Personal-Data-Protection

Happy Data Privacy Day

On January 28th; the U.S., Canada, and 47 European countries take time to acknowledge the importance of privacy and data protection best practices. Although this day has its roots in protecting personal data, specifically with …

Read more

Whitehouse

White House Updates

When the Whitehouse issued its new action plan to prevent security breaches and attacks similar to that of the OPM fiasco, part of the plan was to acknowledge a number of cybersecurity gaps; some of which will ultimately impact …

Read more

ICMC-15

The Next Step in FIPS 140-2 and Cryptography

Changes in Security Certifications:  With the extension of the FED budget, companies have begun to plan and develop their 2016 FED sales objectives with an eye on the expanding $70B total addressable market.  These companies …

Read more

Corsec - FIPS 140-2

Ciena Corporation Achieves FIPS 140-2 Level 3

We are pleased to announce that our partner, Ciena Corporation, has successfully completed the Federal Information Processing Standards 140-2 (FIPS 140-2) validation for their product, the 6500 4×10 Krypto Card. The certification underscores Ciena’s commitment to …

Read more

blank

FIPS 140-2 & Common Criteria Security Certifications

The numbers are in and with our partners help; Corsec has had one of its most successful quarters in company history! And the future looks even more promising. With the rising threat of security breaches in today’s technology landscape, the need for products that can deliver a high degree of trusted protection…

FIPS 140, CSfC, Common Criteria, UC APL

Corsec Announces Fall 2014 Global Speaking Tour

Industry Experts Selected to Deliver Critical Guidance and Insights at Leading IT Security Conferences Fairfax, VA, September 8, 2014 – Corsec, the world’s leader in providing access to new markets via third-party security validations, recently …

Read more

Corsec-Common-Criteria

Common Criteria Certification: What Is It?

Do you need to open the door to sell your IT security product to the U.S. government? That seems like it should be a process that is simple to work through, but think again. Any IT security product that will be used by the U.S. government for national security systems, either to handle classified and even some non-classified…