Secure Decisions Wins U.S. Air Force Cyber Defense Contract

Division of Applied Visions, Inc. to adapt its network security visualization product VIAssist™ to improve the identification of cyber threats for Air Force analysts. NORTHPORT, NY, November 9, 2010– Secure Decisions, a division of Applied Visions and developer of visual analytic tools for cyber defense, has received a Broad Agency Announcement (BAA) award under the US Air Force Firestarter program. The company was selected for the cyber defense contract by the Air Force Research Laboratory in Rome, NY. Under the contract, Secure Decisions will modify its VIAssist product to augment the analysis of security information and event management data. The work is scheduled to be completed by August of 2012. VIAssist is Secure Decisions’ award-winning network security visualization product that was originally developed for the U.S. Government to visualize network flow and security event data. [...]

Secure Decisions Awarded Another U.S. Department of Defense Contract for MeerCAT®

Division of Applied Visions to deliver, maintain and support GOTS version of its wireless security assessment tool for government users of Flying Squirrel. NORTHPORT, NY, November 2, 2010 – Secure Decisions, a division of Applied Visions, Inc. and developer of visual analytic tools for cyber defense, has received an U.S. Naval Research Laboratory (NRL) Broad Agency Announcement (BAA) award. Under the contract, Secure Decisions will deliver MeerCAT®-FS, a government off-the-shelf (GOTS) version of the company’s wireless security visualization tool. The contract work includes maintaining the software application and providing third-level product support to NRL through May 2011. MeerCAT®-FS provides an integrated set of visual tools to analyze, correlate, and report on wireless discoveries with NRL’s Flying Squirrel. By providing visual representations of the collected data, Flying Squirrel users can more easily identify, locate, and assess [...]

Netezza to Demonstrate VIAssist at ArcSight Protect ’10

Secure Decisions award-winning network security visualization product will be presented by Netezza at ArcSight Protect ’10, being held at the Gaylord National Resort & Convention Center in National Harbor, MD on September 19-22, 2010. Visit Booth # 25 at ArcSight Protect '10 and learn from global data warehouse leader, Netezza, how VIAssist is being used by computer security specialists in the Government and corporate enterprises to make it easier to identify network security risks.

2017-01-12T14:43:41-05:00Sep-2010|Categories: Events, News|

Secure Decisions’ MeerCAT® a DARPA 2010 Success Standout

DARPA singles out wireless security technology developed by Applied Visions, Inc. division as one of its success stories for 2010 The MeerCAT wireless analysis tool depicts network usage patterns and potential vulnerabilities. NORTHPORT, NY, March 15, 2010 – For the second time in its history, the Secure Decisions Division of Applied Visions has been honored by DARPA for its small business success gallery. The Defense Advanced Research Projects Agency (DARPA), research and development arm of the U.S. Department of Defense (DoD), selected MeerCAT®, along with a few other select DARPA-sponsored projects, to receive this recognition. MeerCAT, a tool designed to analyze wireless risks to critical cyber assets, is among an even smaller group of computer security technologies to be commended in this way.

Learning Technologies 2010 Paper: Domain-Specific Language Systems Use for JIT Courseware

A Secure Decisions paper will be presented at the New Learning Technologies Conference 2010 sponsored by the Society for Learning Technology in Orlando. The paper reviews successful uses of Domain-Specific Language Systems and illustrates how the method can be more widely employed to facilitate just-in-time workplace courseware. New Learning Technologies 2010 NORTHPORT, NY February 25, 2010—Effective, less costly just-in-time workplace courseware remains an elusive goal.  Given limited instructional design resources, alternatives more fully integrated with day-to-day knowledge work processes hold promise.  A paper titled "Diamonds in the Sawdust: Courseware as Reusable Task Artifacts Orchestrated by Domain-Specific Language Systems" will be presented by Secure Decisions analyst Mark Underwood at the New Learning Technologies Conference 2010. The paper considers ways to accelerate instructional content development for applications such as training for new product releases, HIPAA compliance and [...]

