Search for:

Quantum-resistant cryptography

Quantum-resistant cryptography refers to the study and development of cryptographic methods that can resist attacks by quantum computers. These computers use the principles of quantum mechanics to perform certain types of calculations much faster than classical computers, which poses a significant threat to current encryption methods.

.

Most of the widely used encryption algorithms, such as RSA and Elliptic Curve Cryptography, rely on the difficulty of factoring large numbers or computing discrete logarithms. These problems are known to be solvable in polynomial time on a quantum computer, which means that these algorithms could be easily broken by a sufficiently powerful quantum computer. Quantum-resistant cryptography, on the other hand, relies on mathematical problems that are believed to be hard even for quantum computers.

.

It is important to note that quantum-resistant cryptography is not quantum-proof, and it is still an active area of research. The security of these algorithms may change as the development of quantum computers progresses, and new types of attacks may emerge. Therefore, it is crucial for the cryptographic community to continually evaluate and improve existing quantum-resistant algorithms and to develop new ones as necessary.

.

To download the full whitepaper please fill in the below form at the end of which the white paper will be available for download.

.

GSA Multiple Award Schedule (MAS)

.

The GSA Schedule, also known as Federal Supply Schedule, and Multiple Award Schedule (MAS), is a long-term government wide contract with commercial companies that provide access to millions of commercial products and services at fair and reasonable prices to the government. MAS makes buying easy and efficient with the use of modern technology to connect government buyers and industry.

.

MAGNUS is eligible to compete for GSA MAS contracts as a prime contractor No. GS-35F-0103Y. Magnus Management Group LLC GSA Advantage link for our Multiple Award Schedule Price List

.

CategoryDescription of Services
54151SInformation Technology Professional Services IT Professional Services and/or labor categories for database planning and design; systems analysis, integration, and design; programming, conversion and implementation support; network services, data/records management, and testing.
54151HACSHighly Adaptive Cybersecurity Services (HACS) Includes a wide range of fields such as, the seven-step Risk Management Framework services, information assurance, virus detection, network management, situational awareness and incident response, secure web hosting, and backup, security services and, Security Operations Center (SOC) services. HACS vendors are cataloged under the 5 subcategories of High Value Asset Assessments; Risk and Vulnerability Assessments, Cyber Hunt, Incident Response, and Penetration Testing.
541611Business consulting solutions include a full range of management and consulting services that can improve a federal agency’s performance, and help customers meet their mission goals. Business services range from consulting, facilitation, quality assurance, analysis, strategy formulation, advisory and assistance, research, and training to acquisition and program support

Department of Education – Cybersecurity and Privacy Support Services (CPSS) BPA

.
Magnus Management Group, LLC, has been awarded a five-year, $300 million Blanket Purchase Agreement (BPA) by the U.S. Department of Education (DoED) to provide Cybersecurity and Privacy Support Services (CPSS) for Federal Student Aid (FSA) and the Office of the Chief Information Officer (OCIO).
.
The purpose of this multiple award Small Business set-aside Blanket Purchase Agreement (BPA) is to provide Cybersecurity and Privacy Support Services (CPSS) for the Department of Education (DoED) Federal Student Aid (FSA) and the DoED Office of Chief Information Officer (OCIO) to implement cybersecurity policies, protect organizational information technology enterprise infrastructure, and protect sensitive U.S. citizens’ data from unauthorized access. This BPA was awarded in accordance with the General Services Administration (GSA) Multiple Award Schedule (MAS) Special Item Number (SIN) 54151HACS (Formerly SIN 132-45) and related Information Technology (IT) Professional Services SIN 132-51.
.
Areas of support include, but are not limited to, Cybersecurity Risk Management and Compliance; Information Systems Security Services; Cybersecurity Operations; Software Capability Operations and Maintenance; Security Architecture Support; Security Engineering; and Continuous Diagnostics and Mitigation.

Federal Aviation Administration (FAA) eFAST

.

Magnus Management Group, LLC has been awarded a Blanket Purchase Agreement (BPA) is issued as a Master Ordering Agreement (MOA) under the Electronic FAA Accelerated and Simplified Tasks (eFAST) program to provide services, as specified below.

The Electronic Federal Aviation Administration (FAA) Accelerated and Simplified Tasks (eFAST) is the FAA’s preferred contracting vehicle for small business contracts. Since Fiscal Year 2010, the eFAST program has awarded over $4.4 billion in contracts to small businesses.

Functional areas are support service categories used in eFAST acquisitions. Magnus has been awarded the contract for the following Functional Areas:

  • Business Administration & Management (BAM)
  • Computer/Information Systems Development (CSD)
  • Computer Systems Support (CSS)
  • Documentation & Training (D&T)

Department of Navy – SeaPort NXG

.

SeaPort NXG is the Navy’s electronic platform for acquiring support services in 23 functional areas and separated into two work categories: engineering support services and program management support services. The Navy Systems Commands (NAVSEA, NAVAIR, SPAWAR, NAVFAC, and NAVSUP), the Office of Naval Research, Military Sealift Command, and the United States Marine Corps compete their service requirements amongst 2400+ SeaPort NXG IDIQ multiple award contract holders. The SeaPort NXG portal provides a standardized, efficient means of soliciting offers from amongst the diverse population of large and small businesses and their approved team members. All task orders are competitively solicited, awarded and managed using the SeaPort NXG platform. Since nearly 85% of its contract–holders are small businesses, the SeaPort NXG approach to acquiring services provides opportunity that fuels the Nation’s engine of job growth

US Army EXPRESS BPA

.

