cybersecurity

Business Services Leader AMSYS Innovative Solutions Named Top Cybersecurity Company for Fifth Year in a Row

Honor from Houston Business Journal Demonstrates the Excellent Services that Company Provides Clients Intent on Protecting Themselves from Rapidly Growing Online Threats

Business Services leader AMSYS Innovative Solutions has been named a top cybersecurity company by The Houston Business Journal for the fifth year in a row. The honor demonstrates the excellent services that the company provides clients intent on protecting themselves from growing online threats.

“We are truly honored by winning this designation for the fifth year in a row,” stated AMSYS Founder and CEO Khalid Parekh. “We pride ourselves on 19 Years of excellence based on the principles of integrity, honor, and mutual gain. As future decisions are made, we are always keeping in mind the prosperity of the AMSYS Family, be it our employees, clients, or partners. It is very edifying to win this honor again since it makes clear that our hard work is delivering excellence for our clients.”

AMSYS is an international group that works in numerous verticals, including IT Managed Services, Cyber Security, Cloud and Voice Solutions, Physical Security, Data Center, AV and Wireless Solutions, Network Cabling, Neobanking and Smart Buildings. All our work is backed by a seasoned team with decades of experience in their respective fields.

“AMSYS Innovative Solutions is honored to be named a top cyber security company and we are also very serious about the work that we undertake on behalf of our client partners,” stated Justin Upchurch CCNP, CCDP, President AMSYS Integrated Technology Solutions. “As just reported in the Allianz Risk Barometer, cyber threats are the greatest concern for companies in 2022. The threat of ransomware attacks, data breaches or IT outages worries companies even more than business and supply chain disruption, natural disasters or the COVID-19 pandemic. AMSYS Innovative Solutions lives these threats every day and therefore understands the challenges and is committed to ensuring that we provide the best cyber security services available.”

The Allianz Risk Barometer cited is an annual survey that incorporates the views of 2,650 experts in 89 countries and territories, including CEOs, risk managers, brokers and insurance experts.

To hear directly from AMSYS clients on the excellent services the company provides, please visit https://amsysis.com/why-amsys/

Learn more about AMSYS Innovative Solutions by visiting https://amsysis.com or calling 281-519-2642.

Contact Author

PETER SCHWARTZ

AMSYS Innovative Solutions
520.609.2921


Full Name
Company
Phone Number
Website
Email

  Spam Protection

Embry-Riddle Awarded $3,875,000 for Cybersecurity Scholarships for Students

The National Science Foundation (NSF) has awarded Embry-Riddle more than $3.8 million to be granted to cybersecurity students in the form of scholarships over the next five years.

“Embry-Riddle has this unique capability in the safety-critical domain of aviation and aerospace cybersecurity,” said Dr. Radu Babiceanu, professor in the Department of Electrical Engineering and Computer Science and principal investigator on the NSF-sponsored project. “Our students have the opportunity to really make a significant difference in the cybersecurity of transportation, as well as of satellite data and radar systems.”

As home to the Center for Aerospace Resilience (CAR), “Embry-Riddle is well-positioned to advance national and state goals for minimizing cybersecurity risks to aviation and commercial space enterprise by building workforce capacity,” said University President P. Barry Butler, Ph.D. “We are honored to be entrusted with this NSF grant, which will allow us to prepare future cybersecurity leaders.”

TWENTY FULL-RIDE SCHOLARSHIPS

The grant to Embry-Riddle, supported by NSF’s CyberCorps Scholarship for Service program, is intended to address an urgent need for highly skilled cybersecurity professionals, especially in government agencies. Twenty scholarship recipients, 16 undergraduates and four graduate students, will receive full tuition and fees to attend Embry-Riddle, plus stipends, for up to two years, and will agree to work in cybersecurity for federal, state, local or tribal governments for the same duration as their scholarship support after graduation. The recipients will gain hands-on experience using state-of-the-art equipment in CAR facilities.

