NEWS RELEASE Palindrome Technologies Achieves the First Accreditation Worldwide as a NESAS Security Test Laboratory. September 16, 2020| Hazlet, NJ – Palindrome Technologies today announced that it has become the first company worldwide to obtain NESAS Security Test laboratory accreditation. Product vendors can now submit their products to Palindrome Technologies for security evaluations based on […]
Author Archive for: pthermos
About Peter Thermos
Peter has over 20+ years of experience in consulting and research in several areas of Information Security and Assurance and has held senior technical and management positions with Telcordia Technologies (previously known as Bellcore). During his career Peter conducted security research and provided cyber security advisory support for various commercial and government organizations including LTS, NIST, Federal Reserve Bank, Department of Labor, Verizon Wireless, Sprint, among others, and cyber preparedness for the Athens 2004 Olympics.
Peter has been the lead technical expert on various tasks (for commercial and government organizations) associated with information security and assurance including security risk assessments, incident response, standards and requirements development, network security architecture and organizational security strategy.
Peter’s professional experience is also demonstrated at conferences and workshops that he delivers across U.S. and Europe. He focuses in helping organizations understand the threats and risks that are associated with cyber security and cyber warfare.
Peter has published several articles and refereed-research papers in trade magazines and academic journals and he is the primary author of the book “Securing VoIP Networks” by Addison-Wesley.
Peter holds a Master’s degree in Computer Science from Columbia University, NY and he is an active member of IETF/IEEE/ACM.
Professional Areas of interest
Information Security and Assurance, Next Generation Networks/Emerging Technologies, Penetration Testing, Hardware/Software reverse engineering.
Entries by Peter Thermos
The FCC CSRIC VII Working Group releases a report on “Risk to 5G from Legacy Vulnerabilities and Best Practices for Mitigation“. This report is produced by Working Group 2 which focuses on: Managing Security Risk in the Transition to 5G. The 5th Generation (5G) in telecommunications technology is a revolutionary shift in core network architecture […]
Join us at the at the upcoming GMIS International conference on October 1st 2020 in Somerset , NJ. Palindrome Technologies will be participating at the upcoming GMIS event and will be discussing Cyber Security challenges and solutions for Local Governments. GMIS International is a professional IT association of worldwide government IT leaders dedicated to providing […]
Palindrome’s Peter Thermos and John Kimmins will be presenting on 5G Security Challenges at the upcoming Big 5G event on September 22-24, 2020 powered by Light Reading.
Peter Thermos featured in Enterprise Security Magazine on Securing Emerging Technologies.
John Kimmins, Security Strategy Director at Palindrome Technologies talks to TelecomTechOutlook magazine about security challenges in emerging telecommunication architectures.
Palindrome Technologies was recognized as one of the Most Trusted Cyber Security Solution Providers in 2019 by Aspioneer Magazine. Palindrome was founded with the ideology of streamlining security operations and assessments for the telecommunications and government sectors. Originally formed as a consulting and research firm serving federal and commercial organizations; Palindrome today provides cybersecurity services […]
Palindrome Technologies, has been approved as a Certified Authorized Test Lab (CATL) for CTIA IoT Cybersecurity Certification. The CTIA IoT Cybersecurity testing program is designed to validate the security controls and capabilities of cellular-connected Internet of Things (IoT) devices. The program, aims in helping product providers and service organizations build products and services with cybersecurity […]
HANZO: Collaborative Network Defense for Connected Things by Aman.Singh _at_ palindrometech.com The “Things” in IoT are typically shipped with default insecure configurations and vulnerable software stacks rendering host networks exposed to attacks, especially small networks with limited administration. We present a network system model for better configuration and operations management. Using this system model, we […]
100 Village Court, Suite 300
Hazlet, NJ 07730 USA
Toll Free: (844) 4-CYBRWAR
Toll Free: (844) 4-292792