques to defend against cyberattacks. The division conducts and supports technology transitions and leads and coordinates R&D among the R&D community, which includes DHS customers, government agencies, the private sector and international partners. For more information about CSD, visit https://www.dhs.gov/cyber-research.

GSN ASB Winner Profile: Qognify

Beginning this July 17, GSN will publish detailed descriptions by Winners and Finalists of the reasons their entries were selected by the Judges; Don’t miss these in-depth descriptions , which will be available every day in the GSN Airport, Searport, Border Security Weekly; the Daily Insider and Cybersecurity Weekly newsletters!

Qognify and Dell EMC are bringing the surveillance industry the first scale-out integrated solution for surveillance management- the Qognify VisionHub Qblock.

A NAS VMS TURNKEY SOLUTIONFOR ENTERPRISE CUSTOMERS powered by Isilon storage and PowerEdge compute offers all the advantages that this combination brings to every surveillance customer, creating a best of breed large scale solution.

Simple, Supported, Reliable, Scalable: the ONLY turnkey NAS solution in market supporting centralized management with validated and optimized performance and zero data loss.

The need 

There’s no doubt today that Video Management Solutions are essential to organizations’ security and operations. As longstanding pioneers in this market, Qognify has identified the following relevant trends which are driving growth: 

• Higher resolution cameras & growing number of fixed and mobile video feeds 

• Video has become a strategic asset for all enterprise organizations 

• “Big Data” – Desire to do more video analysis and improving video analytics

These trends are further increasing the use of video, yield exponential growth in storage as well as new and more complex needs

Key capabilities 

Targeting IT organizations who own or operate enterprise video management solutions; storage-savvy organizations which are likely to have future expansion and want to avoid complex migrations. Empowering them to: 

• Combine business and security storage requirements into a single storage system that is more effectively and efficiently maintained than multiple independent storage systems 

• Store all video in a single datacenter 

• Provide supported solutions with a single call for support 

• Provide a high availability and fault tolerant solution

What makes Qblock unique? 

• It is the ONLY turnkey NAS solution in market offering the benefits of highly reliable, easily supported centralized management and reduced deployment risk 

• Unmatched scalability and performance- from 100 to 1000’s of cameras and up to 40 PB of storage 

• Uncompromised reliability which is validated and optimized, featuring zero data loss while reducing failover time and increasing fault tolerance beyond offerings that include the typical RAID storage configurations 

• Supported end to end by Qognify with a single point of contact for quick and reliable resolution on the VMS, Compute and Storage: tested and validated by Dell EMC, completely supported by Qognify.

Qblock offers all the advantages of high-end, centralized storage management as well as advantages around simple migration storage that Isilon brings. It allows customers to easily and effectively manage their vast amount of video data and grow as big as they need without re-architecting the storage.

Mission critical customers, requiring a high availability and fault tolerant solution- have increasing storage volumes and cannot afford to lose video.

Qblock responds to this need by reducing failover time and increasing fault tolerance beyond offerings that include the typical RAID storage configurations video.

Finally, alongside all the above lies the fundamental need for a VMS to be a reliable, scalable, and an easy to deploy and manage video solution. Qblock is based on Dell EMC’s market leading hardware, with VisionHub- Qognify’s leading VMS which leverages video power for complete security management. 

Survey finds cyber staffs overlook vulnerable target

Cole

BETHESDA, MD July 19, 2017 Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for damage, according to a new survey to be released by SANS Institute on August 1.

As security protecting organizations from outside attack gets more formidable, attackers look for easier targets – users who already have access to an organization's most sensitive data, for example, and aren't as hard to fool as security systems.

"While deliberate/malicious insider are always a concern, what many organizations fail to realize is that an external attack will often target a legitimate insider and trick them into causing harm," according to SANS instructor and survey report author Eric Cole, PhD. "This accidental/unintentional insider could be used as an avenue by the adversary to walk out with an organization's most sensitive data without fanfare or drama, and few organizations would be able to even know it had happened."

