April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Today's News

BlueLine Grid develops app connecting mobile devices to land radios

BETHESDA, MD July 19, 2017 BlueLine Grid today announced another first-of-its-kind application to advance collaboration, this time between land mobile radios and BlueLine Grid's GeoGrid mobile push-to-talk (PTT) app.    

The Bethesda-based startup created the technology to enable global users of Cisco's Instant Connect server (converting analog mobile radios to VOIP) to encrypt radio channels, connect to cell phones and record conversations. The initial use case involves connecting information silos between government agencies and corporations to advance public safety and emergency communications.

BlueLine Grid and Cisco will jointly market the application as an extension to Cisco Instant Connect and Cisco's Spark collaboration platform.

"BlueLine Grid is enthusiastic to expand the Instant Connect and Spark collaboration use cases to include encrypted, location based channels," said Jack Weiss, BlueLine Grid President. "Think of this as a mashup of the 90's Nextel walkie-talkie phones with iOS, Android, and Spark. Our goal is to remove the collaboration barriers between users, providing a means to connect any user and device."

BlueLine Grid has received a strategic investment from In-Q-Tel, the investment arm of the U.S. Intelligence Community, as well as Motorola Solutions, which is integrating BlueLine Grid's innovative software with Motorola's public safety radio systems. 

About BlueLine Grid
BlueLine Grid operates the nation's premier, trusted collaboration network for law enforcement, first responders, and security teams. For more, visit www.bluelinegrid.com.

Lockheed Martin wins contract to redesign cruise missile wing

ORLANDO July 19, 2017 Lockheed Martin (NYSE: LMT) received an Undefinitized Contracting Action for $37.7 million from the U.S. Air Force for continued development of a new wing design for the Joint Air-to-Surface Standoff Missile – Extended Range (JASSM-ER).

The new wing design will add greater range to the cruise missile, which currently has a range of more than 500 nautical miles. Analysis on an enhanced wing design began in March 2016.

"We've developed a novel design that provides additional standoff range to further increase pilot survivability in an Anti-Access-Area Denial threat environment," said Jason Denney, program director for Long Range Strike Systems at Lockheed Martin Missiles and Fire Control. "Our customers trust our already proven design and we look forward to enhancing its capabilities for warfighters."

The current phase of the design work is progressing as anticipated and is on schedule to be incorporated into production lot 17.

Armed with a penetrating blast-fragmentation warhead, JASSM-ER can be used in all weather conditions. The stealthy 2,000-pound cruise missile employs an infrared seeker and enhanced digital anti-jam GPS receiver to dial into specific points on high-value, well-fortified, fixed and relocatable targets. The B-1B carries JASSM-ER. Integration on other aircraft platforms is ongoing. More than 2,150 JASSM and JASSM-ER missiles have been delivered.

About Lockheed Martin
Headquartered in Bethesda, Maryland, Lockheed Martin is a global security and aerospace company that employs approximately 97,000 people worldwide and is principally engaged in the research, design, development, manufacture, integration and sustainment of advanced technology systems, products and services.

San Jose among five global cities to receive consulting through IBM's Smarter Cities Challenge

ARMONK, NY, July 20, 2017 IBM's (NYSE:  IBM) Smarter Cities Challenge program (@CitiesChallenge) will be sending teams of company experts to five municipalities through 2018 to provide pro bono consultative advice on issues such as affordable housing, economic development, immigration, and public safety.

The five recipients – Busan, Korea; Palermo, Italy; San Isidro, Argentina; San Jose, USA; and Yamagata City, Japan -- were selected from a highly competitive pool of more than 100 cities around the world that applied for a grant of consulting services from IBM.

Since 2010, IBM's citizenship arm has made such Smarter Cities Challenge grants to more than 130 cities worldwide chosen from more than 600 applicants, with nearly 800 of IBM's top experts delivering pro bono services valued at more than USD $68 million. Each consulting engagement has a commercial value of USD $500,000.

For the upcoming pro bono consultative engagements, IBM may use Watson's cognitive analytics capabilities to identify and understand city data such as transportation patterns or public health trends. Or, natural and human-influenced meteorological events may be parsed, taken from the world's largest weather data sets, recorded by The Weather Company, an IBM Business. Analysis of such information may help inform IBM's recommendation to city stakeholders to address their local challenges.