MAGNUS Management Group LLC is a team member on an Evergreen Blanket Purchase Agreement (BPA) under the Expedited Professional and Engineering Support Services (EXPRESS) program, to provide advisory and assistance services to the U.S. Army Aviation and Missile Command (AMCOM), PEO Aviation, PEO Missiles & Space, Combat Capabilities Development Command (CCDC) Aviation & Missile Center, Army Materiel Command, and other agencies as approved by the Army Contracting Command at Redstone Arsenal, AL.

.

Programmatic Domain

This IDIQ MAC covers the following primary functional support areas:

  • Resource Management
  • Cost Estimating/Analysis
  • Schedule Development/Assessment.
  • Program Management, Plans & Integration
  • Strategic Planning & Analysis
  • International Programs
  • Security Assistance Programs
  • Operations Research & Systems Analysis.

.

Supported systems include developmental and fielded rotary / fixed wing aviation platforms, unmanned aircraft systems, tactical missile / guided rocket systems, and the associated command & control, ground support and survivability equipment used by the U.S. Army and its international customers (via foreign military sales programs).

.

Technical Domain

This ID/IQ MAC covers engineering and technical services for the complete life-cycle support of Army Aviation and Missile systems spanning a wide variety of functional specialty areas: artificial intelligence; aeromechanics; airworthiness qualification / release; cyber security and information assurance; electronics, avionics, visionics and survivability equipment; environmental / safety; guidance systems; industrial operations; infrared; image, seismic, acoustic, magnetic and signal processing; manpower & personnel technical support; manufacturing science and technology; missile research; navigation and control; optics and laser; obsolescence management; product assurance; production engineering; propulsion systems / technology; radio frequency technology; systems engineering; structures and materials; space related technology; systems simulation and modeling; software engineering; technical data management; test and evaluation; test, measurement and diagnostic equipment / nondestructive test equipment; and warheads.

Supported systems include developmental and fielded rotary / fixed wing aviation platforms, unmanned aircraft systems, tactical missile / guided rocket systems, and the associated command & control, ground support and survivability equipment used by the U.S. Army and its international customers (via foreign military sales programs).

Quantum Computing and its Impact on Cybersecurity

Quantum computing’s ability to solve complex problems that are beyond the capabilities of the traditional computer renders it exceptional. While the quantum research community applauds the accelerated rate at which quantum computers are being developed; it is also a threat considering it can unravel the algorithms behind the encryption keys that protect the assets we hold most dear (like our data and the internet’s infrastructure).  It is estimated that within the next 3-5 years quantum computers will be able to break a 2048-bit number.  This remarkable breakthrough continues to erode the timeline, demonstrating the hastening approach of a new paradigm in security.

.

To download the full whitepaper please fill in the below form at the end of which the white paper will be available for download.

.

Digital Dominance – Using Data as a Tactical Advantage

.

Digital dominance is all about using data as a tactical advantage in this new world of cyber actions and defense. Data, its management, analysis and reporting are the key towards maintaining the tactical edge in any organizational posture. Irrespective if the application is civilian or military in nature, digital dominance is at the core of a successful enterprise, homeland security and military force projection. In the case of homeland security and military the digital dominance can serve as a significant force multiplier in both defense and offensive measures.

.

Data is being generated at an incredible pace from within and outside our firewalls and is building up in our large and sometimes unwieldy data lakes. Data is being generated in vast amounts through the proliferation of computing devices across our networks, “edge sensors” like unmanned aerial vehicles, IOT sensors, mobile device and other smart devices. As our edge sensors propagate more on the field, the data collected should not only be used for tactical decisions but also harvested for long term comparison and intelligence analysis. Another source of data is the internet where actors use this global network for everything from communication to staging nefarious cyber actions. This source of cyber data not only needs to be captured but also sorted and analyzed with advanced automation to ensure we can take near real time actions to detect and mitigate any vulnerabilities. Despite the large advances we have made in Artificial Intelligence (AI) and Machine Learning (ML), a large amount of our data continues to be unleveraged because they are not identified, tagged or prioritized.

.

To download the full whitepaper please fill in the below form at the end of which the white paper will be available for download.

.

Supply Chain Cybersecurity White Paper

Supply Chain Cybersecurity includes a complex of everyday operating issues affected by a network of known and unknown connections, services and components. This paper provides a strategic overview of the supply chain cyber     issues from the perspective of vendor operational security.

.

We examine the accelerating escalation of supply chain risks, leading to 2021 executive orders and vendor cyber certification requirements. Concise recommendations and links to frameworks and self-assessment resources provide a starting point for the journey to healthier supply chain

.

Co Authored By Maria Horton and Shivaji Sengupta who both serve on the AFCEA International Homeland Security Committee. This white paper is an output of the Innovation Technology Sub Committee under the Homeland Security Committee.

.

Data Security

Data provides a critical foundation for every organization and is a necessity irrespective of whether your information is on premises or in hybrid cloud or in cloud environments. Protecting and using it securely is central to every organization zero trust strategy.

Unfortunately, cyber criminals also see the value of data and seek to exploit security vulnerabilities to put your information at risk.

Data Security vulnerabilities are constantly increasing within the complex, multi-faceted and multi-tenant infrastructure of many organizations. Magnus help your organization protect critical business data from undesired access and mishandling, and secure data from deletion, ransomware and theft. Magnus helps you gain greater visibility and insights to investigate and remediate threats and enforce real-time controls and compliance.

Magnus data security services include:

  • Data security strategy: Improve maturity across people, process and technology
  • Data discovery: Find your most critical data assets, who has access and how they are protected
  • Data loss prevention: Detect, prevent and enforce policy violations to avoid accidental data loss
  • Data security governance: Establish process, metrics and continuous steady-state data discovery and classification
  • Database security monitoring: Helps enforce data protection and compliance policies across multi-tenant environments