While these attacks are devastating, few organizations seem to realize that even when the origin of an attack is external, the ultimate entry point for the attacker was an insider who was tricked or manipulated to causing harm. Survey respondents understand the risk. When asked to rank attackers according to the amount of damage they could do, only 23% of respondents said attackers from outside would do the most damage; 36% said the worst breaches would come from unintentional insiders and 40% said malicious insiders would cause the greatest damage.

Few seemed to have any idea how much damage was involved, however. Forty-five percent of respondents said the cost of a potential loss was "Unknown," while 33% said they had no specific estimate of cost.

That seems surprising, but few organizations reported having insider-detection programs thorough enough to reliably detect insider threats, according to Cole. That same lack of visibility would make it difficult to identify the scope of a potential insider attack or estimate the cost of recovering from it.

Data showing 62% of respondents have never experienced an insider attack probably also indicate low visibility, but not low risk, according to Cole. Thirty-eight percent of respondents said the systems and methods they use to monitor insider activity are ineffective, which makes it even less likely that they could identify an insider attack in progress.

Inability to see is one thing; reluctance to prepare is another. Only 18% of respondents said they have formal incident-response plans that include potential insider attacks, though 49% said they are developing such a plan; 31% of respondents said they have no formal program in place or preparations to deal with threats from insiders.

"Malicious insiders have always been a threat, but the risk is increasing from 'unintentional' insiders that are tricked into giving their login information to callers from fake help desks or clicking on attachments that release password-stealing malware," according to Cole. "Every organization is only one click away from a potential compromise."

Eric Cole will discuss the full results of the survey and his analysis in a webcast August 1 at 1 PM EDT, sponsored by Dtex SystemsHaystax Technology and Rapid7, and hosted by SANS. Register to attend the webcast at www.sans.org/u/ui9

Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and insider threat expert, Eric Cole, PhD.

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master's degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org)

Cirrus Insight co-founder to emcee upcoming national cybersecurity conference

Bruce

KNOXVILLE, TN July 20, 2017 The EDGE2017 Security Conference, a world-class cybersecurity conference, announced today that Brandon Bruce, COO and co-founder of Cirrus Insight, will be the emcee at this year’s conference. Cirrus Insight is a sales software company that ranked 41st on the Inc. 5000 list of fastest growing U.S. companies in 2016.

EDGE2017 will be held on October 17-18 at the Knoxville Convention Center in Knoxville, Tennessee, and aims to tackle the most vexing security challenges of today and tomorrow by bringing together security visionaries, industry leaders, and technology researchers.

“The EDGE Security Conference is fast emerging as a must-attend information security event, and I’m thrilled to be involved,” Bruce said. “I’ll be welcoming to Knoxville a speaker lineup that is a who’s who of cybersecurity experts and attendees from all over the country.”

Keynote speakers at the conference include 33-year Air Force veteran and former director of operations for U.S. Cyber Command, Maj. Gen. Brett T. Williams, and renowned “white hat” hackers Charlie Miller and Chris Valasek. Miller and Valasek are best known for their remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle, exposing serious security flaws. The results of this breach led Fiat Chrysler to recall 1.4 million vehicles.

“Brandon has an engaging personality and is a creative tech entrepreneur,” said John McNeely, president of Sword & Shield Enterprise Security, the cybersecurity firm hosting EDGE2017. “He has already contributed some great ideas for making EDGE2017 a more fun and interactive conference, and I look forward seeing him guide attendees through everything we have to offer this year.”

For more information about EDGE2017, visit:  https://edgesecurityconference.com/.

For information about sponsorship opportunities, visit:  https://edgesecurityconference.com/expo-sponsors/.

About EDGE2017

EDGE2017 Security Conference is the second offering of the annual EDGE Security Conferences presented by Sword & Shield Enterprise Security, Inc. EDGE2017 is focused on exploring real-world solutions to today’s toughest cybersecurity challenges. Dedicated to advancing the security industry through comprehensive world-class sessions, EDGE2017 is designed to educate business professionals and encourage information security professionals to openly discuss the issues that are facing their industry to foster a community of creative problem solvers. 