Here's how a typical Smarter Cities Challenge engagement works: After intense preparation, IBM Smarter Cities Challenge teams, comprising six IBM experts, spend three weeks working closely with city staff in each winning city, analyzing data about a critical issue facing the municipality. Team members consider diverse perspectives on the topic through meeting with local officials, citizens, businesses, and not-for-profits. Best practices used by other cities are studied. After working closely with city leadership, the IBM team then recommends innovative and specifically tailored ways to address the issue.

Smarter Cities Challenge engagements have helped cities around the world to significantly improve the quality of life for their residents. Projects informed by IBM advice have helped to upgrade skills of city staff, enabled cities to win prestigious awards, and made them more competitive. Here are some of the results achieved to date:

 

  • Memphis, USA and IBM worked to successfully design a plan for decreasing demand and improving response time for emergency health services, and for improving long term healthcare, particularly for the city's most vulnerable citizens.
  • Pingtung County, Taiwan won the 2015 Energy Smart Communities Initiative Best Practices Award from among 200 submissions across Asia Pacific for its implementation of a smart microgrid, based on its Smarter Cities Challenge recommendations.
  • Dublin, Ireland worked with IBM to assess the feasibility of adopting solar power, and successfully installed solar panels on the roofs of nearly all city government buildings.
  • Porto Alegre, Brazil created Digital PoA to facilitate online dialogue between citizens and city officials to identify priorities and shape the municipal budget. In one outcome, public transportation routes were adjusted to help underserved residents better access health services.
  • Pyeongchang County, South Korea, host of the 2018 Olympics, is developing and promoting new tourism opportunities that extend beyond its ski areas to the natural beauty in the southern part of the county. This will help close a socioeconomic gap and lay the foundation for a stronger tourism industry beyond the Winter Games.
  • Syracuse, USA, used its Smarter Cities Challenge insights to identify neighborhoods that were at risk of increased home vacancies, then apply resources to stabilize the community and tax base.
  • Townsville, Australia earned the prestigious National Smart Infrastructure Award for a pilot program to reduce water consumption.

Jennifer Ryan Crozier, IBM's Vice President of Corporate Citizenship & President of the IBM Foundation, congratulated the winners, saying, "Over the last seven years, we have seen strong applications from more than 800 cities around the world who have proposed ways that IBM's talent and technology could help them to address their toughest issues, but 2017 really stood out.  We congratulate this year's winners and look forward to collaborating with each of them on the Smarter Cities Challenge."

A video summarizing IBM Smarter Cities Challenge projects can be viewed here and more background about the program and its many successes can be found at www.smartercitieschallenge.org.

Follow all of IBM's citizenship initiatives by visiting the CitizenIBM blog at www.citizenIBM.com and on Twitter, at @citizenIBM. For more information about IBM citizenship, please visit www.ibm.com/ibm/responsibility

DHS awards SBIR Phase II contract to Utah company for identity management initiative

WASHINGTON The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded Salt Lake City-based startup Evernym a $749,000 Small Business Innovation Program (SBIR) award to develop an easy-to-use, decentralized mechanism for managing public and private keys needed for the secure and scalable deployment of blockchain technologies.

Under the SBIR Phase II contract, Evernym will design and implement a decentralized key management system (DKMS) for blockchain technologies based on National Institute of Standards and Technology Special Publication 800-130, titled “A Framework for Designing Key Management Systems.” The research project is being managed by the S&T Cyber Security Division’s (CSD) Identity Management project.

“A better, more secure method is needed to safeguard the identity and privacy of web-users,” said Acting DHS Under Secretary for Science and Technology William N. Bryan. “Research in blockchain holds significant potential to provide a solution that will make it considerably more difficult to hack an online user’s identity.”

Through a project titled “Applicability of Blockchain Technology to Privacy Respecting Identity Management,” Evernym is developing a DKMS—a cryptographic key management approach used with blockchain and other distributed-ledger technologies—to boost online authentication and verification. Within a DKMS, the initial “root-of-trust” for all participants is a distributed ledger that supports a decentralized identifier—a new form of root identity record.

“Managing public and private cryptographic keys in existing public key infrastructure as well as permissioned and permission-less blockchains continues to be a difficult challenge,” said S&T Identity Management Program Manager Anil John. “Through this project, Evernym will push the limits of the emerging decentralized key management system technology to deliver a high level of comfort to the public and American businesses as they integrate blockchain technologies into their technology portfolio.”