“As cyber threats continue to evolve in complexity, so must our approaches to cybersecurity education and our workforce,” said Sethuraman Panchanathan, director of the NSF, in an announcement from the agency. “The cybersecurity talent shortage remains a critical issue in the United States, with businesses and government agencies alike struggling to fill critical cybersecurity positions.”

The project proposed by Embry-Riddle, which was one of eight chosen by the NSF to receive funding, is designed to recruit a diverse group of scholarship recipients, offering them “a supportive environment for them to flourish through effective mentorship, well-developed curriculum, student involvement activities, and research experiences leading to their graduation and successful placement,” according to the project abstract. It will involve Embry-Riddle’s Daytona Beach, Florida, and Prescott, Arizona, campuses, Babiceanu said, selecting scholarship recipients “from the best of our diverse group of applicants from both campuses.”

Co-principal investigators include associate professor Dr. Keith Garfield and assistant professor Dr. Omar Ochoa, from the Daytona Beach Campus; as well as Dr. Krishna Sampigethaya, chair and associate professor of the Department of Cyber Intelligence and Security; and Dr. Jon Haass, professor in the Department of Cyber Intelligence and Security, both from Prescott.

The award to Embry-Riddle demonstrates its excellence in the aviation and aerospace cybersecurity realm, said Remzi Seker, Embry-Riddle’s associate provost for research.

Embry-Riddle Aeronautical University this week joined a national effort to build aviation and aerospace cybersecurity after being selected by the National Science Foundation (NSF) to receive $3,875,000 that will be awarded in scholarships to students in cybersecurity programs over the next five years.
“The Center for Aerospace Resilience was established to coordinate Embry-Riddle’s efforts related to aviation and aerospace cybersecurity,” said Seker. “This award is a testament to the quality of research performed by the faculty members affiliated with CAR, as well as Embry-Riddle’s commitment to meeting the national need for cybersecurity professionals who can improve the cyber resilience of aviation and aerospace systems.”

“We want to thank the State of Florida for providing Embry-Riddle with support as we pursued this grant, including the Governor and Congressman Michael Waltz and his team,” Butler added. “This project will be critical to Florida’s future, innovation and high-paying jobs.”

Contact Author

GINGER PINHOLSTER

Embry-Riddle Aeronautical University
(386) 226-4811


Full Name
Company
Phone Number
Website
Email

  Spam Protection

Zero Trust Leader iboss Wins 2021 Cybersecurity Excellence Award

INTERNET TELEPHONY Magazine Recognizes the iboss Cloud Platform for Enabling Users to Securely Connect to Any App, from Anywhere

iboss, the leading Zero Trust cloud security provider, announces that TMC has named its cloud platform as a recipient of the 2021 INTERNET TELEPHONY Cybersecurity Excellence Award presented by INTERNET TELEPHONY magazine.

In order to keep remote workers safe outside the traditional network perimeter, iboss moves network security to the cloud, enabling the modern workforce to connect securely and directly to all applications from wherever they work. iboss is being used by organizations worldwide to implement the Zero Trust architecture defined in the NIST 800-207 special publication. The iboss platform is built on a containerized cloud architecture, making it the only platform that can control what NIST refers to as the “Implicit Trust Zone.” This ensures that all resources, such as applications, data and services, are protected and are inaccessible without going through the iboss Zero Trust Edge.

“We are honored to be recognized as an industry leader by TMC, as this award further validates our commitment to meet and exceed the security needs of our customers,” said Paul Martini, CEO of iboss. “Organizations are rapidly changing how they approach network security, as the on-premise legacy network security appliances are simply no longer capable of securing today’s modern workforce as they work from anywhere. We’re proud to offer a solution that uses Zero Trust principles to enable the modern workforce to securely connect to any app on any device, from any location.”

The iboss Zero Trust platform provides the fastest connections, lowest latency and best security to some of the largest organizations in the world, ensuring fast, secure and direct connections to applications from anywhere. By eliminating VPNs and allowing users to connect directly to cloud applications, iboss eliminates typical traffic bottlenecks and ensures uninterrupted secure access, enabling employees to be more productive.

