Come see us at our booth at the Charleston CDCA Summit this week. #CDCASummit
A Technology consulting company that provides Agile Enterprise Systems Engineering and Cyber Security solutions for Government and Commercial Customers.
Semper Fortis Solutions™, LLC is a Systems Engineering and Software Integration company with a deep background and strong focus on Information and Cyber Security. We also provide Command, Control, Communications, Computers, Combat Systems, Cyber Intelligence Surveillance Reconnaissance (C6ISR) Engineering, Integration, Test and Deployment services globally in support of US DoD and Coalition Full Spectrum operations. We bring innovation to our customer’s toughest problems. At Semper Fortis LLC we pride ourselves in creating mission focused solutions with the latest technologies. Using a holistic approach to solving problems, our solutions address the tactical and strategic needs of our customers. Our lean processes help guide agile solution development – from requirements and design to services and integration, the customer is part of each phase of solution development. Learn more about who we are at: www.semper-fortis.com
Mission: Provide customers "Cost-effecitve Innovation" through Agile Enterprise Systems Engineering
Come see us at our booth at the Charleston CDCA Summit this week. #CDCASummit
Another great recruiting job fair! Glad to have the support of the many applicants we visited with today as they voted us one of the "Best Recruiters" at the Cleared Job Fair, Tysons Corner, Virginia!
Thanks to our employers voted Best Recruiter by our cleared job seekers, Semper Fortis Solutions, LLC, Lockheed Martin and Leidos.
Semper Fortis Solutions received compliments as one of the Best Recruiters at a recent job fair. We are working hard to recruit for our planned contract awards. Visit our webpage http://www.semper-fortis.com or email us at [email protected].
Thanks General Dynamics Information Technology, Leidos and Semper Fortis Solutions, LLC for helping so many job seekers today!
Semper Fortis Solutions, LLC's cover photo
Semper Fortis Solutions, LLC
Chuck White, CEO of Semper Fortis is speaking at the 31st International Conference on Massive Storage Systems
and Technology: http://storageconference.us/Speakers/White.html
Congratulations to all the winner of the OASIS Open Standards Cup and special thanks for helping to make KMIP TC (of which Semper Fortis has many contributors) the Outstanding New TC!
The annual Open Standards Cup recognizes outstanding accomplishments in our community. The awards are presented by the OASIS Technical Advisory Board (TAB) in two categories.
Another security vulnerability that will effect many of the servers in production today. Continuous monitoring of your current security posture is important in an ever evolving threat landscape.
Exploits allow attackers to obtain private keys used to decrypt sensitive data.
We have updated our web presence to highlight some of the Information Technology services that Semper Fortis can provide to your organization. Let Semper Fortis assist you in managing the difficult security decisions all organizations need to make to thrive in a digital world.
The only effective means to secure vital digital communications is through the managed application of encryption keys within the business processes that utilize them. However, implementing encryption is simply not enough, as skilled adversaries will attack the most vulnerable piece of the system – t...
Back on the subject of Security by Obscurity, Baking In security, and Bolting on Security..
Let's take a practical example as a starting point: Buying a home wireless router.
In most cases folks just go to their local Walmart, Bestbuy, etc and buy a wireless router without much thought into what they plan to connect to their router once it is set up. Now say they have a piece of entertainment equipment that cannot use WPA2-PSK encryption so they have to do something more insecure like WEP - because some older piece of electronics requires it. Seems relatively innocent and it would take some doing to figure out what the vulnerability is. What has happened in that example is that security (encryption) was addressed as an after-thought and the result is a vulnerability that's best defense is that folks don't know to look for it. In other words, Security by Obscurity.
A security "Baked-In" approach looks a little different. In this case you start by taking a survey of what technology you have in you house that uses wireless access and determine what is the best security mechanism to use. You might even do a little reading and figure out what the acronyms WPA2-PSK, WEP, etc actually mean. In that process you find out that your old Tivo only supports WEP encryption, but your phones, laptops, XBOX etc are all fine with at least WPA2. You make the decision to buy some CAT-5 cable and wire the Tivo. The WEP security vulnerability is removed and life is good.
Bottom line: the end result is that by thinking about security up front, no vulnerability has been introduced (or exploited) in your home network.
In support of our efforts making encryption easier for people to use, Semper Fortis Solutions, LLC has joined the Organization for the Advancement of Structured Information Standards (OASIS) as a Contributing Member.
We feel that taking this step is important, as our efforts in making communications security easier for everyone has made it apparent being Contributing Members of OASIS is crucial component in making that happen.
What to do in a world where you cannot hide things anymore (for systems design anyway). Given that if a flaw in a technical solution will be found if it exists, the trick is to try to engineer a solution so that you minimize what needs to be hidden.
This can be accomplished with a systems engineering approach that focuses on baking security in vs bolting security on. The end result is that security of the system becomes an integral part of the completed solution and the likelihood of unintended consequences and/or undocumented features becomes minimized.
Will get into more concrete examples going forward- consider this the thesis....
Random thought on Security by Obscurity- Security by Obscurity is dead. Hyperbole to be sure, but the fact remains; if the information is available it will be discovered. The capability to process, analyze, and exploit big data has made it possible to find things that normally would not be visible- this is the sort of thing nation states do. Another vector, on a human-factors/insider threat front, is the black market for information that is focused on known flaws, undocumented features, etc that can be exploited. Either way hiding information is no longer a reasonable security mechanism.l
The Navy Secretary likes "Semper Fortis" - as the historical motto of the Navy. A little history in case you wondered where the name came from, and what it stands for.
The Navy doesn't have an official motto like the Marine Corps does, but Navy Secretary Ray Mabus likes to use an unofficial one — Semper Fortis.
I just heard someone note that getting physical security and information security personnel working together would be like getting the Israelis and Palestinians to sign a peace treaty... I responded with "We intend to do just that".
When Holistic Security takes hold perhaps we can offer some pointers to the State Department.
Shoveling Snow and the parallels to Java garbage collection:
Folks can take different approaches to how they go about snow shoveling; for myself I tend to use the human version of the snow plow. Said plowing technique has the tendency to create lines of where snow comes off to the left and right.
So I could stop what I am doing and clean up the lines or I could complete the task at hand and clean up the lines as a separate process which is much more efficient. In that moment I immediately saw the demonstrated value of Java garbage collection.
Much as Java collects garbage from the heap so as a developer I don't have to - cleaning up the lines of snow after the fact allows me to focus on what I am trying to accomplish vs stopping progress to clean up what is left behind.
The funny thing about virtualization solutions is that a some fundamental level they are server-iron just like everything else.
It begs the question: if you poke your finger into the cloud what will your stub your finger on?
Moving day Phase I coming to a Regus office near you...
Created a page, lets hear it for Social Media. Now what to do with it?
In many cases social media is a fantastic advertising mechanism, it is also a very much a Pandora's Box when it comes to how it is used, consumed, etc.
Stay tuned true believers to see what comes next....
Be the first to know and let us send you an email when Semper Fortis Solutions, LLC posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.
Send a message to Semper Fortis Solutions, LLC: