CYBERSECURITY

QuoLab Technologies Announces Partnership With B Technology

QuoLab Technologies | April 18, 2022

Cybersecurity
QuoLab Technologies, provider of a data-centric security operations platform (SOP), announced its partnership with B Technology, an Austin, Texas-based IT infrastructure and cyber security solutions provider. B Technology will serve as an official reseller of the QuoLab platform, helping the company to extend its reach to both commercial and government entities.

Now more than ever, strong security is a requirement for every organization. This partnership will empower us to deliver much-needed collaboration capabilities to more practitioners than ever before. Mirroring our own beliefs, B Technology is acutely focused on helping the people behind the scenes make security a reality for organizations. Together, we can truly be a force for good by putting power back into the hands of those protecting our most vital systems.”

Dan Young, CEO of QuoLab


As an official reseller, B Technology will offer QuoLab’s platform to its current customer base, including the Department of Defense (DoD), Intelligence, and Civilian Agencies across the Federal Government, as well as all future customers. This is the first partnership of its kind for B Technology, and will open the door to more opportunities for both companies.

“Security is a monumental task, and it takes a lot of time and resources to ensure that it’s getting done right,” said Stephanie Miller, President of B Technology. “With QuoLab’s platform, organizations will be able to cut time and costs, freeing individual practitioners up to focus more on the tasks that matter most, while also removing the common roadblocks that have prevented them from fully accomplishing their goals in the past.”

This partnership highlights QuoLab’s continued commitment to bringing enhanced security operations capabilities to organizations worldwide, last seen in its partnership with WhoisXML API. In addition to these efforts, QuoLab aims to continue being an innovative force within the industry and will be bringing new capabilities to market, as well as engaging in more reseller partnerships in 2022.

About B Technology
B Technology is an SBA-Certified Woman-Owned and HUBZone small business leveraging over 20 years of experience in federal government service, contract administration, Command, Control, Communications, Computers, and Information Management (C4IM), and cybersecurity expertise to delivering a broad range of Infrastructure Operations, Cybersecurity, Virtualization, and Cloud Computing services. The company delivers critical communications and network security to customers in the Department of Defense (DoD), Intelligence, and Civilian Agencies across the Federal Government. B Technology is quality and security focused – ISO 9001:2015 and ISO/IEC 27001:2013 certified.

About QuoLab Technologies
QuoLab Technologies empowers security professionals to analyze, investigate and respond to threats within an integrated ecosystem. The collaborative, data-centric platform merges deep analytics and intuitive workflows, enabling human operators to efficiently deliver on their mission. The company believes that increased focus on cooperation, combined with scalable, distributed data handling and processing techniques is the key to gaining a decisive advantage in the ever-evolving security operations space.

Spotlight

Methane (CH4) contributes to the growing global background concentration of tropospheric ozone (O3), an air pollutant associated with premature mortality. Methane and ozone are also important greenhouse gases. Reducing methane emissions therefore decreases surface ozone everywhere while slowing climate warming, but although methane mitigation has been considered to address climate change, it has not for air quality.


Other News
GOVERNMENT BUSINESS

DOJ joins whistleblower case against EHR vendor Modernizing Medicine and co-founder

