News and Events
Stay informed on current company and industry developments
Shared Accountability: Navigating Security and Risk Management Responsibilities
Nov 6th - 7th
As regulatory requirements surrounding cybersecurity and risk management increase, organizations are under greater pressure to ensure transparency and accountability. More and more, board members are being held responsible for the risks facing their organizations, including requirements for public disclosures of breaches and other security incidents.
Events
News
Shared Responsibility
Global Cyber Security Initiative (GCSI) Conference on Critical Infrastructure, OT and Manufacturing
October 24, 2025
Palindrome Technologies will be presenting insights from the Cybersecurity 5G system Penetration Testing project (MxD-21-18-07) which focused on identifying vulnerabilities via penetration testing of the private 5G implementation leveraging various attack vectors and make recommendations to further secure similar deployments in manufacturing.
Events
HITRUST Collaborate 2024
Threat actors frequently change tactics, and the cyber threat-adaptive framework builds continuous updates into the HITRUST CSF. Standards help organizations quickly improve their security postures by defining controls proven to be effective against well-known risks, but often do not address new risks. Join us at HITRUST Collaborate 2024, Oct 3rd where Dr. Paul Rohmeyer sharing insights on how Threat Adaption of the HITRUST CSF Provides Substantial Risk Management Benefits.
Events
New York Metro Joint Cyber Security Conference
September 26th, 2024
Artificial intelligence (AI) systems are becoming ubiquitous in our daily lives, but how secure are they? In this presentation, I will introduce the audience to some of the techniques used by hackers and researchers to attack AI systems, such as data poisoning, model stealing, and prompt injection. I will also demonstrate some of these attacks live.
Events
IEEE CQR 2024
On 10 September 2024, Palindrome Technologies' Peter Thermos will chair the segment on Telecommunications Security where topics such as 5G, AI and Cloud will be covered along with Mike Stauffer who will be presenting insights on Product Security and Assurance.
For additional information related to this event, please follow this link - 2024 IEEE CQR | IEEE International Communications Quality and Reliability Workshop | 9–12 September 2024 // Seattle, WA, USA (ieee-cqr.org)
We look forward to seeing you there.
Events
OWASP Delaware Chapter Event: Security and Compression
Lucas Driscoll presents "Security and Compression", a talk on the cybersecurity risks caused by using compression, especially in a web context. This relates to attacks against TLS, such as Compression Ratio Info-leak Made Easy (CRIME) and BREACH (Browser Reconnaissance and Exfiltration via Adaptive Compression of Hypertext). You can find more information HERE
Events
IEEE Emerging Technologies Roundtable 2024 Portugal, Lisbon
IEEE CQR is a premier organization leading and pioneering communication quality, reliability and security concerns in the world in the past 30+ years and holds its conference each year that attracts top experts around the world. This Roundtable is an expert-based forum, attended by invitation only, with the intent of bringing together the world-top experts in the areas of communication, modern computing technologies, AI, intelligent vehicles, and cybersecurity, to a roundtable dialog fashion discussions on the challenges and recommended solutions in the field of reliability, serviceability, and security.
Palindrome Technologies' CEO Peter Thermos will be sharing practical insights from our applied research into private 5G/Wi-Fi heterogeneous (HetNet) network installations in his talk, "Security and Reliability in Heterogeneous Networks" on May 21-22 at the Hotel Altis Belem in Lisbon, Portugal. Additional details may be found HERE.
Events
Poking AI in the Eye: A Practical Intro to Adversarial AI Techniques
June 13th 2024
Artificial intelligence (AI) systems are becoming ubiquitous in our daily lives, but how secure are they? In this presentation, David introduces some of the techniques used by hackers and researchers to attack AI systems, such as data poisoning, model stealing, and prompt injection. He also demonstrates some of these attacks live.
The presentation is interactive and engaging, with a few light challenges for those audience members who want to try their hands at breaking AI (from the comfort of your mobile phone). He will also highlight some real-world case studies of successful attacks. Whether you are an AI enthusiast, a security professional, or just curious about how AI fails, this presentation will give you a practical and fun introduction to the fascinating world of adversary AI techniques, along with ample resources to get you started with practicing these techniques legally.
Events
Adversarial AI
Security
5G & Wi-Fi6/6E Coexistence for Secure Federal Networks
For immediate release, June 30, 2022
The Department of Homeland Security (DHS) Small Business Innovation Research (SBIR) Program awarded Palindrome Technologies a 2-year contract to develop a prototype for 5G & Wi-Fi6/6E Coexistence for Secure Federal Networks intended to support homeland security mission needs. The DHS SBIR program, administered by the DHS Science and Technology Directorate (S&T), awarded Phase II contracts under nine topic areas in the 21.1 SBIR Solicitation issued in December 2020.
News
GSMA NESAS Testing Lab Accreditation
September 16, 2020| Hazlet, NJ – Palindrome Technologies today announced that it has become the first company worldwide to obtain NESAS Security Test laboratory accreditation. Product vendors can now submit their products to Palindrome Technologies for security evaluations based on NESAS, resulting in an industry recognized baseline for the security profile of these solutions.
The Network Equipment Security Assurance Scheme (NESAS) provides an industry-wide security assurance framework to facilitate improvements in security levels across the worldwide mobile industry. NESAS is jointly defined by the 3rd Generation Partnership Project (3GPP) and the GSMA. It outlines security requirements and an assessment framework for secure product development and product lifecycle processes using 3GPP defined security test cases to evaluate defined network functions and equipment.
News
Blackhat 2007, Las Vegas
Transparent Weaknesses in VoIP
The presentation will disclose new attacks and weaknesses associated with protocols that are used to establish and protect VoIP communications. In addition, a newer "unpublished" version of the SIVuS tool will be demoed.
Slides available here
Events
No results
Make a request.
Can't find what you're looking for? No problem. Let us help.