Initiated in 2004, the DHS S&T SBIR program is a competitive contract awards program that increases the participation of innovative and creative U.S. small businesses in federal research-and-development (R&D) initiatives and facilitates private-sector commercialization of SBIR-funded solutions. A SBIR Phase II awardee continues its R&D from a completed Phase I project that successfully affirms the scientific and technical merit and feasibility of a proposed effort. S&T’s CSD leverages the SBIR program to fund small business development of new and enhanced cybersecurity solutions. For more about the S&T SBIR program, visit /science-and-technology/sbir.

CSD is part of S&T’s Homeland Security Advanced Research Projects Agency. Its mission is to enhance the security and resilience of the nation’s critical information infrastructure and the Internet by developing and delivering new technologies, tools and techniques to defend against cyberattacks. The division conducts and supports technology transitions and leads and coordinates R&D among the R&D community, which includes DHS customers, government agencies, the private sector and international partners. For more information about CSD, visit https://www.dhs.gov/cyber-research.

GSN ASB Winner Profile: Qognify

Beginning this July 17, GSN will publish detailed descriptions by Winners and Finalists of the reasons their entries were selected by the Judges; Don’t miss these in-depth descriptions , which will be available every day in the GSN Airport, Searport, Border Security Weekly; the Daily Insider and Cybersecurity Weekly newsletters!

Qognify and Dell EMC are bringing the surveillance industry the first scale-out integrated solution for surveillance management- the Qognify VisionHub Qblock.

A NAS VMS TURNKEY SOLUTIONFOR ENTERPRISE CUSTOMERS powered by Isilon storage and PowerEdge compute offers all the advantages that this combination brings to every surveillance customer, creating a best of breed large scale solution.

Simple, Supported, Reliable, Scalable: the ONLY turnkey NAS solution in market supporting centralized management with validated and optimized performance and zero data loss.

The need 

There’s no doubt today that Video Management Solutions are essential to organizations’ security and operations. As longstanding pioneers in this market, Qognify has identified the following relevant trends which are driving growth: 

• Higher resolution cameras & growing number of fixed and mobile video feeds 

• Video has become a strategic asset for all enterprise organizations 

• “Big Data” – Desire to do more video analysis and improving video analytics

These trends are further increasing the use of video, yield exponential growth in storage as well as new and more complex needs

Key capabilities 

Targeting IT organizations who own or operate enterprise video management solutions; storage-savvy organizations which are likely to have future expansion and want to avoid complex migrations. Empowering them to: 

• Combine business and security storage requirements into a single storage system that is more effectively and efficiently maintained than multiple independent storage systems 

• Store all video in a single datacenter 

• Provide supported solutions with a single call for support 

• Provide a high availability and fault tolerant solution

What makes Qblock unique? 

• It is the ONLY turnkey NAS solution in market offering the benefits of highly reliable, easily supported centralized management and reduced deployment risk 

• Unmatched scalability and performance- from 100 to 1000’s of cameras and up to 40 PB of storage 

• Uncompromised reliability which is validated and optimized, featuring zero data loss while reducing failover time and increasing fault tolerance beyond offerings that include the typical RAID storage configurations 

• Supported end to end by Qognify with a single point of contact for quick and reliable resolution on the VMS, Compute and Storage: tested and validated by Dell EMC, completely supported by Qognify.

Qblock offers all the advantages of high-end, centralized storage management as well as advantages around simple migration storage that Isilon brings. It allows customers to easily and effectively manage their vast amount of video data and grow as big as they need without re-architecting the storage.

Mission critical customers, requiring a high availability and fault tolerant solution- have increasing storage volumes and cannot afford to lose video.

Qblock responds to this need by reducing failover time and increasing fault tolerance beyond offerings that include the typical RAID storage configurations video.

Finally, alongside all the above lies the fundamental need for a VMS to be a reliable, scalable, and an easy to deploy and manage video solution. Qblock is based on Dell EMC’s market leading hardware, with VisionHub- Qognify’s leading VMS which leverages video power for complete security management. 

Survey finds cyber staffs overlook vulnerable target

Cole

BETHESDA, MD July 19, 2017 Information security staffs are so single-minded about defending their organizations from external attack that they all but ignore a threat with vastly greater potential for damage, according to a new survey to be released by SANS Institute on August 1.

As security protecting organizations from outside attack gets more formidable, attackers look for easier targets – users who already have access to an organization's most sensitive data, for example, and aren't as hard to fool as security systems.