To learn more about EDGE2017 and to sign up, visit:  https://edgesecurityconference.com/.

About Sword & Shield Enterprise Security

Protecting critical data for 20 years, Sword & Shield Enterprise Security, Inc. is a nationally recognized cybersecurity provider with solutions designed to meet the needs of a dynamic security and compliance landscape. Headquartered in Knoxville, Tennessee, Sword & Shield specializes in security, risk and compliance assessment, managed security services, enterprise security consulting, security incident response and forensics, and technical solutions. Sword & Shield services a broad spectrum of industries, including healthcare, retail, legal, banking and finance, manufacturing, and the public sector.

Sword & Shield hosts the EDGE Security Conference, a world-class cybersecurity conference where complex business problems meet real world solutions. EDGE2017 will take place on Oct. 17-18, 2017 at the Knoxville Convention Center. To learn more about EDGE2017 and to sign up, visit https://edgesecurityconference.com/.

For more information about Sword & Shield Enterprise Security, visit https://www.swordshield.com/.

Cyber risk management firm expands offerings to include IoT device coverage

SUNNYVALE, CA and ALBUQUERQUE, NM July 19, 2017 RiskSense®, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validationcapabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization's cyber risk exposure.

Organizations are already faced with monitoring and protecting a wide and deep attack surface that spans the network, endpoints, applications, cloud services, and mobile devices. The advent of microservices, connected IoT devices, and erosion of the air-gap security perimeter around industrial control systems (ICS) is extending this surface area exponentially.

"For decades, organizations have focused their security efforts on network perimeter defenses to protect servers, endpoints, and network equipment," said Dr. Srinivas Mukkamala, co-founder and CEO at RiskSense. "However, in an interconnected world, a 'hardware-defined' approach has lost its relevance. As organizations transition to software-defined networks, they need to look beyond the network layer to protect their IT assets. RiskSense's expanded Attack Surface Validation was designed to address this visibility gap and the risks associated with it."

RiskSense has expanded its Attack Surface Validation capabilities to cover the following technologies and environments:

  • Microservices and containers;
  • Smart logistic systems (i.e., smart vending machines);
  • Internet of Things (i.e., irrigation systems; traffic guidance systems);
  • Proprietary healthcare systems (i.e., pacemakers);
  • Internet-connected physical access control systems (i.e., mobile keyless entry systems);
  • Industrial control systems (i.e., electrical grid distribution control systems); and
  • Self-driving car technology and automotive control systems.

RiskSense has already implemented these capabilities with customers in key industry sectors. The RiskSense Attack Surface Validation Service provides a fully-managed assessment of vulnerabilities most likely to be exploited by cyber adversaries to infiltrate an organization and carry out lateral attacks inside the network. This service provides the visibility, prioritization, and actionable remediation recommendations to shrink an organization's attack surface and reduce overall cyber risk exposure.  

The RiskSense Attack Surface Validation Service is delivered via the company's award-winning RiskSense Platform, which contextualizes scanned data with external threat information. The resulting threat intelligence is then supplemented with human-interactive machine learning analysis. This leads to a more accurate prioritization of risk impacts. In addition, the RiskSense Platform provides synchronous access to findings in real-time and can be used to quickly orchestrate remediation actions and monitor the results. The platform is supported by a deep bench of industry-leading security researchers and exploit writers. 

About RiskSense
RiskSense®, Inc., is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

The company's Software-as-a-Service (SaaS) platform transforms cyber risk management into a more pro-active, collaborative, and real-time discipline. The RiskSense Platform™ embodies the expertise and intimate knowledge gained from real world experience in defending critical networks from the world's most dangerous cyber adversaries.

By leveraging RiskSense cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, reduce costs, and ultimately minimize cyber risks. For more information, please visit www.risksense.com or follow us on Twitter at @RiskSense.

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...