Corsec's Continued Support During COVID-19 - Here
Automation

Further Automation Within The CMVP

The Cryptographic Module Validation Program (CMVP) is a part of the National Institute of Standards and Technology (NIST) which operates under the Department of Commerce.  The CMVP's role is to promote the use of validated ...

Read more

U.S. Gov

FED ROUNDUP: JULY 2019

DISA News DISA Awards SETI IDIQ to 23 Small Businesses DISA Releases 4 Year Strategic Plan NIST News Announcements: None Releases & Special Publications: SP 1800-17, Multifactor Authentication for E-Commerce: Risk-Based, FIDO Universal Second Factor ...

Read more

U.S. Gov

FED ROUNDUP: JUNE 2019

DISA’s June News DITCO, DISA's contracting arm, reduces its enterprise acquisition services fee NIST’s June News Announcements: NIST announces Open Security Controls Assessment Language (OSCAL), Version 1.0.0 - Milestone 1 has been released Releases & ...

Read more

Corsec - FIPS 140-2

FIPS 140-3 APPROVED

A Federal Register Notice has been issued for the "Federal Information Processing Standard (FIPS) 140-3, Security Requirements for Cryptographic Modules". Having now been signed by the U.S. Commerce Secretary, it is official, FIPS 140-3 has ...

Read more

Security Certification Maintenance

As you release new versions of previously certified and validated products, it is crucial that you develop a security certification maintenance plan to keep up with the evolution of your technology. Corsec’s Maintenance and Compliance ...

Read more

Common Criteria Schemes: Tips for Making the Right Choice

So many decisions, so little time. You’ve heard—and likely experienced—this mantra. And if you read this blog regularly, you’ve probably picked up on the fact that security validations involve making a whole host of decisions. When pursuing Common Criteria certification, one often perplexing, yet critical decision I hear people lament…

Why You Need Common Criteria Certification and How to Get There

In the IT security industry, research and development teams continually race to introduce new products, while at the same time, project teams improve upon existing offerings—all scrambling to ensure that the latest versions meet security functional and assurance requirements. The goal is to bring the strongest and most secure…