"While deliberate/malicious insider are always a concern, what many organizations fail to realize is that an external attack will often target a legitimate insider and trick them into causing harm," according to SANS instructor and survey report author Eric Cole, PhD. "This accidental/unintentional insider could be used as an avenue by the adversary to walk out with an organization's most sensitive data without fanfare or drama, and few organizations would be able to even know it had happened."

While these attacks are devastating, few organizations seem to realize that even when the origin of an attack is external, the ultimate entry point for the attacker was an insider who was tricked or manipulated to causing harm. Survey respondents understand the risk. When asked to rank attackers according to the amount of damage they could do, only 23% of respondents said attackers from outside would do the most damage; 36% said the worst breaches would come from unintentional insiders and 40% said malicious insiders would cause the greatest damage.

Few seemed to have any idea how much damage was involved, however. Forty-five percent of respondents said the cost of a potential loss was "Unknown," while 33% said they had no specific estimate of cost.

That seems surprising, but few organizations reported having insider-detection programs thorough enough to reliably detect insider threats, according to Cole. That same lack of visibility would make it difficult to identify the scope of a potential insider attack or estimate the cost of recovering from it.

Data showing 62% of respondents have never experienced an insider attack probably also indicate low visibility, but not low risk, according to Cole. Thirty-eight percent of respondents said the systems and methods they use to monitor insider activity are ineffective, which makes it even less likely that they could identify an insider attack in progress.

Inability to see is one thing; reluctance to prepare is another. Only 18% of respondents said they have formal incident-response plans that include potential insider attacks, though 49% said they are developing such a plan; 31% of respondents said they have no formal program in place or preparations to deal with threats from insiders.

"Malicious insiders have always been a threat, but the risk is increasing from 'unintentional' insiders that are tricked into giving their login information to callers from fake help desks or clicking on attachments that release password-stealing malware," according to Cole. "Every organization is only one click away from a potential compromise."

Eric Cole will discuss the full results of the survey and his analysis in a webcast August 1 at 1 PM EDT, sponsored by Dtex SystemsHaystax Technology and Rapid7, and hosted by SANS. Register to attend the webcast at www.sans.org/u/ui9

Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst and insider threat expert, Eric Cole, PhD.

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master's degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (www.SANS.org)

Cirrus Insight co-founder to emcee upcoming national cybersecurity conference

Bruce

KNOXVILLE, TN July 20, 2017 The EDGE2017 Security Conference, a world-class cybersecurity conference, announced today that Brandon Bruce, COO and co-founder of Cirrus Insight, will be the emcee at this year’s conference. Cirrus Insight is a sales software company that ranked 41st on the Inc. 5000 list of fastest growing U.S. companies in 2016.

EDGE2017 will be held on October 17-18 at the Knoxville Convention Center in Knoxville, Tennessee, and aims to tackle the most vexing security challenges of today and tomorrow by bringing together security visionaries, industry leaders, and technology researchers.

“The EDGE Security Conference is fast emerging as a must-attend information security event, and I’m thrilled to be involved,” Bruce said. “I’ll be welcoming to Knoxville a speaker lineup that is a who’s who of cybersecurity experts and attendees from all over the country.”

Keynote speakers at the conference include 33-year Air Force veteran and former director of operations for U.S. Cyber Command, Maj. Gen. Brett T. Williams, and renowned “white hat” hackers Charlie Miller and Chris Valasek. Miller and Valasek are best known for their remote compromise of a 2014 Jeep Cherokee, whereby they obtained physical control of the vehicle, exposing serious security flaws. The results of this breach led Fiat Chrysler to recall 1.4 million vehicles.

“Brandon has an engaging personality and is a creative tech entrepreneur,” said John McNeely, president of Sword & Shield Enterprise Security, the cybersecurity firm hosting EDGE2017. “He has already contributed some great ideas for making EDGE2017 a more fun and interactive conference, and I look forward seeing him guide attendees through everything we have to offer this year.”

For more information about EDGE2017, visit:  https://edgesecurityconference.com/.

For information about sponsorship opportunities, visit:  https://edgesecurityconference.com/expo-sponsors/.