Phillips & Cohen LLP | March 26, 2022

The US Department of Justice has filed notice that it intends to join a whistleblower lawsuit filed by Phillips & Cohen LLP against Modernizing Medicine and a co-founder alleging serious violations of the False Claims Act involving the company's electronic health records (EHR) software and illegal kickbacks to physicians. ModMed sells a cloud-based electronic health records (EHR) system, through subscription services, to specialty medical practices, including, gastroenterology, orthopedics, ophthalmology, otolaryngology, pain management, plastic surgery, rheumatology, urology and dermatology practices. Medical practices use the software for clinical documentation, prescribing medications, telemedicine, billing and more. The "qui tam" (whistleblower) complaint was filed under seal in 2017 by Phillips & Cohen LLP on behalf of a former ModMed executive. The case became public yesterday when a federal district court in Vermont lifted the seal. DOJ filed a notice of partial intervention on March 15 and is continuing to investigate the allegations. The government is expected to file its complaint against ModMed, specifying what charges it is making against the EHR company, in the next 90 days or so. The complaint names as defendants ModMed, based in Boca Raton, Florida, and its CEO Daniel Cane. A founder of ModMed, Cane previously founded the educational software company, Blackboard.com, which he later sold. The "relator," or whistleblower, in the False Claims Act case is Amanda (Mandy) Long. She was recruited as a product director by Cane in 2014 and was promoted multiple times, eventually becoming Vice President of Product Management. She resigned in 2017. I am pleased the Justice Department recognizes the seriousness of this matter and is intervening in the case after investigating my allegations." Amanda (Mandy) Long The False Claims Act and the government's investigation The False Claims Act empowers whistleblowers to file qui tam lawsuits to sue entities that are defrauding the government. The law requires that the cases be filed under seal. The government then investigates the allegations and decides whether to join the case before it is made public. Whistleblower rewards under the False Claims Act range from 15% to 25% of any recovery resulting from allegations in which the government intervenes and 25% to 30% of any recovery resulting from allegations in which the whistleblower pursues without government intervention. Long and her attorneys expressed appreciation to the government for its quick response to her qui tam complaint. In particular, they thanked US Attorney Nikolas Kerest of the District of Vermont, Assistant US Attorney Owen C.J. Foster, Assistant US Attorney Lauren Lively, DOJ Civil Frauds Assistant Director Edward Crooke, DOJ Trial Attorney Kelley C. Hauser and DOJ Trial Attorney Sarah A. Hill. The US Attorney's Office for the District of Vermont has been at the forefront in pursuing fraud and kickbacks cases against EHR companies. They have settled cases with eClinicalWorks ($155 million settlement), Practice Fusion Inc. ($145 million settlement) and Greenway Health LLC ($57.5 million settlement). The office also played a key role in the federal government's $8 billion global settlement with Purdue Pharma for civil and criminal violations including allegations Purdue paid kickbacks to Practice Fusion for designing medical software to influence physicians to prescribe its highly addictive opioid pills. Colette G. Matzzie, a whistleblower attorney and partner at Phillips & Cohen, and co-counsel Tristram J. Coffin, a partner at Downs Rachlin Martin PLLC, represent Long in the qui tam case. Colette G. Matzzie represented whistleblowers in three other qui tam cases against EHR companies that have settled. They include the ground-breaking case against eClinicalWorks, which alleged the EHR vendor engaged in civil fraud and illegal kickback schemes, and a qui tam case against CareCloud, which also alleged kickbacks paid to healthcare providers to boost sales ($3.8 million settlement). Tristram J. Coffin is the head of Downs Rachlin Martin's white-collar group and was the US Attorney for the District of Vermont under President Obama. In addition to representing Long in this qui tam case, he and Downs Rachlin Martin served as local counsel with Phillips & Cohen in the eClinicalWorks case.

Read More

GOVERNMENT BUSINESS

iQor Earns Government Safety Seal in Santa Rosa

iQor | April 07, 2022

The Philippines Department of Labor and Employment (DOLE) has recognized iQor Santa Rosa with the Government Safety Seal Certification for the BPO sector in the province of Laguna. This is the second such certification for iQor, which was the first BPO to receive this recognition in Region 4A (Calabarzon Region) when iQor Dasmarinas received the certification. Companies in the manufacturing, utilities, and business process outsourcing (BPO) industries are eligible for the certification based on compliance with government health and safety standards. This is the second iQor contact center the Philippines government has recognized with a Safety Seal Certification. It celebrates the importance we place on ensuring the health and safety of our employees. Our teams are committed to working together to create a safe and rewarding work environment that employees look forward to being a part of each day.” Gary Praznik, iQor President and CEO iQor, a managed services provider of customer engagement and technology-enabled BPO solutions, is committed to complying with all government health and safety standards to safeguard employees and to deliver consistent and reliable service to clients. With the power of technology and automation, iQor distributes the health checklist and monitors vaccination status to ensure only those who are vaccinated enter iQor facilities. “iQor has ongoing investments to create safe work environments,” said Fleurette Navarro, iQor senior vice president of global recruitment and Philippines human resources. “We collaborate throughout our organization to create excellent experiences for our employees. This certification recognizes the work we have done from the start of the pandemic to adhere to health and safety protocols to ensure the wellbeing of all employees.” The certification was presented to iQor by Attorney Nepomuceno A. Leaño, II, OIC assistant regional director DOLE IV-A; and Deah Celeste Tercias, senior labor employment officer, DOLE Laguna. iQor has 16 contact centers in the Philippines archipelago in Cavite, Davao, Iloilo, Laguna, Negros Occidental, Pampanga, and Quezon City. About iQor iQor is a managed services provider of customer engagement and technology-enabled business process outsourcing (BPO) solutions comprised of 35,000 amazing employees spanning 10 countries. We are passionate about delivering an outstanding omnichannel customer experience for brands across the globe. Harnessing intelligent CX technology that can scale teams anywhere, our BPO solutions create happy employees and delighted customers. Our irresistible culture results in a smile with each interaction to create optimal customer experiences. We enable diverse teams to scale our BPO digital solutions from local to global to create the CX experience brands demand to win and keep customers.

