About Secure Decisions

This author has not yet filled in any details.
So far Secure Decisions has created 167 blog entries.

Mission Assurance Proof-of-Concept: Mapping Dependencies among Cyber Assets, Missions, and Users

Buchanan, L., Larkin, M., & D'Amico, A. (2012, November). Mission assurance proof-of-concept: Mapping dependencies among cyber assets, missions, and users. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 298-304). IEEE.

Visual Techniques for Analyzing Wireless Communication Patterns

Gancarz, K., & Prole, K. (2012, November). Visual techniques for analyzing wireless communication patterns. In Homeland Security (HST), 2012 IEEE Conference on Technologies for (pp. 341-347). IEEE.

Secure Decisions releases MeerCAT® Pro Version 4.0

NORTHPORT, NY, August 15, 2012 – The Secure Decisions Division of Applied Visions has released a new version of its wireless network security visualization tool, MeerCAT®-Pro Version 4.0. MeerCAT®, a visualization tool to help identify wireless vulnerabilities and threats, and assess the risks to an organization was developed as part of a DARPA-funded research effort. It has helped many security professionals – including information security auditors, penetration vulnerability testers, and computer network defenders – conduct post-hoc analysis of data acquired from wireless site surveys and security audits. The data analyzed by MeerCAT® is typically collected using “wardriving” software such as Flying Squirrel or Kismet that discover, identify, and locate wireless transmitters. MeerCAT® integrates wireless discovery data with a geographic information system (GIS) to provide a unified view of detected wireless devices, with their vulnerabilities and [...]

Secure Decisions’ “Code Dx” To Be Demonstrated at Summer Software Assurance Working Group Forum, McLean, Virginia

NORTHPORT, NY, June 20, 2012 – The Secure Decisions Division of Applied Visions, Inc. will be presenting their newly developed software assurance visualization technology, “Code Dx”, at the Software Assurance Working Group Summer Session on June 28, 2012 at MITRE-1, 7525 Colshire Drive, McLean, VA. The presentation will describe two related Department of Homeland Security (DHS) Science & Technology (S&T) initiatives -- Code Dx and TOIF -- aimed at using multiple security analysis tools to increase identification and coverage of software weaknesses. KDM Analytics’ Tool Output Integration Framework, “TOIF”, is an open-source standard-based framework for integrating and normalizing code weaknesses reported by multiple detection tools (commercial and open source). Code Dx is a tool to visualize security tool findings in a single unified interface, putting them into proper context for effective triage and mitigation. This [...]

2020-07-14T12:28:26-04:00Jun-2012|Categories: News, Press Releases|

Computer Security Awareness Training Offered for Lawyers and Law Office Staff

On June 22nd, 2012 Secure Decisions will deliver computer security awareness education as part of a Continuing Law Education (CLE) program offered at the Applied Science Foundation for Homeland Security. NORTHPORT, NY, May 22nd, 2012 – The “Protecting Electronic Information in the Law Office” course is designed to educate practicing attorneys about their legal and ethical responsibilities to protect electronically stored information. Secure Decisions will be delivering an interactive educational session that focuses on understanding how easy it is for confidential data to be inadvertently released in the electronic workplace, an essential first step to ensuring adequate protection for electronic information. The Secure Decisions session will cover a variety of computer security topics including data leakage, malicious software, email and phishing, safe web browsing, and mobile and wireless device safety.  It will be taught by [...]

2020-08-03T11:20:02-04:00May-2012|Categories: News, Press Releases|

Secure Decisions Selected to Demonstrate Technologies at the U.S. Cyber Command Cyber Flag Industry Day

Secure Decisions will exhibit three technologies at the USCYERCOM Cyber Flag Industry Day on February 7th, 2012. NORTHPORT, NY, February 6th, 2012 – The Secure Decisions division of AVI, a provider of research and advanced technology in cyber situational awareness, has been selected to demonstrate its technologies at the U.S. Cyber Command (USCYBERCOM) Cyber Flag Industry Day on Feb. 7. Secure Decisions will exhibit in three technology areas: analytics for wireless threat detection, NetFlow visual analytics, and cyber mission assurance. MeerCAT® is a visual analytics tool developed to help identify risks posed by mobile computing devices. MeerCAT® integrates 802.11 wireless data with a geographic information system (GIS) to provide a unified view of detected wireless devices, their vulnerabilities and threats. Secure Decisions’ WildCAT™ system provides turn-key, streamlined collection of wireless data and analysis for use [...]

Secure Decisions Integrates Physical and Cyber Security Forces to Detect Wireless Threats to Critical Infrastructure

Secure Decisions, a division of Applied Visions, has developed a wireless security system that supports real-time monitoring, alerting, analysis, and reporting of IEEE 802.11 (“Wi-Fi”) threats and vulnerabilities. The system was developed under sponsorship of Department of Homeland Security Science and Technology (DHS S&T). NORTHPORT, NY, January 11th, 2012 – Secure Decisions recently completed a 14-month effort to develop “WildCAT”, a turnkey system that provides cost-effective, frequent surveillance of an organization’s IEEE 802.11 (“Wi-Fi”) wireless space. WildCAT streamlines the process of detecting, locating, and analyzing wireless threats and vulnerabilities. It has been designed to be used in a standalone configuration, or to augment a wireless intrusion detection/prevention system (WIDS/WIPS). WildCAT offers organizations an inexpensive option to extend their wireless security standoff range or improve their wireless surveillance coverage area. WildCAT leverages a physical security force [...]

Go to Top