Click here to close now.

SYS-CON MEDIA Authors: JP Morgenthal, AppDynamics Blog, John Wetherill, Harry Trott, Roger Strukhoff

News Feed Item

McCabe Software Honors Top Rhode Island Finishers in Annual Cyber Security Challenge

Rhode Island Company Awards Top 3 Students in the State for Cyber Security Excellence

CRANSTON, R.I., Jan. 14, 2013 /PRNewswire/ -- McCabe Software was pleased to recognize the top three finishers in the annual Cyber Security Challenge this past week. Students across the country competed in a number of events focused on securing cyberspace, an arena that many are calling the battlefield of the 21st century. The top three students in Rhode Island were Adam Sowden of Exeter West Greenwich High School, Xiaoyi Wu of East Greenwich High School, and Joseph Caruso of the Chariho Career and Tech Center, respectively. Each of these students placed among the top 100 in the country.

McCabe Software has sponsored local high school students in the Cyber Security Challenge over the last two years, covering the cost of participation for a number of Rhode Island high schools. This year, McCabe Software also surprised the first, second and third place finishers in Rhode Island, by rewarding each of them with cash.

"We are extremely proud of the Rhode Island high school students who competed in the CyberFoundations Cyber Security Challenge," said David Belhumeur, CEO of McCabe Software. "It is our pleasure to reward the top three finishers in our state and to sponsor the participation of many of their fellow classmates."  

"We were pleased to join Congressman Langevin, New England Institute of Technology, and others in the Rhode Island business community to encourage the students to pursue a career in an industry that, while in its infancy, will be essential to national security as well as our economy for the foreseeable future," said Belhumeur.

Erin Flynn, NEIT's Manager of Admissions Outreach and Events as well as the RI Cyber Security Challenge State Coordinator stated, "New England Tech is pleased to once again support Congressman Langevin and the Rhode Island high school students who participated in the Cyber Security Challenge.  This event helps build career awareness among the contestants as they see the importance of cyber security first-hand. These programs, supported by good corporate citizens like McCabe, give students the opportunity to explore careers they may not have otherwise considered."

McCabe Software's technology addresses the cybersecurity at the source code level, enabling software engineers to understand interactions and verify vulnerable paths throughout a codebase. This is crucial when determining exploitability, modeling attack space, and performing vulnerability analysis.

About McCabe Software, Inc.
McCabe Software, provides Software Quality Management and Software Configuration Management solutions worldwide. "McCabe IQ" is used to analyze and visualize the security, quality, and testing of mission, life, and business critical applications. McCabe Software has offices in the United States and distribution worldwide.

Contact: Jon Palmisano 

(401) 572-3100 
[email protected] 

http://www.mccabe.com

This press release was issued through eReleases® Press Release Distribution. For more information, visit http://www.ereleases.com.

SOURCE McCabe Software, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, de...
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Grow your business with enterprise wearable apps using SAP Platforms and Google Glass. SAP and Google just launched the SAP and Google Glass Challenge, an opportunity for you to innovate and develop the best Enterprise Wearable App using SAP Platforms and Google Glass and gain valuable market exposure. In his session at @ThingsExpo, Brian McPhail, Senior Director of Business Development, ISVs & Digital Commerce at SAP, outlined the timeline of the SAP Google Glass Challenge and the opportunity...
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don't need to see the data in the clear and (ii) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by using advanced encryption, centralized key management and...
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Nate Gordon, Director of Technology at Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, took a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They also discussed how to deploy private cloud environments in 15 minutes or less.
In his session at DevOps Summit, Andrei Yurkevich, CTO at Altoros, provided an overview of all the benefits and opportunities, as well as drawbacks of deploying Cloud Foundry PaaS with Juju and compared it to BOSH. Discover the features that overlap, and understand what Juju Charm is, what it is not, where you use one or the other or where you use both BOSH and Juju Charms together. Andrei Yurkevich is Cloud Foundry protagonist and CTO at Altoros. Under his supervision, the Altoros engineering ...
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
Can call centers hang up the phones for good? Intuitive Solutions did. WebRTC enabled this contact center provider to eliminate antiquated telephony and desktop phone infrastructure with a pure web-based solution, allowing them to expand beyond brick-and-mortar confines to a home-based agent model. It also ensured scalability and better service for customers, including MUY! Companies, one of the country's largest franchise restaurant companies with 232 Pizza Hut locations. This is one example of...
The true value of the Internet of Things (IoT) lies not just in the data, but through the services that protect the data, perform the analysis and present findings in a usable way. With many IoT elements rooted in traditional IT components, Big Data and IoT isn’t just a play for enterprise. In fact, the IoT presents SMBs with the prospect of launching entirely new activities and exploring innovative areas. CompTIA research identifies several areas where IoT is expected to have the greatest impac...
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device exp...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. 8th International Big Data Expo, co-located with 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. As advanced data storage, access and analytics technologies aimed at handling high-volume and/or fast moving data all move center stage, aided by the cloud computing bo...
Some developers believe that monitoring is a function of the operations team. Some operations teams firmly believe that monitoring the systems they maintain is sufficient to run the business successfully. Most of them are wrong. The complexity of today's applications have gone far and beyond the capabilities of "traditional" system-level monitoring tools and approaches and requires much broader knowledge of business and applications as a whole. The goal of DevOps is to connect all aspects of app...
DevOps is the hottest moving target when it comes to software development methodologies. Many people fear that this fast-paced, barrier-breaking movement will leave information security best practices in the dust. Analysts provide recommendations to security professionals using bingo-laden terms like "moving security to the left" or "get a seat at the table." What we need are real-world examples and tactics for security practitioners to be part of DevOps. In his session at DevOps Summit, Andrew...