ObjectSecurity Blog
Check out the ObjectSecurity blog for all of the newest information.
IN THE NEWS TODAY
WhizRT: Simulated Intelligent Cybersecurity Red Team
San Diego, Calif. – June 26, 2018 – ObjectSecurity, a leader in solving complex, evolving defense and industrial cybersecurity and supply chain risk challenges, [...]
Cyber supply chain risk analysis
Cyber supply chain is the procurement of hardware and software. Supply chain risks are a major source of IT vulnerabilities, and the different risks [...]
Case Study: COACH telecom application platform
COACH (an EU IST project 2002-2004) - developed a component based open source architecture for distributed telecom applications. COACH realises a flexible and complete Open [...]
Make Access Control Great Again!
During ISSA 2017, Ulrich Lang, CEO/Founder ObjectSecurity will present: Make Access Control Great Again! Infrastructure Access control means many things to many people. The least [...]
Securing Complex Cyber-physical Systems in clinical environments
Identity and Access Management (IAM) in clinical environments. This hospital IT case studies you will learn the challenges and solutions around implementing cyber-physical security [...]
Customers are not aware yet of ICS security risks that IIoT Apps bring
IIoT applications bring many ICS security risks to critical industries like manufacturing, energy, oil and gas, chemical, transportation. As a part of CEO Insights, [...]
What is Security Policy Automation?
Today’s information age would have felt like out of a sci-fi movie to someone 20 years ago. More data has been created in the [...]
Re-Examining Identity & Access Management (IAM)
There is a lot security professionals disagree on when it comes to Identity & Access Management (IAM). One thing most would agree on is [...]
Customer Case: OpenPMF protects criminal intel analytics.
Big data and visual analytics brought groundbreaking new capabilities to intelligence systems, allowing improved analytics and sense making on large amounts of data from [...]
Secure distributed processing for Smart Cities
Today, most smart cities and intelligent transport systems are implemented in a very centralized way: Sensors send their data to a central control center, [...]
Cybersecurity Market Failure
We hit the glass ceiling years ago! Hackers are winning unless we change! This slide deck was presented by ObjectSecurity CEO Dr. Ulrich Lang [...]
The Need for Better Cybersecurity Prioritization Metrics
Most organizations are overwhelmed, understaffed, and/or underfunded when it comes to cybersecurity. These constraints create a critical need to prioritize on the most critical [...]
What is Attribute Based Access Control (ABAC)?
Attribute based access control (ABAC) is a different approach to access control in which access rights are granted through the use of policies made up [...]
AuthoriZation Based Access Control (ZBAC) and model-driven security
Today I would like to share my views about authoriZation Based Access Control (ZBAC) and how it relates to model-driven security (MDS) policy automation. [...]
ObjectSecurity® wins NIST SBIR Phase II Award
San Diego, CA, USA – 18 July 2016 – ObjectSecurity®, The Security Policy Automation Company™, today announced that it has won a second award [...]
Resource-Based Access Control (ResBAC) vs. Identity-Based Access Control (IBAC)
Most technical access control policies today are specified "identity-centric", a term I use for policies that are specified with the accessor (= the requestor's identity) [...]
Implementing NIST 800-53 AC with OpenPMF™
NIST Special Publication 800-53 (Rev. 4), "Security and Privacy Controls for Federal Information Systems and Organizations," provides a catalog of security controls for U.S. federal information [...]
ObjectSecurity maintains mature SecureMiddleware™ legacy CORBA technologies
SecureMiddleware SecureMiddleware is a sophisticated secure, model-driven open source CORBA based middleware platform with security extensions. SecureMiddleware works out of the box with OpenPMF, [...]