About EDGE2017

EDGE2017 Security Conference is the second offering of the annual EDGE Security Conferences presented by Sword & Shield Enterprise Security, Inc. EDGE2017 is focused on exploring real-world solutions to today’s toughest cybersecurity challenges. Dedicated to advancing the security industry through comprehensive world-class sessions, EDGE2017 is designed to educate business professionals and encourage information security professionals to openly discuss the issues that are facing their industry to foster a community of creative problem solvers. 

To learn more about EDGE2017 and to sign up, visit:  https://edgesecurityconference.com/.

About Sword & Shield Enterprise Security

Protecting critical data for 20 years, Sword & Shield Enterprise Security, Inc. is a nationally recognized cybersecurity provider with solutions designed to meet the needs of a dynamic security and compliance landscape. Headquartered in Knoxville, Tennessee, Sword & Shield specializes in security, risk and compliance assessment, managed security services, enterprise security consulting, security incident response and forensics, and technical solutions. Sword & Shield services a broad spectrum of industries, including healthcare, retail, legal, banking and finance, manufacturing, and the public sector.

Sword & Shield hosts the EDGE Security Conference, a world-class cybersecurity conference where complex business problems meet real world solutions. EDGE2017 will take place on Oct. 17-18, 2017 at the Knoxville Convention Center. To learn more about EDGE2017 and to sign up, visit https://edgesecurityconference.com/.

For more information about Sword & Shield Enterprise Security, visit https://www.swordshield.com/.

Cyber risk management firm expands offerings to include IoT device coverage

SUNNYVALE, CA and ALBUQUERQUE, NM July 19, 2017 RiskSense®, Inc., the pioneer and market leader in pro-active cyber risk management, today announced it has expanded its RiskSense Attack Surface Validationcapabilities beyond networks, Web applications, and databases to Internet of Things (IoT) devices and Operational Technology (OT) networks to provide a holistic view of an organization's cyber risk exposure.

Organizations are already faced with monitoring and protecting a wide and deep attack surface that spans the network, endpoints, applications, cloud services, and mobile devices. The advent of microservices, connected IoT devices, and erosion of the air-gap security perimeter around industrial control systems (ICS) is extending this surface area exponentially.

"For decades, organizations have focused their security efforts on network perimeter defenses to protect servers, endpoints, and network equipment," said Dr. Srinivas Mukkamala, co-founder and CEO at RiskSense. "However, in an interconnected world, a 'hardware-defined' approach has lost its relevance. As organizations transition to software-defined networks, they need to look beyond the network layer to protect their IT assets. RiskSense's expanded Attack Surface Validation was designed to address this visibility gap and the risks associated with it."

RiskSense has expanded its Attack Surface Validation capabilities to cover the following technologies and environments:

  • Microservices and containers;
  • Smart logistic systems (i.e., smart vending machines);
  • Internet of Things (i.e., irrigation systems; traffic guidance systems);
  • Proprietary healthcare systems (i.e., pacemakers);
  • Internet-connected physical access control systems (i.e., mobile keyless entry systems);
  • Industrial control systems (i.e., electrical grid distribution control systems); and
  • Self-driving car technology and automotive control systems.

RiskSense has already implemented these capabilities with customers in key industry sectors. The RiskSense Attack Surface Validation Service provides a fully-managed assessment of vulnerabilities most likely to be exploited by cyber adversaries to infiltrate an organization and carry out lateral attacks inside the network. This service provides the visibility, prioritization, and actionable remediation recommendations to shrink an organization's attack surface and reduce overall cyber risk exposure.  

The RiskSense Attack Surface Validation Service is delivered via the company's award-winning RiskSense Platform, which contextualizes scanned data with external threat information. The resulting threat intelligence is then supplemented with human-interactive machine learning analysis. This leads to a more accurate prioritization of risk impacts. In addition, the RiskSense Platform provides synchronous access to findings in real-time and can be used to quickly orchestrate remediation actions and monitor the results. The platform is supported by a deep bench of industry-leading security researchers and exploit writers. 

About RiskSense
RiskSense®, Inc., is the pioneer and market leader in pro-active cyber risk management. The company enables enterprises and governments to reveal cyber risk, quickly orchestrate remediation, and monitor the results. This is done by unifying and contextualizing internal security intelligence, external threat data, and business criticality across a growing attack surface.

The company's Software-as-a-Service (SaaS) platform transforms cyber risk management into a more pro-active, collaborative, and real-time discipline. The RiskSense Platform™ embodies the expertise and intimate knowledge gained from real world experience in defending critical networks from the world's most dangerous cyber adversaries.

