Cyber Security

NIST FIPS 140-2 RNG Transition Affecting UC APL

For those product vendors that have been able to get listed and certified on the DoD Unified Capabilities Approved Products List (UC APL), there is a prerequisite certification required called FIPS 140-2.  FIPS 140-2 is a certification program managed by the National Institute for Standards and Technology (NIST) and more specifically the Cryptographic Module Validation …

NIST FIPS 140-2 RNG Transition Affecting UC APLRead More »

Aviat Eclipse INU/INUe Achieves DoD UC APL Certification

FAIRFAX, VA –  Washington DC-based Information Technology firm, and leading DoD UC APL consulting company, Tachyon Dynamics, helped Microwave-radio networking vendor Aviat Networks receive the DoD UC APL certification for its Eclipse INU and Eclipse INUe microwave radio devices. All IT equipment used within the DoD must pass the UC APL certification process, which includes …

Aviat Eclipse INU/INUe Achieves DoD UC APL CertificationRead More »

Inexpensive 802.1x Solutions

Many enterprises in the DoD and US Federal Government are struggling with how to implement inexpensive 802.1x solutions for their wired LANs.  Especially in the DoD, there are specific regulations that require the use of 802.1x on the Unclassified Networks (NIPRNet) and Classified Networks (SIPRNet).  For your reference, those requirements are called Security and Technical …

Inexpensive 802.1x SolutionsRead More »

DoD UC APL Testing and Windows Security: DoD IAVerify

Completing the hurdle of DoD Unified Capabilities Testing (UC APL) in a decent amount of time is already a challenge.  However, if you have Microsoft Windows workstations (Vista, 7, 8, etc) or Windows Servers (2008, 2008 R2, 2012, etc), then your validation, hardening and testing gets so much more complicated.  For the DoD, Windows security …

DoD UC APL Testing and Windows Security: DoD IAVerifyRead More »

DNS: Back to Basics for Network Engineers

Speaking with quite a few network engineers in the last few months, I was shocked by the lack of real understanding of the Domain Naming System (DNS).  It shocked me because it is the singular application functionality that is entirely network-based.  Meaning that DNS is the foundation of the Internet, and from their perspective, should …

DNS: Back to Basics for Network EngineersRead More »

Yubikey and Windows Domain 2-Factor Authentication

Picking up where we left off last, I was showing you the awesome usefulness, security and affordability of Yubikey (Yubico’s 2-Factor authentication token) and using it for 2-factor authentication on network devices.  Well, I’d like to go another step forward: 2-Factor authentication for Windows computers to a Windows Active Directory environment.  If your enterprise deployment …

Yubikey and Windows Domain 2-Factor AuthenticationRead More »

Secure and Affordable 2-factor authentication: Yubikey

In the DoD there is a strong requirement for 2-factor authentication in the network.  For systems and workstations they use a successful implementation with Public Key Infrastructure (PKI) and a DoD common access card (CAC) which has a client certificate.  The user has a PIN; therefore, 2-factor.   Nothing like this exists for network devices (routers, …

Secure and Affordable 2-factor authentication: YubikeyRead More »

FIPS 140-3 is Coming: Time to Plan

FIPS 140-1 and FIPS 140-2 had quite a bit of longevity.  However, FIPS 140-3 is almost here.  Based on previous NIST standards development processes, the 140-3 standard will most likely have a publication date of a year from now.  So sometime in February/March 2014, FIPS 140-3 will be the dominate federal crypto module certification.  Not …

FIPS 140-3 is Coming: Time to PlanRead More »

Scroll to Top