About Secure Decisions

This author has not yet filled in any details.
So far Secure Decisions has created 167 blog entries.

Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions, and Users

D'Amico, A., Buchanan, L., Goodall, J., & Walczak, P. (2010, April). Mission impact of cyber events: scenarios and ontology to express the relationships between cyber assets, missions and users. In International Conference on Information Warfare and Security (p. 388). Academic Conferences International Limited.

2017-04-27T12:01:02-04:00Apr-2010|Categories: Mission Impact, Publications|

Secure Decisions’ MeerCAT® a DARPA 2010 Success Standout

DARPA singles out wireless security technology developed by Applied Visions, Inc. division as one of its success stories for 2010 The MeerCAT wireless analysis tool depicts network usage patterns and potential vulnerabilities. NORTHPORT, NY, March 15, 2010 – For the second time in its history, the Secure Decisions Division of Applied Visions has been honored by DARPA for its small business success gallery. The Defense Advanced Research Projects Agency (DARPA), research and development arm of the U.S. Department of Defense (DoD), selected MeerCAT®, along with a few other select DARPA-sponsored projects, to receive this recognition. MeerCAT, a tool designed to analyze wireless risks to critical cyber assets, is among an even smaller group of computer security technologies to be commended in this way.

Learning Technologies 2010 Paper: Domain-Specific Language Systems Use for JIT Courseware

A Secure Decisions paper will be presented at the New Learning Technologies Conference 2010 sponsored by the Society for Learning Technology in Orlando. The paper reviews successful uses of Domain-Specific Language Systems and illustrates how the method can be more widely employed to facilitate just-in-time workplace courseware. New Learning Technologies 2010 NORTHPORT, NY February 25, 2010—Effective, less costly just-in-time workplace courseware remains an elusive goal.  Given limited instructional design resources, alternatives more fully integrated with day-to-day knowledge work processes hold promise.  A paper titled "Diamonds in the Sawdust: Courseware as Reusable Task Artifacts Orchestrated by Domain-Specific Language Systems" will be presented by Secure Decisions analyst Mark Underwood at the New Learning Technologies Conference 2010. The paper considers ways to accelerate instructional content development for applications such as training for new product releases, HIPAA compliance and [...]

Secure Decisions Wins DHS Contract to Improve Software Security

Under contract to the Department of Homeland Security, a research team at Secure Decisions is working on methods to reduce or remediate software vulnerabilities introduced when software is built. Northport,  NY  February 16, 2010 "Software is a mature discipline, yet more than 98 percent of all PCs have one or more vulnerable programs, and in the US there are 2.7 billion programs open for attack."  That was the startling fact cited by Secure Decisions in their proposal for a recently awarded project with the Department of Homeland Security’s Science and Technology Directorate.  Secure Decisions, a division of Applied Visions, has been awarded the first phase of the DHS research contract under the Small Business Innovation Research (SBIR) program. The project addresses the problem of vulnerabilities in software systems that can be exploited to attack information [...]

2020-08-03T16:53:48-04:00Feb-2010|Categories: News|

Paper on Mission Impact of Cyber Events Slated for ICIW Conference

A paper on the Mission Impact of Cyber Events authored by a team of Secure Decisions researchers will be presented at the 5th International Conference on Information Warfare and Security. Northport, NY  January 7, 2010 A paper authored by a team of Secure Decisions researchers has been accepted for presentation at the Fifth International Conference on Information Warfare and Security (ICIW)  to be held at the Air Force Institute of  Technology, Wright-Patterson AFB in Dayton, Ohio. The presentation by Anita D'Amico, Laurin Buchanan, John Goodall and Paul Walczak at the April 2010 conference is titled "Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions and Users." A description of the ICIW conference goals was provided by the organizers: "Information warfare and computer security are at the forefront of [...]

2017-06-21T16:03:54-04:00Jan-2010|Categories: News|

CAMUS Introduced to MILCOM 2009 Conference

The 2009 Military Communications Conference (MILCOM) was the setting for a presentation by Secure Decisions entitled "CAMUS: Automatically Mapping Cyber Assets to Missions and Users." Beneath the banner of this year's theme "The Challenge of Convergence," the annual MILCOM conference featured military, government and homeland security specialists. Northport, NY October 9, 2009 - Progress to date on the Secure Decisions research project CAMUS was chronicled at the annual 2009 Military Communications Conference in Boston.  The paper titled "CAMUS: Automatically Mapping Cyber Assets to Missions and Users" was presented to an audience representing military, homeland security and government representatives.   The project, Cyber Assets to Missions and Users (CAMUS),  includes methods and associated software to assist in identifying which missions may be impacted when one or more cyber assets is compromised. The conference, which included both classified [...]

2020-04-16T11:56:45-04:00Oct-2009|Categories: News|

National Security Cyberspace Institute Cites Secure Decisions for Work in Network Security

A white paper authored by General (ret) Ron Keys and Larry McKee identified Secure Decisions for its development of cyber-situational awareness software. September 2009 A white paper authored by Ron Keys and Larry McKee proposes a different approach to improve situation awareness for cyber defense.  In their paper titled "Concept for Possible Cyberspace Shared Situational Awareness Joint Concept Technology Demonstration," Keys and McKee argue that most current approaches are focused on technology rather than processes.  They propose to develop a demonstration based on "processes (e.g., C2, response, analysis)" that would include "integration of existing network sensor data, defining data standards and processes for information sharing, and building relationships among national and international government, industry and academia stakeholders." The authors identify as potential partners several organizations currently engaged in shared situation awareness collaboration. One of these [...]

2017-06-21T15:58:40-04:00Sep-2009|Categories: News|

APA Reports to Membership on D’Amico’s Testimony before Congress

The American Psychological Association's "Monitor on Psychology" magazine is a print publication distributed to APA members. The September 2009 issue includes a report featuring extended quotations from Dr. D'Amico's testimony before Congress on preventing cyber attacks. Dr. Anita D'Amico's testimony before the U.S. House Science and Technology Subcommittee on Research and Education last June is the subject of a recent APA story. Appearing in the September 2009 (Vol 40:8) issue of Monitor, the APA's Geoff Mumford reported on Dr. D'Amico's attempt to underscore "that psychology must play a key role in the evolution of cyber security."  Mumford, who directs the APA's Science Government Relations Office, includes several specific recommendations D'Amico made to the Committee. The story concludes with the hope that conferences such as the National Academy of Sciences July 2009 workshop would facilitate the [...]

2020-04-16T11:57:10-04:00Sep-2009|Categories: News|
Go to Top