By leveraging RiskSense cyber risk management solutions, organizations can significantly shorten time-to-remediation, increase operational efficiency, strengthen their security programs, heighten response readiness, reduce costs, and ultimately minimize cyber risks. For more information, please visit www.risksense.com or follow us on Twitter at @RiskSense.

Regent University to build cyber training facility at its Virginia Beach campus

VIRGINIA BEACH, VA July 18, 2017 Officials with the Institute for Cybersecurity at Regent University, an academic center and training facility dedicated to equipping the next generation of cybersecurity professionals in the industry, government, military and academia, announced today that Regent is building a state-of-the-art cyber range training facility.

As one of only a few stand-alone cyber range facilities at a university, and perhaps the only one in the nation at a private university, The Regent Cyber Range will open on Q4 2017 and will offer hands-on training programs where students will acquire the highest level of skills needed for careers in cybersecurity. Regent's Cyber Range will also be a leading-edge training hub for enterprises, consultancies, government and military organizations, offering several certificate programs at all levels.

According to industry reports, cybersecurity is one of the fastest growing career fields, with demand expected to rise to 6 million jobs globally in 2019 and a projected shortfall of employees for 1.5 million job openings. Median pay for an entry-level position for people with a bachelor's degree is currently $88,890, according to the Bureau of Labor Statistics, with the highest 10 percent of cybersecurity professionals earning more than $140,000.

"A severe skill shortage exists in the workforce, while at the same time the threats to our country's security grow ever more sophisticated," said Regent's Chancellor and CEO, Dr. M.G. "Pat" Robertson. "Regent's new training center will address the nation's need for thousands of additional cybersecurity experts to defend government and commercial networks from cyber attacks."

Regent will utilize the Cyberbit Range platform created by Cyberbit Ltd., the world's leading provider of cybersecurity training and simulation platforms. It offers a realistic training experience where trainees are exposed to various attack scenarios and security breaches to improve their hands-on skills. The range can simulate large-scale virtual networks and attacks based on real-world incidents, and can also pinpoint system vulnerabilities and help users develop countermeasures and improved protocols for dealing with cyber attacks on critical network systems. The platform offers numerous security tools and systems, including risk assessment tools, monitoring systems, security information and event management systems, forensic tools and supporting databases, as well as other network, security and cyber components.

"Regent will be among the first in Christian higher education, and one of the few colleges and universities nationwide, to offer hands-on cybersecurity training," said Dr. Gerson Moreno-Riaño, executive vice president for academic affairs. "This facility will allow Regent to offer complex, system-level training at the highest level, and graduates will emerge with hands-on testing and training that is unmatched in higher education. We've found the Cyberbit Range platform to deliver the highest level of training experience that will enable us to achieve our goals, coupled with the unparalleled support of the Cyberbit team."

"We are excited to partner with Regent University to build their new training facility based on the Cyberbit Range," said Adi Dar, CEO, of Cyberbit Ltd. "This training program firmly positions Regent as a leader in cybersecurity training in America today, not only for its students at the graduate and undergraduate levels, but also as a destination for businesses, government and military organizations."

Currently, Regent University offers a Master of Science in Cybersecurity, as well as undergraduate degrees in Information Systems Technology, Computer Science, Cyber & Digital Forensics and Cybersecurity.

Early next year, Regent will also host a Cyber Summit (Spring, 2018) featuring industry and government leaders to discuss innovation and future cybersecurity risks. Details will be announced soon.

For more information please visit: http://www.regent.edu/institutes/cybersecurity

About Regent University 

Founded in 1978, Regent University has 10,000 students studying on its 70-acre campus in Virginia Beach, Va., and online around the world. The university offers associate, bachelor's, master's and doctoral degrees from a Christian perspective in 128 program areas including business, communication, the arts, divinity, education, government, law, leadership, and psychology. Currently, Regent University tops the list of Best Online Bachelor's Programs in Virginia by U.S. News & World Report. Visit http://www.regent.edu

About Cyberbit 

Created to protect the most high-risk organizations in the world, Cyberbit secures enterprises and critical infrastructure against advanced cyberthreats. The company's battle-hardened cybersecurity solutions detect, analyze and respond to the most advanced, complex and targeted threats. Cyberbit employs a formidable and diverse team from both the public and private sector, including PhDs, hackers, former CISOs and SOC managers, as well as seasoned veterans of the intelligence and military communities. With offices in Texas, Munich and Israel, and presence worldwide, Cyberbit is a subsidiary of Elbit Systems Ltd. (NASDAQ: ESLT and TASE: ESLT) and has more than 500 personnel in the United States, Europe and Asia. To learn more about how Cyberbit maximizes protection against today's signature-less threats, visit http://www.cyberbit.com.