Secure Decisions Wins DHS Contract to Improve Software Security

Under contract to the Department of Homeland Security, a research team at Secure Decisions is working on methods to reduce or remediate software vulnerabilities introduced when software is built. Northport,  NY  February 16, 2010 "Software is a mature discipline, yet more than 98 percent of all PCs have one or more vulnerable programs, and in the US there are 2.7 billion programs open for attack."  That was the startling fact cited by Secure Decisions in their proposal for a recently awarded project with the Department of Homeland Security’s Science and Technology Directorate.  Secure Decisions, a division of Applied Visions, has been awarded the first phase of the DHS research contract under the Small Business Innovation Research (SBIR) program. The project addresses the problem of vulnerabilities in software systems that can be exploited to attack information [...]

2020-08-03T16:53:48-04:00Feb-2010|Categories: News|

Paper on Mission Impact of Cyber Events Slated for ICIW Conference

A paper on the Mission Impact of Cyber Events authored by a team of Secure Decisions researchers will be presented at the 5th International Conference on Information Warfare and Security. Northport, NY  January 7, 2010 A paper authored by a team of Secure Decisions researchers has been accepted for presentation at the Fifth International Conference on Information Warfare and Security (ICIW)  to be held at the Air Force Institute of  Technology, Wright-Patterson AFB in Dayton, Ohio. The presentation by Anita D'Amico, Laurin Buchanan, John Goodall and Paul Walczak at the April 2010 conference is titled "Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions and Users." A description of the ICIW conference goals was provided by the organizers: "Information warfare and computer security are at the forefront of [...]

2017-06-21T16:03:54-04:00Jan-2010|Categories: News|

CAMUS Introduced to MILCOM 2009 Conference

The 2009 Military Communications Conference (MILCOM) was the setting for a presentation by Secure Decisions entitled "CAMUS: Automatically Mapping Cyber Assets to Missions and Users." Beneath the banner of this year's theme "The Challenge of Convergence," the annual MILCOM conference featured military, government and homeland security specialists. Northport, NY October 9, 2009 - Progress to date on the Secure Decisions research project CAMUS was chronicled at the annual 2009 Military Communications Conference in Boston.  The paper titled "CAMUS: Automatically Mapping Cyber Assets to Missions and Users" was presented to an audience representing military, homeland security and government representatives.   The project, Cyber Assets to Missions and Users (CAMUS),  includes methods and associated software to assist in identifying which missions may be impacted when one or more cyber assets is compromised. The conference, which included both classified [...]

2020-04-16T11:56:45-04:00Oct-2009|Categories: News|

National Security Cyberspace Institute Cites Secure Decisions for Work in Network Security

A white paper authored by General (ret) Ron Keys and Larry McKee identified Secure Decisions for its development of cyber-situational awareness software. September 2009 A white paper authored by Ron Keys and Larry McKee proposes a different approach to improve situation awareness for cyber defense.  In their paper titled "Concept for Possible Cyberspace Shared Situational Awareness Joint Concept Technology Demonstration," Keys and McKee argue that most current approaches are focused on technology rather than processes.  They propose to develop a demonstration based on "processes (e.g., C2, response, analysis)" that would include "integration of existing network sensor data, defining data standards and processes for information sharing, and building relationships among national and international government, industry and academia stakeholders." The authors identify as potential partners several organizations currently engaged in shared situation awareness collaboration. One of these [...]

2017-06-21T15:58:40-04:00Sep-2009|Categories: News|

APA Reports to Membership on D’Amico’s Testimony before Congress

The American Psychological Association's "Monitor on Psychology" magazine is a print publication distributed to APA members. The September 2009 issue includes a report featuring extended quotations from Dr. D'Amico's testimony before Congress on preventing cyber attacks. Dr. Anita D'Amico's testimony before the U.S. House Science and Technology Subcommittee on Research and Education last June is the subject of a recent APA story. Appearing in the September 2009 (Vol 40:8) issue of Monitor, the APA's Geoff Mumford reported on Dr. D'Amico's attempt to underscore "that psychology must play a key role in the evolution of cyber security."  Mumford, who directs the APA's Science Government Relations Office, includes several specific recommendations D'Amico made to the Committee. The story concludes with the hope that conferences such as the National Academy of Sciences July 2009 workshop would facilitate the [...]

2020-04-16T11:57:10-04:00Sep-2009|Categories: News|
Go to Top