For more than 20 years, TMC has been honoring technology companies with awards in various categories. TMC awards are regarded as some of the most prestigious and respected honors in the communications and technology sector worldwide. The INTERNET TELEPHONY Cybersecurity Excellence Award highlights companies delivering innovation and advancement in IP communications and demonstrating the best practices to implement the network security. See the complete list of 2021 winners here.

About iboss
iboss is a Zero Trust cloud security company that enables the modern workforce to connect securely and directly to all applications from wherever they work. Built on a containerized cloud architecture, iboss delivers security capabilities such as SWG, malware defense, RBI, CASB and data loss prevention to all connections via the cloud, instantaneously and at scale. This eliminates the need for traditional network security appliances, such as VPNs, firewalls and web gateway proxies, which are ineffective at protecting a cloud-first and mobile world. Leveraging a purpose-built cloud architecture backed by 230+ issued and pending patents and more than 100 points of presence globally, iboss processes over 150 billion transactions daily, blocking 4 billion threats per day. More than 4,000 global enterprises trust the iboss Cloud Platform to support their modern workforces, including a large number of Fortune 50 companies. To learn more, visit https://www.iboss.com/.

About INTERNET TELEPHONY magazine
INTERNET TELEPHONY magazine has been the IP Communications Authority since 1998™. Beginning with the first issue in February of 1998, INTERNET TELEPHONY has been providing unbiased views of the complicated converged communications space. INTERNET TELEPHONY offers rich content from solutions-focused editorial content to reviews on products and services from TMC Labs. For more information, please visit http://www.itmag.com.

About TMC
Through education, industry news, live events and social influence, global buyers rely on TMC’s content-driven marketplaces to make purchase decisions and navigate markets. As a result, leading technology vendors turn to TMC for unparalleled branding, thought leadership and lead generation opportunities. Our in-person and online events deliver unmatched visibility and sales prospects for all participants. Through our custom lead generation programs, we provide clients with an ongoing stream of leads that turn into sales opportunities and build databases. Additionally, we bolster brand reputations with the millions of impressions from display advertising on our news sites and newsletters. Making TMC a 360-degree marketing solution, we offer comprehensive event and road show management services and custom content creation with expertly ghost-crafted blogs, press releases, articles and marketing collateral to help with SEO, branding, and overall marketing efforts. For more information about TMC and to learn how we can help you reach your marketing goals, please visit http://www.tmcnet.com and follow us on FacebookLinkedIn and Twitter, @tmcnet.


Full Name
Company
Phone Number
Website
Email

  Spam Protection

Yellow Tail Tech Teaches I.T. to Individuals with Security Clearance towards Landing High-Paying IT Jobs

Yellow Tail Tech is known for teaching students with no prior IT background. About 90 per cent of its students have no IT background whatsoever, but through the company’s framework, these individuals have managed to land high-paying jobs within the tech industry. Launched in 2014, Yellow Tail Tech offers six to nine months programs built for serious and motivated students who want to jumpstart or transform their careers.

Technology is rapidly progressing, generating millions and millions of jobs in the process. In the near future, most jobs will require a certain level of technological expertise and getting left behind will limit one’s opportunities. Fortunately, Yellow Tail Tech is here to help curb all those issues by being a highly successful EdTech company equipping individuals with no IT background or technical expertise with exceptional skills that will help them land their first high-paying IT job.

The renowned EdTech company boasts industry-certified instructors who work for the top enterprises all over the world. Their highly-equipped instructors offer hands-on experiences as they get their students ready for real-world challenges. Yellow Tail Tech trains its students to be Red Hat Certified System Administrators (RHCSA) and AWS DevOps Engineers.

The company has gained a massive reputation through its airtight training program that consistently produces extraordinary results. Yellow Tail Tech does things differently. The company’s airtight process has been significantly proven to produce results compared to alternative self-paced courses. Security clearance has been known to attract employers, increase an individual’s earning potential, and help them leverage their new career in the IT industry.

Yellow Tail Tech offers Linux DevOps and AWS Cloud Training for people with security clearance so they could begin their emerging careers in the IT Industry. The company heavily focuses on Linux and AWS Cloud Engineering with true subject matter experts who have a combined experience of over 30 years.

