NIST

Euna Procurement Awarded TX-RAMP Level 2 Authorization for Handling Sensitive State Agency Data in Texas

Retrieved on: 
Thursday, February 15, 2024

The certification indicates a cloud service provider has met stringent security requirements for handling sensitive state agency data in Texas.

Key Points: 
  • The certification indicates a cloud service provider has met stringent security requirements for handling sensitive state agency data in Texas.
  • “Our TX-RAMP Level 2 Authorization reflects our commitment to the highest standards of data security and privacy for our clients,” said Chris Kubic, chief information security officer at Euna Solutions.
  • TX-RAMP Level 2 Authorization is noteworthy for several reasons, including:
    Enhanced Data Security and Privacy: TX-RAMP Level 2 Authorization sets specific security and privacy standards that service providers must meet to handle Texas state data.
  • Compliance with State Regulations: Achieving TX-RAMP Level 2 Authorization demonstrates that a service provider complies with all applicable Texas state laws and regulations regarding data security and privacy.

Keysight Joins U.S. Commerce Department’s AI Safety Institute Consortium

Retrieved on: 
Thursday, February 15, 2024

Established by the National Institute of Standards and Technology (NIST), the U.S. AI Safety Institute Consortium (AISIC) will bring together AI creators and users, academics, government and industry researchers, and civil society organizations to meet this mission.

Key Points: 
  • Established by the National Institute of Standards and Technology (NIST), the U.S. AI Safety Institute Consortium (AISIC) will bring together AI creators and users, academics, government and industry researchers, and civil society organizations to meet this mission.
  • The consortium will develop science-based and empirically backed guidelines and standards for AI measurement and policy to lay the foundation of AI safety across the world.
  • Keysight is also partnering with industry leaders to advance AI learning for wireless communications testing, optimize wireless performance with AI, and validate the data center hardware needed to support AI cloud architectures.
  • That’s precisely what the U.S. AI Safety Institute Consortium is set up to help us do.

ROC Launches Latent Fingerprint Capabilities, Ranking Top 3 Globally for Accuracy with Speeds 500x Faster Than Industry Standard

Retrieved on: 
Thursday, February 15, 2024

DENVER, Feb. 15, 2024 /PRNewswire/ -- ROC, a world leader in computer vision and biometrics, continues to make a compelling case for U.S. homegrown technology with a strong showing in its first ever NIST Evaluation of Latent Fingerprint Technologies (ELFT).

Key Points: 
  • ROC also ranked as the #2 most accurate global algorithm in the FBI Laboratory dataset and #2 most accurate global algorithm in latent palmprint search.
  • Achieving top 3 global ranking for accuracy cements ROC as one of the top latent fingerprint matchers in the world.
  • However, it is their signature combination of top-tier accuracy along with unprecedented search speeds that industry experts are most excited about.
  • The company has offices in Denver, CO, Morgantown, WV, and a new fingerprint center of excellence in Grand Rapids, MI.

SEALSQ Pioneers Trusted IoT Device Onboarding Solutions with the United States NIST National Cybersecurity Center of Excellence NCCoE

Retrieved on: 
Thursday, February 15, 2024

SEALSQ’s participation in this groundbreaking project led by the NIST National Cybersecurity Center of Excellence (NCCoE) is set to revolutionize the way Internet of Things (IoT) devices are onboarded and managed across networks, ensuring a new standard of security and trust in the rapidly expanding IoT landscape.

Key Points: 
  • SEALSQ’s participation in this groundbreaking project led by the NIST National Cybersecurity Center of Excellence (NCCoE) is set to revolutionize the way Internet of Things (IoT) devices are onboarded and managed across networks, ensuring a new standard of security and trust in the rapidly expanding IoT landscape.
  • As the digital world continues to evolve, the need for robust, scalable, and trusted methods for IoT device management becomes ever more critical.
  • SEALSQ, in partnership with NIST, is at the forefront of defining and implementing best practices for trusted network-layer onboarding, a key component in safeguarding IoT devices from unauthorized access and manipulation.
  • These contributions are essential for the trusted network-layer onboarding of IoT devices, ensuring secure lifecycle management from inception to retirement.

SecurityScorecard Achieves StateRAMP®

Retrieved on: 
Thursday, February 15, 2024

SecurityScorecard , the global leader in security ratings, announced today that it achieved State Risk and Authorization Management (StateRAMP) pending status.

Key Points: 
  • SecurityScorecard , the global leader in security ratings, announced today that it achieved State Risk and Authorization Management (StateRAMP) pending status.
  • SecurityScorecard empowers hundreds of public sector organizations to deliver their missions and be more resilient.
  • StateRAMP covers each state's individual needs, making it possible for organizations like SecurityScorecard to meet the complex security cloud requirements for all states.
  • Visit the SecurityScorecard website for more information on SecurityScorecard for StateRAMP and FedRAMP.

