Latest News

What we’re talking about

ISMS System
Cyber Security

ISMS System – 27k1 Ltd appoint CVG Strategy LLC

17th February 2020 – Company Announcement       27k1 Ltd Appoint CVG Strategy LLC as First, US Reseller of 27k1 ISMS System According to the latest ISO 2018 Survey, demand for ISO/IEC 27001 certification in the US has increased by 37% since 2017. Given this growth trajectory and recognizing that ISO 27001 is the

Read More »
forced labor goods banned
ITAR News

Forced Labor Goods Banned by DHS from Xinjiang

The Department of Homeland Security (DHS) announced on September 14, 2020 that forced labor goods from China are now banned.  The U.S. Customs and Border Protection (CBP) has issued Withhold Release Orders on products produced in China’s Xinjiang province.  In a statement Acting CBP Commissioner Mark A. Morgan stated that the forced labor goods banned

Read More »
Video Conferencing Application Vulnerabilities
Cyber Security

Video Conferencing Application Vulnerabilities an Issue

Video conferencing application vulnerabilities have been frequently in the news during the Covid-19 pandemic.  During this time the use of these apps has skyrocketed due to remote work and schooling.  This has presented a tempting target for cyber criminals to steal information and disrupt activities. Zoom Bombing Incidents AL.COM reported that Saturday night Jewish prayer

Read More »
Health Effects of RF Energy
Product Testing News

Health Effects of RF Energy and Microwaves

The health effects of RF energy have been a concern voiced by many in recent years.  Questions have been raised about the use of cell phones and the introduction of 5G.  Now the military has raised concerns about the cognitive effects of radio frequency energy on pilots. U.S. Military Concerns About RF Noise Exposure A

Read More »
Arab League Boycott
ITAR News

Arab League Boycott Faces Uncertain Future

The Arab League Boycott was dealt a severe blow when the United Arab Emirates (UAE) issued a decree ending its involvement in it.  This announcement now allows trade between the UAE and Israel.  It follows the normalization of relations between Israel and the UAE created by the recent peace accord.  What is the Arab Boycott

Read More »
Denial of Service Attacks
Cyber Security

Denial of Service Attacks on the Increase

Denial of Service attacks (DoS) occurs when a targeted host or network is incapable of responding to legitimate users as a result of being flooded by traffic from the attacker.  Businesses worldwide have reported an increased number of these kinds of attacks.  Because these attacks result in inaccessibility of an organization’s resources and service, they

Read More »
Managing an Export Compliance Program
ITAR News

Managing an Export Compliance Program

Managing an Export Compliance Program properly ensures its effectiveness.  Any plan, no matter how well conceived, is only as effective as its execution.  Given the importance of export compliance to the sustainability of a business this is a task that must be addressed appropriately. Technology Control Plan – ITAR A Technology Control Plan (TCP) is

Read More »
IP Theft and National Security
Cyber Security

IP Theft and National Security Responses

IP Theft and National Security IP Theft and national security have been in the news a lot of late.  Most of this news has been centered around the activities of the Chinese military.  As a result commercial and defense technologies are at risk.  Fortunately, the United States has implemented a number of measures aimed protecting

Read More »
Sensors Transforming Manufacturing
Quality News

Sensors Transforming Manufacturing Towards Industry 4.0

Sensors are transforming manufacturing and moving us toward what is being called Industry 4.0.  Today’s sensors provide cost effective solutions to measurement and monitoring requirements.   What is 4.0? Industry 4.0 builds on the computer revolution of Industry 3.0 by combining intelligent devices by way of the Internet of Things (IoT) and the Internet of

Read More »
Components for Hypersonic Applications
Product Testing News

Components for Hypersonic Applications – Considerations

Components for hypersonic applications are required for an increasing number of Department of Defense (DoD) projects.  These components and assemblies must be able to function under very demanding circumstances.  Typical stresses include altitudes exceeding 100,000 feet, rapid temperature changes, vibration, pyroshock, and acceleration.  This provides unique challenges to designers and those involved in test and

Read More »
Companies Added to Entity List
ITAR News

Companies Added to Entity List for Building Military Islands

The Bureau of Industry and Security added 24 companies added to list entity list for their involvement in constructing artificial military islands for the Chinese military.  China has been building these islands since 2013.  This announcement was made by the U.S Department of Commerce on August 26, 2020.  The islands have been condemned by the

Read More »
Military Cybersecurity Strategies
Cyber Security

Military Cybersecurity Strategies Applicable for Businesses

Military cybersecurity strategies have developed in the last decade.  General Paul Nakasone, Commander of United States Cyber Command and Director of the National Security Agency recently shared his perspectives on how to approach cyberspace in Foreign Affairs magazine. Employing Proactive Cybersecurity Approaches Cyber Command was established in 2010 to protect military operations networks from cyber

Read More »
Training Requirements for ITAR
ITAR News

Training Requirements for ITAR – Knowledge is Power

Training Requirements for ITAR (International Traffic in Arms Regulations) are often overlooked by companies working with defense related articles.  In truth, the day to day challenges of developing product, conducting testing, advancing sales opportunities, and meeting deadlines consume most of our time.  The reality however, is that well designed and intentioned export compliance programs are

Read More »
arrests for export dual use violations
ITAR News

Arrests for Export Dual Use Violations Announced

The U.S. Department of Justice announced arrests for export dual use violations of Chong Sik Yu, and Yunseo Lee.  These two individuals are executives of America Tecma Inc..  The charges involve exporting electronic components with military applications to Hong Kong and China.  They are also charged with conspiracy to commit wire fraud, bank fraud, and

Read More »
Russian Cyber Espionage Malware
Cyber Security

Russian Cyber Espionage Malware

The National Security Agency and the Department of Defense have issued a warning about Russian cyber espionage malware known as Drovorub.  This malware provides file download and upload capabilities to external actors when deployed on a victim Linux system.  It utilizes a number of means of concealing itself once implanted and is resilient to rebooting. 

Read More »
Understanding MIL STD 810
Product Testing News

Understanding MIL STD 810 and How to Use It

Understanding MIL STD 810 is essential for proper developmental evaluation of the environmental effects on equipment.  CVG Strategy has been helping our customers use this valuable standard to create test programs for over a decade.  In this time we have seen a number of commonly held misconceptions about the standard and how to use it. 

Read More »