Stealth Communications

Stealth Communications

Telecommunications

New York, NY 10,338 followers

Empowering NYC businesses with lightning-fast fiber Internet since 1995.

About us

Based in New York City, Stealth Communications has been delivering lightning-fast internet connectivity to businesses, schools, and media outlets since 1995. Our commitment to staying at the forefront of technological advancements ensures that our network is equipped with the latest in both hardware and software developments. Stealth's mission is to provide the most reliable internet service at a reasonable cost, enabling New York's businesses and entrepreneurs to thrive. With a steadfast dedication to exceptional service and security, Stealth has served as a U.S. Government Contractor across various sectors for the last three decades.

Website
https://stealth.net
Industry
Telecommunications
Company size
1,001-5,000 employees
Headquarters
New York, NY
Type
Privately Held
Founded
1995
Specialties
Gigabit Internet Access, Dark Fiber Services, Ethernet and Wavelength Transport Services, and Fiber Optics

Locations

Employees at Stealth Communications

Updates

  • Stealth Communications reposted this

    View profile for Chie Sakamoto, graphic

    Board Member @ Stealth Communications

    We're #Hiring! Stealth Communications is seeking to fill multiple positions for the role of Senior Product Manager, Competitive Intelligence to join our product management team. This role is focused on monitoring and analyzing competitors within Telecom and Defense (National Security) sectors we operate in, to develop robust competitive strategies. Location: Stealth Honolulu HQ Salary starts at $350,000 + Sign-On Bonus of $250,000 Job details, requirements, and application process at: https://lnkd.in/efAyXudJ #Hiring #StealthFiber #ProductManager #Intelligence #NationalSecurity

    • No alternative text description for this image
  • Stealth Communications reposted this

    View profile for Yurina Yamato, graphic

    Director, Cyber Defense & National Security @ Stealth Communications

    We want to bring to your immediate attention a critical vulnerability in the RADIUS protocol, specifically tied to its outdated use of the MD5 hash function. This vulnerability, identified as the Blast-RADIUS attack, allows a Man-in-the-Middle (MitM) attacker with access to RADIUS traffic to gain unauthorized administrative access to devices using RADIUS clients for authentication. Notably, this attack circumvents the need for brute-forcing or stealing credentials. Key Points: * Vulnerability Scope: The Blast-RADIUS attack affects all authentication modes of RADIUS/UDP except those using EAP. * Severity: The attack has received a CVSS score of 9.0, indicating high severity. * Protocol Flaw: This vulnerability has been present in the RADIUS specifications since the 1990s, exploiting the weaknesses of the MD5 hash function. Mitigations: * Long-term Solution: Transition RADIUS operations to run over TLS. * Short-term Fixes: Vendors have released patches and mitigations for RADIUS/UDP to counter this attack. For more detailed information about the attack and the available mitigations, please refer to the following resources: https://lnkd.in/egp-X7Wr https://lnkd.in/eMRi56DX

    • No alternative text description for this image
  • View organization page for Stealth Communications, graphic

    10,338 followers

    Happy 4th of July! Today we celebrate the birth of our nation with picnics, parades and fireworks, marking the approval of the Declaration of Independence on July 4th, 1776. This historic document laid out our grievances against the King of England and marked our formal declaration of independence. Interestingly, the vote for independence took place on July 2, but the document was adopted on July 4, sparking celebrations we continue today. The tradition of reading the Declaration aloud started in 1776 and became a federal holiday in 1941. Reflecting on the Declaration brings to mind Thomas Jefferson's powerful words and vision, which continue to inspire us: "We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness..." This passage highlights our nation's core values and the beauty of our written heritage. Reflecting on these ideals reignites our appreciation for democracy, liberty, and freedom. Enjoy the festivities and let’s honor the principles that shape our nation. Happy Independence Day!

    • No alternative text description for this image
  • Stealth Communications reposted this

    We're #Hiring! Stealth Communications is seeking a highly qualified Director of Treasury Operations. As the Director, you will play a crucial role within the Treasury Department, supporting the executive management team. Salary starting at: $350K Annually + $250K Signon Bonus Qualifications, Requirements, Application Process: https://lnkd.in/e2JQ2vh3 #Hiring #StealthFiber #Treasury #Operations #Finance #Trading #CashManagement #TreasuryOperations

    • No alternative text description for this image
  • View organization page for Stealth Communications, graphic

    10,338 followers

    Join 200 colleagues on June 26-27 for the 4th annual Common Threads Fort Meade, proudly sponsored by Stealth Communications. This year's theme, "Defense is the New Offense: Cybersecurity and Hunt Forward Operations," explores how the industry can best support U.S. Cyber Command / National Security Agency. Topics include strengthening Defense Industrial Base (DIB) security, insights from persistent engagement and hunt forward operations, and cybersecurity best practices. The event kicks off with a Welcome Reception & Keynote by MajGen Melvin "Jerry" Carter, USMC, Deputy Director for Combat Support, Cybersecurity Directorate, NSA, at the BWI Marriott in Linthicum Heights, MD. The following morning, from 8:30-10:30 am, we will hold a (TS/SCI) classified breakfast and panel discussion at ARLIS in College Park, MD. Complimentary tickets are available. Please direct message Yurina Yamato for details, note: TS/SCI Security Clearance Required. #CyberDefense #CyberSecurity #Defense #StealthFiber

