Common Criteria

Common Criteria NDcPP Version 2 Released

The newest version of the Common Criteria Network Device Collaborative Protection Profile (NDcPP) and Supporting Documents (SD) has been released. Key changes in version 2.0 include: Support for distributed TOEs Updated X509 certificate authentication requirements …

Read more

Corsec-Common-Criteria

Common Criteria Version Update

Common Criteria, the internationally recognized set of guidelines (ISO 15408), which define a common framework for evaluating security features and capabilities of Information Technology security products, has been updated to CC v3.1 Release 5. This new release …

Read more

U.S. Gov

Monthly Fed Roundup – April 2017

DISA’s April News DISA system improves access to video surveillance for intel community NIST’s April News Cryptographic attack cited for the FF3 technique for format-preserving encryption (FPE)Requested Public Comment On: Draft Special Publication (SP) 800-190, Application …

Read more

blank

IoT Device Security – What You Need To Know

The expanding market for connected devices and the Internet of Things (IoT) has propelled demand for products that alleviate the stress of managing daily interactions; from buying groceries to protecting our homes, there is an app or device for …

Read more

blank

Cover Your Assets: 3 Ways To Protect Your IP

The cost of Intellectual Property (IP) theft is not one to be taken lightly. From steep financial losses to the irreparable damage to brand perception, IP theft can swiftly and unapologetically dismantle an organization from …

Read more

U.S. Gov

Monthly Fed Roundup – March 2017

DISA’s March News DISA holds Systems Engineering, Technology, and Innovation Pre-Proposal Conference for insights on new Engineering Contract Vehicle Training offered for individuals trying to re-certify, re-accredit, or establish connectivity to the Defense Security Information Security Network …

Read more

blank

CMVP Changes to FIPS 140-2

During the recent Cryptographic Module User Forum (CMUF) meeting, CMVP, which oversees FIPS 140-2 validations in the United States and Canada, announced updates and changes to policy for stagnant modules, the historical list, and documentation …

Read more

DoDIN APL

Ixia Expands DoD Sales Reach

Corsec would like to congratulate our partner, Ixia, the company dedicated to delivering innovative solutions and trusted insight to support your network and security product; on completing the process for the Department of Defense Information Network Approved …

Read more

DoD APL Myths

Dispelling DoDIN APL Listing Myths

The hoops that companies must jump through in order to sell into the Federal government can be difficult to understand and sometimes misleading. As with any government process, misconceptions surrounding what is required begin to …

Read more

U.S. Gov

Monthly Fed Roundup – January 2017

DISA’s January News DISA focuses on Innovation during the Armed Forces Communications and Electronics Association panel NIST’s January News NIST Draft Releases: Draft Special Publication 800-12, Revision 1, An Introduction to Information Security NIST Interagency Reports: …

Read more

blank

Updates to CMVP’s Sunsetting Policy

From the CMVP on their validation Sunsetting Policy: The CMVP is adopting a five year validation sunsetting policy, effective February 1, 2017. The CMVP will move all validation entries with most recent validation dates** prior to February 1, …

Read more

blank

New Guidance On FIPS 140-2 Listings

The Cryptographic Module Validation Program (CMVP), which was established by NIST to validate modules for the Federal Information Processions Standard (FIPS), has announced upcoming policy changes for the Modules In Process (MIP) list and Implementation Under Test …

Read more

U.S. Gov

Monthly Fed Roundup – December 2016

DISA’s December News No December Updates NIST’s December News NIST Draft Releases: Draft Special Publication 800-188, De-Identification of Government Datasets Special Publications: SP 800-179 Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST …

Read more

blank

Your Security Strategy – Are You At Risk?

$7 Million Dollars – According to a recent study by IBM, that’s the average cost of a security breach. The overall brand damage can be catastrophic, huge financial losses and customer abandonment. Companies like Target and …

Read more

blank

Are Your Partners Putting Your IP at Risk?

What if your intellectual property was at risk and you weren’t even aware? In today’s highly competitive and often vulnerable world, the companies we choose to partner with play a large role in the security …

Read more