In a span of seven years, Yellow Tail Tech has successfully grown its track record for success. The company also boasts an internship as part of its program. Furthermore, they have a tuition reimbursement guarantee for students who don’t successfully land a job after successfully passing Yellow Tail Tech’s programs.

In the near future, Yellow Tail Tech is poised to become an industry leader in the EdTech space. The company aims to further grow its reputation within the realms of Linux and Cloud Computing, optimizing for results and not for scale. Yellow Tail Tech has been consistently growing by 250% every year, and in a couple of years’ time, the company is envisioned to grow by five to ten times larger than what it currently is.

It’s undeniable that there is a large gap between the amount of available Cloud Computing professionals and the ever-growing market demand. Yellow Tail Tech offers a clear and concise solution to this problem by training passionate and determined people with no IT Background and upskilling them to become skilled IT professionals.

Yellow Tail Tech helps its aspiring students leverage all the positive benefits of having a Security Clearance by helping them undergo an airtight and rigorous training program that will help them land a high-earning job in the IT industry. It is a clever win-win solution that helps individuals and the entire IT industry as a whole.

To know more about Yellow Tail Tech, make sure to follow the company on Instagram and Facebook.

Contact: 

Company Name: Yellow Tail Tech
Email: hello@yellowtail.tech
Phone: (301) 887-3220
Website: https://yellowtail.tech/

SOURCE: Yellow Tail Tech


Full Name
Company
Phone Number
Website
Email

  Spam Protection

How well is your Internet Security Suite protecting you?

AV-Comparatives releases Internet Security Real-World Protection Test Report for H1 2021

Independent security-software evaluation lab AV-Comparatives has just released the report of its Consumer Real-World Protection Test for February-May 2021.

Partially funded by the Republic of Austria, this test was conducted by AV-Comparatives supported by the University of Innsbruck’s Faculty of Computer Science.

Link –> Find the full report here!

The consumer security products tested in the Real-World Protection Test were:

Avast Free Antivirus
AVG Free Antivirus
Avira Antivirus Pro
Bitdefender Internet Security
ESET Internet Security
G Data Total Security
K7 Total Security
Kaspersky Internet Security
McAfee Total Protection
NortonLifeLock Norton 360
Panda Free Antivirus
Total AV Total Security
Total Defense Essential Antivirus
Trend Micro Internet Security
VIPRE Advanced Security

The Real-World Protection Test conducted by AV-Comparatives simulated real-world conditions as experienced every day by users. The company’s own crawling system was used to find out malicious sites and extract malicious URLs to be used in the test. The tests were performed using a fully patched Microsoft Windows 10 64-bit system.

The test accurately determined if each malware sample used was able to make any changes to the test system.

AV-Comparatives co-founder Peter Stelzhammer commented, “In this kind of testing, it is very important to use sufficient test cases (samples). If only a small sample set is used in comparative tests, the results may not accurately indicate the protective capabilities of the tested products. AV-Comparatives use more test cases per product and month than any other testing lab running similar tests. Consequently, our tests reach a very high level of statistical significance”.

To group the results and identify the level of similarity between the clusters, statistical methods like hierarchical cluster analysis were utilized. To ensure that security programs do not plague users with false alarms, AV-Comparatives put all the products through a false-positive test.

Programs with high levels of false alarms had their award levels reduced. Many of the tested products performed well, with only one product reaching the highest award level. However, AV-Comparatives states that the standards for this test are very high, and even products with the Standard Award have achieved a creditable protection level.