Read More

GOVERNMENT BUSINESS

Merck and Ridgeback Announce U.K. Government to Purchase Additional 1.75 Million Courses of Molnupiravir

Merck | December 22, 2021

Merck , known as MSD outside the United States and Canada, and Ridgeback Biotherapeutics today announced that the United Kingdom Government will purchase an additional 1.75 million patient courses of molnupiravir (MK-4482), an investigational oral antiviral COVID-19 medicine. In the U.K., LAGEVRIO® is the planned trademark for molnupiravir; the trademark for molnupiravir in other countries has not been approved. With this additional procurement agreement, which follows a previously announced agreement for 480,000 courses of treatment, the U.K. Government has now committed to purchase a total of 2.23 million courses of molnupiravir. In early November, molnupiravir received conditional marketing authorization in the U.K. for the treatment of mild to moderate COVID-19 in adults with a positive SARS-CoV-2 diagnostic test and who have at least one risk factor for developing severe illness. Molnupiravir is currently available in the U.K. and patients have started to receive treatment. An application for Emergency Use Authorization for molnupiravir is under review by the U.S. Food and Drug Administration. Merck has entered into advance purchase and supply agreements for molnupiravir with governments of more than 30 countries worldwide, including 21 agreements with countries in Europe. About Merck’s Global Efforts to Accelerate Access to Molnupiravir Following Regulatory Authorizations or Approvals Global access has been a priority for Merck and Ridgeback since the inception of their molnupiravir collaboration. The companies are committed to providing timely access to molnupiravir globally through our comprehensive supply and access approach, which includes investing at risk to produce millions of courses of therapy; tiered pricing based on the ability of governments to finance health care; entering into supply agreements with governments; and granting voluntary licenses to generic manufacturers and to the Medicines Patent Pool to make generic molnupiravir available in more than 100 low- and middle-income countries following local regulatory authorizations or approvals. Supply: In anticipation of the results from MOVe-OUT and the potential for regulatory authorization or approval, Merck has been producing molnupiravir at risk and expects to produce 10 million courses of treatment by the end of 2021, with at least 20 million courses to be produced in 2022. To date, Merck has shipped molnupiravir to 12 countries; in countries where it is approved or authorized, patients have begun to receive the drug. Supply agreements: Merck entered into a procurement agreement with the U.S. Government under which the company will supply approximately 3.1 million courses of molnupiravir to the U.S. Government, upon Emergency Use Authorization or approval from the U.S. Food and Drug Administration. Merck has entered into advance purchase and supply agreements for molnupiravir with governments for over 30 countries worldwide, including Australia, Canada, Korea, Japan, Thailand, United Kingdom and United States, pending regulatory authorizations, and is currently in discussions with additional governments. Merck plans to implement a tiered pricing approach based on World Bank country income criteria to reflect countries’ relative ability to finance their health response to the pandemic. Voluntary licenses: As part of its commitment to widespread global access, Merck previously announced that it has entered into a licensing agreement with the Medicines Patent Pool to increase broad access for molnupiravir in low- and middle-income countries. Additionally, Merck previously announced that the company has entered into non-exclusive voluntary licensing agreements for molnupiravir with established generic manufacturers to accelerate availability of molnupiravir in more than 100 low- and middle-income countries following approvals or emergency authorization by local regulatory agencies. Merck continues to discuss additional measures and collaborations to accelerate broad, global access to molnupiravir. About Molnupiravir Molnupiravir (MK-4482) is an investigational, orally administered form of a potent ribonucleoside analog that inhibits the replication of SARS-CoV-2, the causative agent of COVID-19. Molnupiravir has been shown to be active in several preclinical models of SARS-CoV-2, including for prophylaxis, treatment, and prevention of transmission. Pre-clinical data suggest that molnupiravir has a high barrier to the development of resistance.

Read More

CYBERSECURITY

CISA, FBI, NSA, and International Partners issue advisory on Demonstrated Threats and Capabilities of Russian State-Sponsored and Cyber Criminal

