Teradici Achieves IUT Listing

Corsec would like to congratulate our partner, Teradici Corporation, for achieving the Implementation Under Test (IUT) phase of the Federal Information Processing Standard 140-2 (FIPS 140-2) validation process for their PCoIP Zero Client product. To ...

Read more

blank

Certes CFNC Achieves Common Criteria

Corsec would like to congratulate our partner, Certes Networks, Inc. (Certes), for completing the Common Criteria (CC) certification process on their CryptoFlow Net Creator (CFNC) with CEP. To achieve this milestone, Certes partnered with Corsec, ...

Read more

blank

HPE Smart Array Gen10 P-Class RAID Controllers

Corsec would like to congratulate the entire HPE Smart Array team on completing the FIPS 140-2 validation process. The completion of the certification process not only opens the doors to new and exciting markets for HPE, but also demonstrates their fervent commitment ...

Read more

blank

FED IT Spending: Reviewing 2018 & Gauging 2019

2018 FEDERAL YEAR IN REVIEW 2018 was a stellar year for companies doing business with U.S. Federal Agencies. Over $95.6 billion dollars were allocated towards the procurement of secured IT products and solutions across Civilian, DoD, and ...

Read more

Corsec - FIPS 140-2

FIPS 140-2: Covering the Basics

What is FIPS 140-2? The Federal Information Processing Standard 140-2 (FIPS 140-2) is a U.S. and Canadian co-sponsored security standard for hardware, software, and firmware solutions. All products sold into the U.S. federal government are …

Read more

U.S. Gov

MONTHLY FED ROUNDUP – AUGUST 2017

DISA’s August News DISA formulates strategy to upgrade telecommunications infrastructure in Hawaii for 2018 DISA Central Field Command changes leadership as Army COL Corey Brumsey assumes command Air Force Col Trevor A. Wall takes command of …

Read more

U.S. Gov

MONTHLY FED ROUNDUP – JULY 2017

DISA’s July News DISA’s Joint Staff Support Center (JSSC) has transferred leadership as Air Force Col Douglas S. Shahan assumes command DISA offers training for DoD and Non-DoD entities trying to establish, re-accredit, or re-certify …

Read more

blank

Assurance Through Federal Certifications

Shashi Karanam, Corsec’s Senior Certification Consultant, will be speaking on Providing Assurance Through Federal Certifications from FISMA to NIST SP 800-53 Security Controls at this years Certified InfoSec Conference in the Washington DC metro area …

Read more

blank

Pentagon Releases New Security Policies

Last Friday’s DoD Industry Day on Network Penetration Reporting and Contracting for Cloud Services came with a big announcement from the Pentagon’s head of IT – DoD CIO John Zangardi. The Pentagon will begin to hold contractors …

Read more

blank

President Doubles Down on Cybersecurity

On May 11th, President Donald Trump issued an Executive Order requiring all heads of executive agencies and departments to modernize and strengthen cybersecurity within Federal networks and critical infrastructure. The order acknowledged that the government’s …

Read more

blank

IoT Device Security – What You Need To Know

The expanding market for connected devices and the Internet of Things (IoT) has propelled demand for products that alleviate the stress of managing daily interactions; from buying groceries to protecting our homes, there is an app or device for …

Read more

DoD APL Myths

Dispelling DoDIN APL Listing Myths

The hoops that companies must jump through in order to sell into the Federal government can be difficult to understand and sometimes misleading. As with any government process, misconceptions surrounding what is required begin to …

Read more

blank

Your Security Strategy – Are You At Risk?

$7 Million Dollars – According to a recent study by IBM, that’s the average cost of a security breach. The overall brand damage can be catastrophic, huge financial losses and customer abandonment. Companies like Target and …

Read more

blank

Are Your Partners Putting Your IP at Risk?

What if your intellectual property was at risk and you weren’t even aware? In today’s highly competitive and often vulnerable world, the companies we choose to partner with play a large role in the security …

Read more