Like all AV-Comparatives’ public reports, the report of the 2021 H1 Consumer Real-World Protection Test can be downloaded free of charge from the institute’s website. You can read the report here: https://www.av-comparatives.org/tests/real-world-protection-test-february-may-2021/

Peter Stelzhammer
AV-Comparatives
+43 720 115542
Visit us on social media:
Facebook
Twitter
LinkedIn


Full Name
Company
Phone Number
Website
Email

  Spam Protection

Cybersecurity Pro Vinny Troia: How to Head Off a Data Breach and Protect Your Business Before It’s Too Late

Vinny Troia’s Top Tips for Effective Cybersecurity

Vinny Troia knows that with ransomware attacks, data breaches, and a whole host of other cybersecurity threats at an all-time high, it is now more essential than ever before for businesses of all sizes to take steps to protect their sensitive data. To help ensure that your business is not the next victim of a cybersecurity disaster, we’ll take a look at a few proven tips from cybersecurity expert Vinny Troia on how you can head off a data breach and protect your business before it’s too late.

Vinny Troia’s Top Tips for Effective Cybersecurity
From rendering your business inoperable to exposing the sensitive data of your company and its customers, the risks posed by cybersecurity threats are certainly substantial. To prevent a data breach that could cause serious damage to your business’s profits and reputation, Vinny Troia recommends following these tips for effective cybersecurity:
Make Sure Your Security Software is Up to Date – The cybersecurity software that your company makes use of is its first line of defense against would-be hackers. However, software that is out of date may not offer much protection. Always make sure that you are using the latest, updated cybersecurity software in order to make sure your business is as protected as possible.

Train Your Employees on Proper Cybersecurity Protocols – Human error is often one of the main factors that expose a company to data breaches. A simple mistake such as clicking on the wrong link or entering a password into the wrong place can have major consequences. To help eliminate the chances that one of your employees makes a mistake that could leave your company exposed to hackers, be sure to provide thorough training to all of your employees on proper cybersecurity protocols.

Make Use of Two-Factor Authentication – Two-factor authentication – such as requiring you to enter a passcode that is texted to your phone in addition to entering your password – is one of the strongest protections against unauthorized breaches available today. It may seem like a hassle, but the extra security that two-factor authentication provides is well worth the tradeoff.

Perform a Cybersecurity Audit – Hiring a cybersecurity firm to perform an audit of your company’s security is an excellent way to pinpoint and bolster any weaknesses in your security before those weaknesses lead to a data breach. A reputable cybersecurity firm that performs security audits will be able to point out any shortcomings in your defenses as well as provide solutions to bring your cybersecurity up to par.

Over the years, Vinny Troia has seen first-hand just how costly poor cybersecurity can become. With a little time and money spent on bolstering your company’s cybersecurity technology and protocols, though, you can ensure that your business is not the next victim of a devastating data breach.

Vinny Troia
nightlionsecurity
+1 314-669-6569


Full Name
Company
Phone Number
Website
Email

  Spam Protection

Cybersecurity, ransomware attacks can be stopped, we need to change the way we tackle it.

Re-thinking the approach to securing systems and data is required since traditional methods have not worked.

Excelitte protects your data from ransomware

The United States, Europe, Australia, and many other countries are focusing their attention on Cybersecurity dedicating billions & trillions of dollars which if spent accurately in the relevant areas is money well spent. If it is spent on previous methods, approaches and not on new/innovative ones, then it is frankly wasted.

Re-thinking the approach to securing systems with particular emphasis on addressing each layer that can be breached; network, server, middleware, transport, communication, data, hardware, etc. Provide first a logical, then a physical implementation to pre-empt & prevent the breach from occurring is required.

The existing methods have not worked, we need to completely rethink how we move forward to secure data, networks, and the several layers of a computer system. We need to use modern IT precepts, such as AI/Deep ML, Automation, Intelligent Analytics, Software Robotics, etc to pre-empt and impede such attacks.

Cyberwarfare is frankly a war of a different kind declared on the free world supported by hostile government institutions, as we are all aware. To win this war, a combination of both an offensive and defensive approach needs to be employed.

So far, we seem to be deploying defensive methods that are now obsolete.

The need to innovate, think up new approaches, change the way we capture, store, and use data for starters cannot be overemphasised.

Companies need to stop holding or storing data in Excel Spreadsheets, Word Documents if they don’t really need to because ransomware attacks on these file types are very easily carried out just like taking candy from a baby.

