Wednesday, April 3, 2013
PR Newswire NEW YORK, April 3, 2013 NEW YORK, April 3, 2013 /PRNewswire/ -- AmeriStar Network, Inc. (OTC Markets: AMWK)("AmeriStar") has complied with the filing requirements of OTC Markets and has been moved to the Current Information Tier. Since the merger of SecurDigital, Inc. into a subsidiary of the Company in February 2011, the Company has transformed itself into a mobile applications and SaaS provider of Cloud-based software solutions. SecurDigital is in final stages of product development and is undertaking the marketing of its SecurDigital mobile applications. According to CEO Bruce Magown, "Awareness in the marketplace about identity theft, industrial espionage and cyber-attacks has increased exponentially, with wireless mobile devices being particularly vulnerable -- and that's what we help protect by securing the communication." SecurDigital, Inc. with its proprietary technology is poised to protect corporations, governments and even individuals from scanning, hacking and espionage through a major advance in the delivery of secure and interoperable wireless communications. Eliminating the exposure of wireless communication to scanners or hackers, its SecurVoice™ technology can be delivered to subscribers over the Internet using the Software-as-a-Service ("SaaS") model. SecurVoice™ is the world's first totally secure, wireless, digital communications "software only" solution for security and interoperability over wireless and VoIP communications, and it works across multiple carriers, operating systems and hardware, performing wireless "interoperability" for WiMAX and WiFi products globally. The market for mobile security applications in an environment marked by increasingly dangerous and sophisticated hackers and criminal elements has been estimated to exceed a billion dollars worldwide. Statements in this press release may be "forward-looking statements" within the meaning of the Private Securities Litigation Reform Act of 1995. Words such as "optimizing," "potential," "anticipate," "goal," "intend" and similar expressions, as they relate to the company or its management, identify forward-looking statements. These statements are based on current expectations, estimates and projections about the company's business based, in part, on assumptions made by management. These statements are not guarantees of future performance and involve risks, uncertainties and assumptions that are difficult to predict. Actual outcomes and results may, and probably will, differ materially from what is expressed or forecasted in such forward-looking statements due to numerous factors, including those described above and those risks discussed from time to time in Company filings with the Securities and Exchange Commission. These statements and other forward-looking statements are not guarantees of future performance and involve risks and uncertainties. AmeriStar Network, Inc. assumes no responsibility to update any of the forward-looking statements in this news release. Neither the Company nor any other person assumes responsibility for the accuracy or completeness of these forward-looking statements. Nothing in this press release should be construed as either an offer to sell or a solicitation of an offer to buy or sell shares of AmeriStar Network, Inc. in any jurisdiction. SOURCE AmeriStar Network, Inc. The above news release has been provided by the above company via the OTC Disclosure and News Service. Issuers of news releases and not OTC Markets Group Inc. are solely responsible for the accuracy of such news releases.
By Defense Systems StaffApr 02, 2013 The inspector general of the Defense Department reports that the Army’s Chief Information Office/G-6 has, in essence, lost control over commercial mobile devices (CMD) within the Army, and that more than 14,000 smartphones and tablets are untracked. The upshot is that the Army CIO office does not have an effective cybersecurity program that identifies and mitigates risks surrounding CMDs and removable media, according to the DOD IG. “The Army did not implement an effective cybersecurity program for commercial mobile devices,” wrote Alice Carey, assistant DOD inspector general for readiness, operations and support, in a memorandum dated March 26. “If the devices remain unsecure, malicious activities could disrupt Army networks and compromise sensitive DOD information.” According to the IG report, entitled, Improvements Needed With Tracking and Configuring Army Commercial Mobile Devices, the “Army CIO did not implement an effective cybersecurity program for CMDs. Specifically, the Army CIO did not appropriately track CMDs and was unaware of more than 14,000 CMDs used throughout the Army.” (The figure excludes Blackberry devices.) Additionally, the Army CIO did not ensure that commands configured CMDs to protect stored data. According to the DOD IG, the CIOs at the U.S. Military Academy (USMA), West Point, NY, and the Army Corps of Engineers’ Engineer Research and Development Center (ERDC), Vicksburg, MS, did not use a mobile device management application to configure CMDs to protect stored data, which means that they did not have the capability to remotely wipe data stored on CMDs that were transferred, lost, stolen or damaged. Also, the CIOs at USMA and ERDC allowed users to store sensitive data on CMDs that acted as removable media. “These actions occurred because the Army CIO did not develop clear and comprehensive policy for CMDs purchased under pilot and non-pilot programs,” states the IG report. In addition, the Army CIO inappropriately concluded that CMDs were not connecting to Army networks and storing sensitive information. “As a result, critical information assurance controls were not appropriately applied, which left the Army networks more vulnerable to cybersecurity attacks and leakage of sensitive data.” In response, the Army and Defense Information Systems Agency (DISA) agreed to develop a mobile device management (MDM) process to verify that users of CMDs are following Army and DOD information assurance policies and implementing the appropriate security controls to protect CMDs. Establishment of MDM and mobile application store architectures will be designed to make all CMDs managed mobile devices, which would result in the ability to observe every DOD-managed CMD, as well as the applications operating on the devices. Additionally, the Army will gain the ability to wipe or remove a device from the environment, as well as monitor applications used, websites visited, plus data viewed, saved or modified on the mobile devices. To that end, the Army issued a request for proposal for the MDM and mobile application store and expects to make an award this month, with initial operating capability expected by October 2013, with full operating capability available before the end of fiscal year 2014.