Akamai | January 14, 2022
Akamai Technologies, Inc. , the world's most trusted solution to power and protect digital experiences, today participated in the White House Open Source Software Security Summit and released the following statement:
Akamai was pleased to participate in the White House Open Source Software Security Summit today, and appreciated the opportunity to share our perspective and recommendations on this important topic. Improving the security of open source software is vital, as it is critical to the internet ecosystem. However, the ability to quickly contain the impact of a vulnerability once it is discovered is equally significant. This meeting was particularly timely, given the recent Log4j vulnerability detection. We applaud the administration's proactive leadership to tackle this important issue, which, if left unchecked, can have far-reaching negative impacts for both the government and the private sector.
Akamai asserts that businesses must invest time and resources into open source software to ensure continued innovation and security. Akamai has a long history of working with the open source community and contributing to open standards. This includes work with the Internet Engineering Task Force (IETF), World Wide Web Consortium (W3C), Internet Security Research Group (ISRG), OpenSSL, and the Linux Kernel. We are evaluating how we can expand those commitments this year.
Akamai advocates for the following five pillars through continued partnership with our customers — many of which are leaders in their respective industries — and in collaboration with the White House, National Security Council, and broader technology community:
Increase visibility into reliance on open source technologies — many companies don't fully know the open source code that lives in their environments. Only by gaining visibility into the network and its code stack can we reliably address security flaws when they occur. Log4j was a black swan event, but serves as a potent reminder that the government and private sector need to prioritize investments into tools and technologies.
Identify key open source libraries and support strong ownership and vulnerability management — threat actors comb open source libraries to find vulnerabilities like Log4j. The technology community must provide support — via active participation in projects and financial investment — to the open source communities we depend on.
Build reliable containment plans for when exploits are identified — we are never going to eliminate vulnerabilities, so it's essential we have effective containment policies in place to help protect businesses and consumers. We can accomplish this via actionable reporting processes and supporting technology solutions.
Improve cross-government and industry information sharing when vulnerabilities are first identified — the more eyes that we can get on a problem, the quicker the problem can be fixed. By building an information-sharing community of trusted security providers, we can ensure that vulnerabilities are addressed and that patches reach wide distribution faster.
Expand government authorization of solutions to increase defenses — adversaries evolve quickly, and the government needs to be agile to ensure its defenses can protect important government systems and key infrastructure. In some instances, an emergency authorization of technology from trusted providers would enable fast implementation of solutions not yet FedRAMP certified to quickly enable protection against new threats.
Akamai powers and protects life online. The most innovative companies worldwide choose Akamai to secure and deliver their digital experiences — helping billions of people live, work, and play every day. With the world's largest and most trusted edge platform, Akamai keeps apps, code, and experiences closer to users — and threats farther away.
Owl Cyber Defense Solutions | January 06, 2021
Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in cybersecurity solutions and administrations for safeguarding network limits and empowering secure information sharing across spaces, reported today the acquisition of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the lone U.S. government-endorsed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most progressive Full Motion Video ("FMV") separating capacity – usefulness basic to CDS tasks in a period of robots and cameras. The acquisition gives Owl a more extensive scope of affirmed network edge defense solutions than any rival on the lookout.
Owl, supported by private venture firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is additionally the worldwide pioneer in cybersecurity security for basic foundation, offering the lone U.S. government tried and licensed CDS accessible for arrangement inside and outside the U.S to both government and business customers.
Owl's Cross Domain Solutions offer the most elevated level of organization border security, far surpassing the capacities of firewalls and other typical organization defenses. Owl's items are the decision for ensuring the country's most touchy organizations and frameworks against assault. Late episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space detachment and layers of information separating confirmation as opposed to a solitary organization line checkpoint with negligible substance sifting.
Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision. The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain."
"The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices. Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded."
"Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises."
Solutions like firewalls that worked 25 years prior as an organization security approach are not, at this point viable against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Viable cybersecurity presently requires an incorporated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, inserts CDS usefulness in incredibly low-inertness, unmodifiable equipment.
Jerry B. Chernock, Partner at DC Capital, added, "It is obvious that we need to address the inadequacy of firewalls. There is a reason why our clients insist on Cross Domain Solutions and not solely on firewalls. Recent attacks, including a security breach at a prominent U.S. based cybersecurity firm and several U.S. Government agencies, have punctuated the need for intelligence, military, critical infrastructure and corporate clients to quickly evolve how they protect their networks."
"The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements."
About Owl Cyber Defense Solutions
Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").
CNBC | April 24, 2020
Investment in the fast-growing space industry was booming well into the first quarter of 2020 but private capital has largely frozen as the coronavirus pandemic strikes the U.S., leading both civil and military agencies to step up funding for corporate partners. “We kicked into high gear as soon as it was apparent a lot of companies were not going to be able to conduct business as usual due to distancing requirements,” Mike Read, International Space Station business and economic development manager at NASA’s Johnson Space Center, told CNBC.