FIPS 140-2: Validation versus Compliance

FIPS: Validation vs compliance

When considering products or services for handling an agency’s information, it is common to see two variations of FIPS accreditation: FIPS validated and FIPS compliant. Although they seem similar, there are different implications with these two labels. 

To speed up disaster relief, restoring communications should be a priority

Natural disasters like Hurricane Dorian are increasing in severity and frequency. Dorian reminds us yet again of the need for us all to be prepared for the worst. When a disaster of this magnitude strikes, it often knocks out the power grid and communications infrastructure. Without the ability to communicate, everything suffers: relief coordination efforts, medical evacuations, and the resupply of food and water. To speed up disaster relief, it is imperative that we make restoring communications a priority.

FIPS 140-3: What you need to know

REDCOM is aware of what needs to be done to keep up to date with all security protocols. So, what do you need to know in order to begin the FIPS 140-3 validation process? We’ve got it all mapped out for you.

Equivalencies in Security

When in an online environment, many utilize encryption to protect their communications and personal data. Any encryption method will make data inherently safer than letting it remain unencrypted. How could one make an informed decision as to which cryptographic technique is right for them? We can turn to bits of security – a hypothetical measure of an encryption’s functional strength.

Face It, Warfighters Need an Intuitive User Interface

Technology developers must strike a balance between an interface that is visually appealing and one that’s functional. A user interface is a gateway — it’s a visual path to information or functionality that results in an experience. Warfighters need a clear and concise interface to give them clear and concise direction that isn’t cluttered by unnecessary options.

The Security Triad

Security triad

Many sources equate secure communications to encryption. While encryption certainly plays a key role in a secure communications solution, it is not the only required element. The cybersecurity industry uses a model referred to as the security triad to define the various domains that need to be addressed when securing a network. The triad – sometimes also known as CIA – includes Confidentiality, Integrity, and Availability. This paper will review and define these domains for a better understanding of what is required to provide a complete secure communications solution.

Thwarting Cyber Attacks with Honeypot System for Sigma

Every device that carries information is worth hacking – even if the device operates behind firewalls, intrusion detection systems, or session border controllers. At REDCOM, we develop secure VoIP platforms that are intended to withstand harsh cyber environments without the protection provided by typical front-facing equipment.

REDCOM at the Ready: Hardening communications for EMP protection

EMP pulse

The President signed an Executive Order directing the Federal government to prepare the United States for an EMP (Electromagnetic Pulse) attack by hardening critical infrastructure as much as possible. After almost 20 years of studies, the Federal government is starting to pay attention and REDCOM is taking action.

What is UX Design and Why is it Good for Product Design at REDCOM?

Lately, there has been a lot of talk in the media about User Experience when it comes to the design of products. This is true of both physical goods like telephones or cars and digital interfaces like websites and software. So, you may find yourself asking, “what exactly is UX, and why is someone’s ‘experience’ important?” REDCOM’s UX Specialist, Jim Parrillo explains UX design, and why it’s necessary for product design at REDCOM.

Army budget request adds $1.5B for network modernization

The U.S. Army will be making large investments in network modernization over the next five years. Network modernization is one of the Army’s top priorities as they seek to enhance their ability to fight and win against near peer adversaries.