Frederick, MD, Feb. 2019 – Fornetix, an Orchestration Equity company and industry pioneer in enterprise key management technology, is excited to welcome Bill Regan as Senior Vice President of Finance. Regan brings to Fornetix 35 years of finance and accounting experience, including 25 years at public companies. He has extensive transactional experience including two IPOs and numerous acquisitions, divestitures, and financings. He comes to Fornetix from the specialty financing sector where he served as a corporate controller. Prior to that, he served as Vice President, Corporate Controller at Rentech. Regan holds a Bachelor of Science degree in Business Administration — Accounting from California State Polytechnic University, Pomona and is a Certified Public Accountant (inactive).
Sterling, VA and Frederick, MD – February 5th, 2019 – Network Runners, Inc, a top technology consulting services company that supports the commercial and federal government market spaces, and Fornetix, a leading provider of encryption key management solutions for cyber security, announced they will partner and showcase cutting-edge defense systems at the AFCEA WEST Conference in San Diego, CA, on February. 12-15, 2019.
The demand for connected devices is growing exponentially, but the technology to secure these devices is lagging creating cyber security vulnerabilities at a massive scale.
The Current State of Cyber Security
Every day we hear about breaches, hacks, and cyber-attacks affecting banks, hospitals, transportation, and even entire cities. In some instances, the impact can mean life or death. Our most trusted institutions – like the US election process – are not the pillars of security they once were. And yet the demand for “connected everything” continues to grow in all sectors and across the globe.
By Utilizing Fornetix VaultCore™, Ruckus Networks’ Customers Are Now Empowered to Maximize Security Controls Across All Ethernet-Based Networks Read more
There is growing concern regarding the role that encryption on personal devices might play in the future of law enforcement activities. Strong encryption, which uses large keys that are controversially hard to crack, has caused complaints in recent years as manufacturers such as Apple and Google increasingly add these features to their devices. What these companies have done is not new technology, but the broader application of existing public-private key encryption in a way that’s easy to use for the average consumer. Read more
A special thank you to Maha Amircani for her guest post discussing the reality of cyber vulnerabilities faced by major cities. Maha is an attorney in Atlanta, Georgia and founder of Amircani Law. A Georgia native born to immigrant parents from Egypt, Maha represents clients in city, state and federal court litigation as well as administrative proceedings. Her practice specializes in the areas of personal injury, criminal defense, and real estate closings.
There has been a lot of interest in protecting businesses from the threat of ransomware. But, city governments are at real risk and the impact reverberates to people like me who interact with them daily. After the City of Atlanta ransomware attack in March 2018, this became crystal clear.
Utilizing VaultCore During a Hospital Ransomware Event
In Part 2 of this series, we examined the ongoing transition from Cyber Security to Cyber Defense, discussing Cyber Defense effects and utilizing VaultCore to realize those effects. In this post, we continue the discussion as we demonstrate how VaultCore enables the effects in a real-world scenario.
For practical consideration, let’s examine the following environment: A healthcare enterprise with 15 hospitals, two data centers, and multiple third-parties who use hospital technology resources. The IT infrastructure represents a number networks, applications, storage solutions, and network-connected diagnostic equipment.
It’s been a little over a year since exclaiming that Cyber Security is dead. In that year, we have seen broader acceptance of terms like Defense and Resiliency. We have even seen attempts to pass laws that are the cyber equivalent of the “castle doctrine” for home defense. All that aside, one term that is starting to show up in this space is Orchestration. In practice, tools that support AI, machine learning, or analytics are turning to the term Orchestration to address what happens next. Applying the OODA loop (Observe, Orient, Decide, Act) is an easy way to look at this — if SIEM, AI, machine learning, big data, etc. are about Observe and Orient, then Orchestration is about Decide and Act.