Woodstar Labs is a technology and analysis firm dedicated to serving our nation’s most pressing cyber security needs.
We rely on technology every day to share ideas, secure our democratic processes, preserve access to fresh food and clean water, conduct business and financial transactions, and power our homes and businesses. Malicious cyber actors continue to probe cyberspace, weaponizing the technology that makes our modern way of life possible. Without proper cybersecurity safeguards, information (including intellectual property) can be stolen and abused. AUI has created Woodstar Labs to pioneer new research capabilities in cybersecurity to advance our defenses, particularly for underserved communities in the sciences and for our national critical infrastructure needs. We partner with academia, industry, and government to deliver enhanced protections to those most in need.
Woodstar Labs works on critical infrastructure and in underserved sectors with a wide range of services including cybersecurity architecture design, secure microelectronics, CISO as a service, situational awareness, data agnostic behavioral analytics, and Risk Management. Woodstar’s services have been used to create new secure technologies, monitor election systems, defend microgrids, and provide low cost solutions to academia’s underserved cyber needs. Woodstar Labs is a non-profit organization and is wholly-owned by Associated Universities, Inc.
Woodstar Labs has deep expertise and a diverse range of experience in cybersecurity and information technology fields. Our subject matter experts have worked in cybersecurity roles as civilians in the Federal government (including in senior positions at the U.S. Department of Energy and the National Nuclear Security Administration), as members of the U.S. military and Intelligence Community, and in private sector consulting. Our team members have served as cybersecurity advisors for Fortune 500 companies, senior Federal government personnel, and as leaders pushing the boundaries of cyber threat intelligence and analytics.
- CISO as a service
- Organizational cybersecurity program
- Policies, procedures, standards, and guidelines
- Incident management
- Threat and Risk Management
- Communications, training, and outreach
- Research and analysis
- Delivering a holistic understanding of cyber activity
- Ensuring proper cyber hygiene
- Supporting policy compliance and development
- Detecting unexpected and potentially malicious network activity
- Providing incident response and remediation guidance
- Validating risk mitigation strategies
- Fusing observed network activity with threat intelligence sources.