Anaqua Launches AnaquaGov Providing Enhanced Security and Controls for Managing Highly Sensitive IP Data

Retrieved on: 
Thursday, February 15, 2024

This follows a review and validation of AnaquaGov by Schellman & Company, LLC, a leading CMMC third-party assessment organization (C3PAO).

Key Points: 
  • This follows a review and validation of AnaquaGov by Schellman & Company, LLC, a leading CMMC third-party assessment organization (C3PAO).
  • For this offering, Anaqua operates the AQX® IP Management System in the AnaquaGov enclave.
  • AnaquaGov represents another layer of security for our clients managing the most sensitive U.S. data and complements our ISO 27001, ISO 9001 and SOC 2 Type 2 certifications and global security programs.
  • Through AnaquaGov, we now support client entities in managing their IP portfolios to the levels of security required by DoD.

Mila - Quebec AI Institute holds an international conference on AI and Human Rights with the United Nations, the OECD, UNESCO and many others

Retrieved on: 
Wednesday, February 14, 2024

The conference "Protecting Human Rights in the Age of AI" aims to highlight and advance the critical efforts needed to incorporate human rights into AI governance mechanisms.

Key Points: 
  • The conference "Protecting Human Rights in the Age of AI" aims to highlight and advance the critical efforts needed to incorporate human rights into AI governance mechanisms.
  • This conference is one of the first official events at which these major international organizations come together to specifically address the intersection of AI governance and human rights.
  • However, a large part of the discussions about AI governance and human rights have evolved separately.
  • "Mila is proud to bring together renowned experts from international organizations, civil society, industry and academia to discuss issues related to human rights and AI.

Mila - Quebec AI Institute holds an international conference on AI and Human Rights with the United Nations, the OECD, UNESCO and many others

Retrieved on: 
Wednesday, February 14, 2024

The conference "Protecting Human Rights in the Age of AI" aims to highlight and advance the critical efforts needed to incorporate human rights into AI governance mechanisms.

Key Points: 
  • The conference "Protecting Human Rights in the Age of AI" aims to highlight and advance the critical efforts needed to incorporate human rights into AI governance mechanisms.
  • This conference is one of the first official events at which these major international organizations come together to specifically address the intersection of AI governance and human rights.
  • However, a large part of the discussions about AI governance and human rights have evolved separately.
  • "Mila is proud to bring together renowned experts from international organizations, civil society, industry and academia to discuss issues related to human rights and AI.

Systems Engineering Elevates Cybersecurity Leadership with Kent Goodrow as New Chief Information Security Officer

Retrieved on: 
Wednesday, February 14, 2024

PORTLAND, Maine, Feb. 13, 2024 /PRNewswire/ -- In a strategic move to fortify its cybersecurity leadership, Systems Engineering, the premier managed technology services provider in New England, is proud to announce the appointment of Kent Goodrow to the role of Chief Information Security Officer (CISO). With over a decade of experience in the technology and cybersecurity fields, Goodrow's appointment signifies the firm's commitment to further advancing its cybersecurity maturity, capabilities, and resilience.

Key Points: 
  • PORTLAND, Maine, Feb. 13, 2024 /PRNewswire/ -- In a strategic move to fortify its cybersecurity leadership, Systems Engineering, the premier managed technology services provider in New England, is proud to announce the appointment of Kent Goodrow to the role of Chief Information Security Officer (CISO).
  • Since joining Systems Engineering in 2012, Goodrow has been a pivotal force in the firm, holding a variety of technical, professional, and leadership roles.
  • His comprehensive experience and visionary leadership are invaluable assets that will guide our security strategies and implementation moving forward."
  • In his new role, Goodrow's focus is on driving the strategic direction of the complex and evolving security needs of Systems Engineering and their clients.

New Report on IoT Security Underscores the Current Risk of Unsecured Devices and Equipment

Retrieved on: 
Wednesday, February 14, 2024

The comprehensive report—available for free download here —highlights emerging IoT device security trends and challenges.

Key Points: 
  • The comprehensive report—available for free download here —highlights emerging IoT device security trends and challenges.
  • This report addresses the growing challenge of securing IoT devices and explores the consequences for businesses neglecting sufficient cyber resilience.
  • A common tactic is harvesting vast fleets of vulnerable IoT devices to create botnets and utilize them to conduct DDoS attacks.
  • Routers are the most targeted IoT devices, accounting for 75% of all IoT infections.