atsec information security is an independent, privately owned company that focuses on providing laboratory and consulting services for information security. We address commercial and government sectors around the world. Our consultants are expert in a variety of technologies including operating systems, databases, and network devices. Our laboratories specialise in evaluating and testing commercial products, using international standards to help provide assurance to end-users about the products they buy and use. We focus on assisting organizations, large and small, achieve compliance with standards such as Common Criteria, FIPS 140-2, O-TTPS, PCI, ISO/IEC 27001 and FISMA and offer a variety of services that complement that goal.
Cryptsoft is an Australian company that operates worldwide in the enterprise key management security market. Cryptsoft’s Key Management Interoperability Protocol (KMIP) and Public Key Cryptography Standard 11 (PKCS#11) software development kits are industry’s preferred OEM solutions. Cryptsoft’s solutions have been selected by prominent global companies for interoperable enterprise key management and encryption technology for storage, infrastructure, security and cloud products. Cryptsoft is committed to developing standards based security software and is an OASIS Foundational Sponsor.
Secure Software for the Internet of Things – Allegro Software is a leading provider of embedded Internet software toolkits to product developers worldwide. Field proven in 200,000,000+ devices, our solutions enable manufacturers of hardware, software and digital products in the Military, Energy, Healthcare, Enterprise and Consumer markets to create connected secure devices using TLS, Suite B, FIPS 140-2 capabilities and more.
NewAE Technology Inc. is a self-funded Canadian company that is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and clock glitching as important attack vectors.
NewAE Technology Inc. develops open-source hardware and software solutions for performing security analysis of embedded computer systems. To see these open-source projects check out http://www.ChipWhisperer.com (including a link to the repository), and some of the current hardware products are at http://store.newae.com.
One of the world’s leading companies for PKI solutions, PrimeKey has developed successful technologies such as EJBCA Enterprise, SignServer Enterprise and PrimeKey EJBCA Appliance. PrimeKey is a pioneer in open source security software that provides businesses and organisations around the world with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.
SafeLogic provides FIPS 140 validated encryption products for applications in mobile, server, appliance, cloud, and other environments. Our flagship product line, CryptoComply™, provides immediate drop-in FIPS 140 compliance, while our RapidCert™ process has revolutionized the way that certificates are earned, accelerating full FIPS 140 validation to less than 8 weeks. SafeLogic’s customers include many of the most influential and innovative companies in technology. SafeLogic is privately held and is headquartered in Palo Alto, CA.
Teron Labs is an independent security testing laboratory, based in Australia, but with a global reach. Our goal is to help organisations around the world to gain certifications in a timely and predictable manner. We understand that delays in the certification process can result in a loss of sales for your business, therefore, we are able to work with you closely throughout the product development and evaluation processes to make sure that your product is able to be certified without encountering any roadblocks. Unlike other laboratories, which are embedded within large multinational and general cyber security services organisations, the focus of Teron Labs is security testing of ICT products, specialising in FIPS 140-2 and Common Criteria. This focus, together with a simpler business structure and low overheads, provides Teron Labs with a competitive edge in delivering personalised consulting and testing solutions.
Engage Black developed the BlackVault Hardware Security Module (HSM) to enable CSfC deployments to protect keys used by multi-layer VPNs to securely Authenticate. Our tamper reactive FIPS-140-2 Level-3 HSMs have validated interoperability with InfoSec’s CertAgent CA, Red Hat Certificate System, and Microsoft CA.
Post-Quantum Cyber Security
Knowing traffic recorded today will be decrypted by a quantum computer in the future. Engage has implemented Quantum-Safe Hybrid-Key-Exchange standards, since the time to employ Quantum-Safe-Security is Now.
eShard is a leading specialist in embedded security technology focussed on cyber-threats and how to protect against them. We empower professionals to manage their security challenges and risks. Our solutions enable our clients to examine and enhance the protection of connected devices. As a result, they de-risk their businesses and are better prepared for facing future security challenges.
At eShard, we continuously innovate in the research of new attacks and tools to efficiently assess vulnerabilities. Our flagship platform, esDynamic, is adopted by leading security firms, and our automated mobile application scanning solution, esChecker, is endorsed by a major payment scheme.
QuintessenceLabs is the leader in quantum cybersecurity solutions delivering advanced data protection for today while building the strongest foundation for a quantum safe future. The company has developed comprehensive key and policy management capabilities coupled with unique quantum technology that delivers the world’s fastest true random keys, and is at the forefront of quantum key distribution.
QuintessenceLabs was named a Technology Pioneer by the World Economic Forum for its work in building strong, innovative quantum cybersecurity solutions.
The company has offices in Canberra, Australia and in San Jose, California, USA.
The wolfSSL embedded SSL library is a lightweight, portable, C-language-based SSL/TLS library targeted at IoT, embedded, and RTOS environments primarily because of its size, speed, and feature set. It works seamlessly in desktop, enterprise, and cloud environments as well. wolfSSL supports industry standards up to the current TLS 1.3 and DTLS 1.2, is up to 20 times smaller than OpenSSL, offers a simple API, an OpenSSL compatibility layer, OCSP and CRL support, is backed by the robust wolfCrypt cryptography library, and much more. The CMVP has issued FIPS 140-2 Certificate #2425 for the wolfCrypt Module.
ACT Canada helps members understand complex issues and filter truth from market noise for current and emerging commerce trends. Through a consultative approach with all stakeholder groups, the association provides knowledge and expertise to help members leverage opportunities, confront challenges and advance their businesses in a rapidly changing marketplace.
Our core pillars are to:
Engage – Grow the commerce community via stakeholder contributions, collaboration and networking.