CISA | April 22, 2022

The Cybersecurity and Infrastructure Security Agency (CISA), along with the Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), National Cyber Security Centre New Zealand (NZ NCSC), and the United Kingdom’s National Cyber Security Centre (NCSC-UK) and National Crime Agency (NCA), with contributions from industry members of the Joint Cyber Defense Collaborative, issued a joint Cybersecurity Advisory on Russian state-sponsored and criminal cyber threats to critical infrastructure that could impact organizations both within and beyond Ukraine. It is the most comprehensive view of the cyber threat posed by Russia to critical infrastructure released by government cyber experts since the invasion of Ukraine in February. The advisory provides technical details on malicious cyber operations by actors from the Russian Federal Security Service (FSB), Russian Foreign Intelligence Service (SVR), Russian General Staff Main Intelligence Directorate (GRU), and Russian Ministry of Defense, Central Scientific Institute of Chemistry and Mechanics. It also includes details on Russian-aligned cyber threat groups and cybercrime groups. Some of these cybercrime groups have recently publicly pledged support for the Russian government and have threatened to conduct cyber operations in retaliation for perceived cyber offensives against Russia or against countries or organizations providing materiel support to Ukraine. The advisory recommends several immediate actions for all organizations to take to protect their networks, which include: Prioritize patching of known exploited vulnerabilities; Enforce multifactor authentication; Monitor remote desktop protocol (RDP); and Provide end-user awareness and training We know that malicious cyber activity is part of the Russian playbook. We also know that the Russian government is exploring options for potential cyberattacks against U.S. critical infrastructure. Today’s cybersecurity advisory released jointly by CISA and our interagency and international partners reinforces the demonstrated threat and capability of Russian state-sponsored and Russian aligned cyber-criminal groups to our Homeland. We urge all organizations to review the guidance in this advisory shields-up for continually updated information on how to protect yourself and your business.” Jen Easterly, CISA Director "The FBI is focused on exposing and disrupting malicious cyber activity by Russia against our allies and our own networks," said Bryan Vorndran, FBI Cyber Division Assistant Director. "We are working alongside our federal and international partners to quickly share information that helps private industry as well as the public to better protect and defend their systems from these threats. We will continue to investigate these malicious threat actors through our unique authorities and hold them accountable for their actions.” “Threats to critical infrastructure remain very real," said Rob Joyce, NSA Cybersecurity Director. "The Russia situation means you must invest and take action.” “Recent intelligence and historic instances of destructive cyber attacks indicate now is the time for organisations to improve their cyber security posture,” said Abigail Bradshaw, Head, Australian Cyber Security Centre. “In particular, critical infrastructure organisations should act now to raise defences, not wait until being attacked. The ACSC stands ready to support its critical infrastructure partners in responding to the threats we face - by raising their awareness of the threat, sharing indicators of compromise, and providing technical mitigation advice.” “Russia has significant cyber capabilities and a demonstrated history of using them irresponsibly, and state-sponsored malicious cyber activity is a real risk to organizations around the world,” said Sami Khoury, Head, Canadian Centre for Cyber Security. “By joining alongside our partners in releasing today’s joint advisory, the Communications Security Establishment and its Canadian Centre for Cyber Security continue to support making threat information more publicly available, while providing specific advice and guidance to help protect against these kinds of risks.” “We are currently seeing an increased potential for cyber-attacks on critical infrastructures which may have a serious impact, even for countries and organisations not directly targeted,” said Lisa Fong, Director of New Zealand’s National Cyber Security Centre. “Organisations should take the opportunity to consider their security posture, understand their critical systems and risks – including across their supply chain – and exercise readiness. This joint advisory with our partners provides organisations with important information which will help them to build their cyber resilience by identifying and mitigating risks they face.” “In this period of heightened cyber threat, it has never been more important to plan and invest in longer-lasting security measures,” said Lindy Cameron, NCSC CEO. “It is vital that all organisations accelerate plans to raise their overall cyber resilience, particularly those defending our most critical assets. The NCSC continues to collaborate with our international and law enforcement partners to provide organisations with timely actionable advice to give them the best chance of preventing cyber-attacks, wherever they come from.” “Cyber attacks have evolved and increased in scale and severity over recent years, with the criminal groups behind them targeting the critical infrastructure of countries around the world,” said Rob Jones, NCA Director General for Cyber. “The NCA leads the UK law enforcement response to this threat, working with a range of international partners to investigate cyber criminals and disrupt the services they rely on. It is vital that organisations help bolster this response by enhancing cyber resilience and reporting any incidents of cyber crime to the authorities, to allow timely mitigation of further attacks.” Because evolving intelligence indicates that the Russian government is exploring options for potential cyberattacks, the cybersecurity authorities are providing this robust advisory with several resources and mitigations that can help the cybersecurity community protect against possible cyber threats from these adversarial groups. Executives, leaders, and network defenders are urged to implement recommendations to prepare for and mitigate the varied cyber threats listed in the Cybersecurity Advisory here. All organizations should share information about incidents and unusual cyber activity with their respective cybersecurity authorities. When cyber incidents are reported quickly, it can contribute to stopping further attacks. About CISA As the nation’s cyber defense agency, the Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to the digital and physical infrastructure Americans rely on every hour of every day.

Read More

Spotlight

Methane (CH4) contributes to the growing global background concentration of tropospheric ozone (O3), an air pollutant associated with premature mortality. Methane and ozone are also important greenhouse gases. Reducing methane emissions therefore decreases surface ozone everywhere while slowing climate warming, but although methane mitigation has been considered to address climate change, it has not for air quality.

Resources