Former FireEye executive joins Axon board, brings cybersecurity expertise

Cullivan

SCOTTSDALE, AZ July 20, 2017 Axon (Nasdaq: AAXN), the global leader in connected law enforcement technologies, today announced the addition of Julie Anne Cullivan to its Board of Directors effective July 19, 2017.

Ms. Cullivan recently joined ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, as SVP, Business Operations and CIO where she is responsible for leading the cross functional initiatives and information security strategy to support the fast-growing company. Formerly EVP, Business Operations and CIO at FireEye, Inc., Ms. Cullivan was a member of the executive team that set the company's strategy. With responsibility for both Business Operations and Information Technology, Ms. Cullivan helped scale FireEye from a private company with $80 million in revenue, through its successful IPO, to a global publicly traded company with revenues of over $700 million and a $2.7 billion valuation.

A thought leader in sales, channel, cloud, cyber security, and business digitization, she is adept at implementing innovative technology solutions to enable such strategic imperatives. Ms. Cullivan has held executive positions focused on sales, channel and marketing operations at Autodesk, McAfee, EMC, and Oracle. She is a recognized leader in the cyber security field and a sought-after speaker on topics including women in security, security as a boardroom imperative, innovation, and building high impact teams. Ms. Cullivan has a B.S. degree in Finance from Santa Clara University and brings extensive business, information technology and cyber security expertise to the Axon Board.

"I'm extremely happy to welcome Ms. Cullivan to Axon's Board of Directors," said Axon CEO and founder Rick Smith. "Her combined extensive business, sales operations, IT and cyber security expertise brings huge value to the Axon Board of Directors. The value of such expertise can hardly be overstated at a time when our company continues to grow, expand and evolve." 

"I look forward to contributing to Axon's success as the company continues on its mission to protect life," said Julie Anne Cullivan. "I am most excited about how they are leveraging Artificial Intelligence and Cloud technologies to deliver on this vision."

Axon believes that diversity at all levels of the business should reflect the diversity of society as a whole. The company proactively reached out to The Athena Alliance whose mission is to help enable gender diversity in the boardroom by directly connecting boards to top executive women. In the future, the board wishes to continue to enhance diversity on the board not just through gender, but through other factors as well. 

About the Athena Alliance

The Athena Alliance is a national nonprofit organization dedicated to advancing gender diversity in the boardroom by directly connecting boards to the right powerhouse woman for their board. The Athena Alliance has a curated network of over 500 C-Level women from top tier companies. Sponsors include Autodesk, Intuit, OpenView Venture Partners, PwC and more. Founded in April 2016, the Athena Alliance is headquartered in Half Moon Bay, Calif. For more information, visit http://athenaalliance.org.

About Axon

The Axon network is a network of devices, apps, and people that helps law enforcement become smarter and safer. Our mission is to protect life. Our technologies give law enforcement the confidence, focus, and time they need to keep their communities safe. Our products impact every aspect of an officer's day-to-day experience:

  • In the field - Our Smart Weapons offer a less-lethal intermediate use of force response and our body-worn and in-car cameras collect video evidence to capture the truth of an incident; and our mobile applications enable simple evidence collection.
  • At the station - Our secure, cloud-based digital evidence management solution allows officers and command staff to manage, review, share and process digital evidence using forensic, redaction, transcription, and other tools.
  • In the courtroom - Our solutions for prosecutors make collaborating across jurisdictions and agencies easy so that cases can be resolved quickly. 

We work hard for those who put themselves in harm's way for all of us. To date, there are more than 100,000 licensed users from around the world and more than 185,000 lives and countless dollars have been saved with the Axon network of devices, apps and people. Learn more at www.axon.com or by calling (800) 978-2737.

Axon, the "Axon Delta" logo, Axon Network, Smart Weapons, and Evidence.com are trademarks of Axon Enterprise, Inc., some of which are registered in the U.S. and other countries. For more information, visit www.axon.com/legal. All rights reserved.

Follow Axon here:

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...