Enable – Provide access to the expertise of the member community to gain insights that will help strategic decision-making.
Evolve – Drive positive change in the increasingly complex commerce environment.
AQNIU is the only private research institute focusing on network security industry in China. It is committed to popularization,sharing and recommending network security knowledge and technology, building a platform for different organizations and people.
News reports, industry analysis, survey reports and conference activities are the main business of the AQNIU.Gartner (technology)、IDC (statistics),and the solution (landing)。These is the development form of AQNIU.
The Common Criteria Users Forum (CCUF) was founded in 2012 and is a community based around those using the Common Criteria and ISO/IEC 15408 standards. The Common Criteria Users’ Forum mission is to provide a voice and communications channel between the CC community and the CC organizational committees, CC evaluation schemes, and policy makers. To join, go to http://www.ccusersforum.org/.
The Cryptographic Module User Forum (CMUF) mission is to provide a voice and communications channel between the community of UNCLASSIFIED cryptographic module (CM) and UNCLASSIFIED cryptographic algorithm developers, vendors, consultants, test labs and other interested parties, and the various national, international, and multi-lateral organizational committees, schemes, and policy makers. To Join the CMUF contact any CMUF Steering Committee member.
Crypto Workshop was set up to help people better use and understand the Bouncy Castle Cryptography APIs. In addition to maintaining the Bouncy Castle APIs and managing the FIPS 140-2 certified versions, we help our clients to make the most of their use of the Bouncy Castle APIs and keep the Bouncy Castle APIs supported and Open Source.
With Java, Android, and C# .NET versions, we have clients across a range of industries and application spaces, but overall they fall into three categories. Some who have support contracts in place simply to avoid developers getting stalled – it being cheaper and more effective for developers to call on us directly.
Some using our tools and services to help do private certifications of the Bouncy Castle FIPS APIs for their own purposes. Finally, there are those who take advantage of our FIPS early access program to accelerate product development and deployment.
GlobalPlatform is a non-profit industry association driven by approximately 100 member companies. Members share a common goal to develop GlobalPlatform’s specifications, which are today highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle. GlobalPlatform protects digital services by standardizing and certifying a security hardware/firmware combination, known as a secure component, which acts as an on-device trust anchor. This facilitates collaboration between service providers and device manufacturers, empowering them to ensure the right level of security within all devices to protect against threats. Market sectors adopting GlobalPlatform technology include automotive, healthcare, government and enterprise ID, payments, premium content, smart cities, smart home, telecoms, transportation, and utilities.
Homeland Security Today (HSToday) is a 501(c)(6) nonprofit association media outlet dedicated to informing and supporting the efforts of public, private, nonprofit, and academic organizations and practitioners engaged in the homeland security mission. Since its inception as a for-profit publication in 2004, HSToday has provided award-winning news and analysis revealing the challenges, opportunities and successes of the United States’ homeland and national security and intelligence communities.
Homeland Security Today covers breaking news for the homeland security community, and now, with GTSC as its umbrella, will cover the federal homeland security market in-depth.
Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry. Its multiple award winning editorial content provides compelling features both online and in print that focus on hot topics and trends, in-depth news analysis and opinion columns from industry experts.
Infosecurity Magazine also provides free educational content, endorsed by all major industry accreditation bodies and is therefore considered a key learning resource for industry professionals.
ISARA Corporation, the world’s leading provider of agile quantum-safe security solutions, leverages decades of real-world cybersecurity expertise to protect today’s computing ecosystems in the quantum age. With our partners, we’re clearing the path to quantum-safe security for enterprises and governments by delivering practical, standardized solutions for a seamless migration. Co-founded in 2015 by former BlackBerry security executives, our team has launched several first-of-its-kind solutions such as a quantum-safe cryptographic library, integration tools for developers, and agile technologies. With an emphasis on interoperability, we proudly collaborate on international standards-setting efforts. For more information, visit http://www.isara.com or follow @ISARACorp on Twitter.
OASIS has a broad technical agenda encompassing cybersecurity, blockchain, privacy, cryptography, cloud computing, IoT, urban mobility, emergency management, content technologies. In fact, any initiative for developing code, APIs, specifications, or reference implementations can find a home at OASIS.
Some of the most widely adopted OASIS Standards include AMQP, CAP, CMIS, DITA, DocBook, KMIP, MQTT, OpenC2, OpenDocument, PKCS, SAML, STIX, TAXII, TOSCA, UBL, and XLIFF. Many of these have gone on to be published as ISO, IEC, or ITU standards. New work is encouraged, and all are welcome to participate.
OASIS members can be found in 100+ countries on virtually every continent. Major multinational companies, SMEs, government agencies, NGOs, universities, research institutions, consulting groups, and individuals are all represented.
The Payments Summit is the premier industry event covering all things payments, including FinTech, EMV chip technology, mobile wallets, NFC, contactless, open transit systems and more. Attend the 12th annual Payments Summit and get the latest on all of these exciting technologies and the many business opportunities they can unlock.
2019 will mark the second year that the Secure Technology Alliance and the U.S. Payments Forum are combining the Payments Summit with the U.S. Payments Forum All-Member Meeting, resulting in the most comprehensive gathering of card and payments professionals than ever before!
Through open standards and specifications, Trusted Computing Group (TCG) enables secure computing. Benefits of TCG technologies include protection of business-critical data and systems, and secure authentication and strong protection of user identities. Trusted hardware and applications reduce enterprise total cost of ownership and support regulatory compliance. Through its member-driven work groups, TCG enables the benefits of trust in computing devices from mobile to embedded systems, as well as networks, storage, infrastructure, and cloud security.