Data needs to be stored in database software applications which can be custom developed or off the shelf ready-to-use software packages like Excelitte (www.excelitte.com).

At TEMSCONSU we guarantee that your data stored in Excelitte can never be lost or stolen or held to ransom because the data can be recovered very easily without paying out millions.

We also have and are working on other innovative solutions that will reverse engineer current methods of carrying out these attacks, pre-empt and then offensively work very effectively to impede them.

Organisations need to employ/develop like for like skillset or even better or potential to be better to stand any chance at all, of repelling these attacks.

To win the Cyberwarfare or successfully repeal any such attacks will come down to innovation, a different way of thinking, and superior skillsets or at least similar.

There is obviously a pressing need to out-think and outsmart these cybercriminals.

V.Wats
TEMSCONSU


Full Name
Company
Phone Number
Website
Email

  Spam Protection

National Cyber League and Cyber Skyline Announce Cybersecurity Team Rankings for Spring Competition

The National Cyber League (NCL), powered by Cyber Skyline, has announced its current competition leaderboard for its Spring Season, and Team IrisSec (primarily from University of California – Merced) tops the list for the second consecutive NCL Season. This was IrisSec’s third season participating in the NCL Competition.

NCL Fall 2021 Season Dates Released

The National Cyber League (NCL), powered by Cyber Skyline, has announced its current competition leaderboard for its Spring Season, and Team IrisSec (primarily from University of California – Merced) tops the list for the second consecutive NCL Season. This was IrisSec’s third season participating in the NCL Competition.

Excelsior College – the r00ts; and Michigan Technological University – RedTeam took 2nd and 3rd place, respectively. The top three teams achieved 100% completion, while IrisSec surged ahead with 97.13% accuracy. The full list of 922 team placements, showing points, accuracy and completion percentages, is available at this link.

During the April monthly NCL Coaches Call, guest students from IrisSec and RedTeam@MTU described their experience. They discussed their difficulty cracking some of the challenges, specifically in the Password Cracking and Enumeration categories. They highlighted the importance of diverse skillsets among the team players, not only to complete the challenges, but also to continue learning. By collaborating, comparing and critiquing approaches and solutions with one another online, they were able to ensure a superior level of accuracy.

NCL is a biannual cybersecurity competition for high school and college students consisting of challenges to test and build their cyber skills. Students learn how to better identify hackers from forensic data, recover from ransomware attacks and break into vulnerable websites. Students compete and not only represent their schools, but also receive “Scouting Reports” of their individual performance, which verify in granular detail their hands-on cybersecurity skills to potential employers.

The top three schools out of 520 colleges and universities that participated in the Spring NCL Season were Excelsior College, University of Alaska Anchorage, and Michigan Technological University. An additional 60+ high schools participated. In all, 6,380 students (including high school students) competed. The top 100 colleges are listed in Cyber Skyline NCL Cyber Power Rankings each season.

Every year, more than 12,000 students from over 620 academic institutions across the U.S. participate in NCL. They are ranked based on team, individual and aggregate individual performances, which represents the abilities of these students to perform real-world cybersecurity tasks on the Cyber Skyline platform.

NCL has released its Fall 2021 Season Dates:

  • Registration Opens: August 23
  • Gym Open: August 23 – December 17
  • Preseason Game: October 11-18
  • Individual Game: October 22-24
  • Team Game: November 5-7

The NCL Annual Report is accessible at this link. For more information on NCL, partnership opportunities, sponsorships, coaches’ resources, or how to compete, visit nationalcyberleague.org.

About the National Cyber League:
Founded in 2011 by an alliance of public agencies dedicated to developing the next generation of cybersecurity professionals, the NCL is a nonprofit cybersecurity competition that measures the ability of students to perform real-world cybersecurity tasks. Powered by industry-leading cybersecurity skills evaluation technology from Cyber Skyline, the competition has students identify hackers from forensic data, break into simulated bank websites, recover from ransomware attacks, and more.

Contact Author

TALY WALSH
National Cyber League
571-289-6602


Full Name
Company
Phone Number
Website
Email

  Spam Protection