    • Defense is the new offense: Cybersecurity & Hunt Forward Ops
  • View organization page for Stealth Communications, graphic

    10,338 followers

    On this Memorial Day, we unite in gratitude to honor the men and women who died in the service of the United States. Their courageous actions have shaped our nation’s history and preserved the freedoms we cherish every day. As we spend time with loved ones, let's reflect on the stories of sacrifice and valor that enable these precious moments. Each sunrise symbolizes the new beginnings their heroism has made possible. In tribute to those who gave everything, let’s embody their spirit of dedication and resilience in our daily lives. 🙏 #MemorialDay #HonorOurHeroes #NeverForgotten #StealthFiber

    • No alternative text description for this image
  • Stealth Communications reposted this

    View profile for Chie Sakamoto, graphic

    Board Member @ Stealth Communications

    We're #Hiring! Stealth Communications is seeking multiple full-time Lead Captains for our Global 7500/8000 Jet operations. Our primary base of operations is in Pensacola, and destinations are worldwide (P2P max distance: 7,800 nautical miles.) Secondary base of operations: Guam, Honolulu, & Washington DC. Salary starting at: 400K Annually + $250K Signon Bonus Qualifications, Requirements, Application Process: https://lnkd.in/df5P2gif #Hiring #StealthFiber #CorporateJet #Pilot

    • No alternative text description for this image
  • Stealth Communications reposted this

    View profile for Yurina Yamato, graphic

    Director, Cyber Defense & National Security @ Stealth Communications

    Quantum Harvesting Threats and Post-Quantum Cryptography Recent studies have underscored significant concerns regarding quantum harvesting threats within the realm of post-quantum cryptography (PQC). These threats, known as "Harvest Now, Decrypt Later" (HNDL) attacks, involve the acquisition of encrypted data with the intention of decrypting it using future quantum computing capabilities. The fundamental issue lies in the advanced computational power and speed of quantum computers, which have the potential to break classical cryptographic algorithms, thus compromising the security of the public key infrastructure (PKI). This highlights the urgent need to develop and implement quantum-resistant cryptographic algorithms. There are two critical issues in encryption: key generation and key distribution. Asymmetric encryption, commonly used for key distribution, can be intercepted and cracked, and this vulnerability will be exacerbated by the advent of quantum computers. The superior processing capabilities of quantum computers, particularly through Shor's algorithm, threaten to render traditional asymmetric encryption methods obsolete. This has led to the concept of 'Harvest Now, Decrypt Later' attacks, where bad actors, especially nation-state attackers, steal encrypted data now with the expectation of decrypting it in the future. In response to this imminent threat, the National Institute of Standards and Technology (NIST) has initiated a comprehensive process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. This initiative is aimed at ensuring that cryptographic standards remain robust in the face of quantum computing advancements, thereby safeguarding critical data from future quantum decryption efforts. To address the vulnerabilities in key distribution, companies like Qrypt are developing solutions that eliminate the need for traditional key distribution. Qrypt's Key Generation technology uses quantum methods to generate truly random numbers, creating symmetric encryption keys simultaneously at both the source and destination of the encrypted data. This approach removes the risk of key interception and enhances the security of the encryption process. The transition to quantum-resistant cryptographic protocols is essential for maintaining the confidentiality, integrity, and availability of sensitive information. Security practitioners must stay informed about these developments and consider integrating quantum-resistant solutions into their security infrastructure to protect against the rising threat of quantum decryption. #PQC #HNDL #Cryptography #Quantum #CyberSecurity #NIST

    Post-Quantum Cryptography PQC

    csrc.nist.gov

  • Stealth Communications reposted this

    View profile for Yurina Yamato, graphic

    Director, Cyber Defense & National Security @ Stealth Communications

    I am looking forward to reconnecting with colleagues today at HammerCon 2024, the 3rd Annual National Convention of the Military Cyber Professionals Association (MCPA). This premier event for the American military cyber community is taking place at Capitol Technology University in Laurel, Maryland. My team and I will be present, and we welcome the opportunity to meet and network with new and familiar faces. If you are attending, please feel free to introduce yourself. We are excited to engage with fellow professionals and discuss the latest developments in military cyber defense. See you there! #HammerCon #StealthFiber #CyberSecurity

    • No alternative text description for this image

Similar pages

Browse jobs

Funding

Stealth Communications 3 total rounds

Last Round

Corporate round

US$ 175.0M

See more info on crunchbase