Find our logo, b-roll, executive headshots, product imagery, and other rich media assets. Browse, search for, and easily download content through our media kit.
To understand the Shift5 name, you need to put on your developer hat. We’ll start with two foundational pieces:
Computer memory stores massive amounts of information in 0s and 1s, but on their own, 0s and 1s don’t translate into usable information.
In order to make the information in computer memory useful, the ASCII Table, The American Standard Code for Information Interchange, was developed.
The ASCII table assigns a range of symbols – from letters of the alphabet, special characters, and more – to the numerical values found in computer memory.
All of the assets Shift5 protects use serial bus protocols – or, data networks – to communicate with each other.
For example, an engine transmission control component aboard a plane connects and communicates with the braking system, so the entire vehicle operates in harmony.
There are a number of serial bus protocols aboard planes, trains, and weapon systems, from Controller Access Network (CAN), ARINC 429, to MIL-STD-1553, and more.
The serial bus protocol on the first vehicle Shift5 founders performed a cybersecurity vulnerability assessment on was MIL-STD-1553. If you take the numbers 15 and 53 from the serial bus name, and reference their corresponding characters on the ASCII table, you get the word Shift and the number 5. Thus, Shift5.
Shift5 is founded and raises $2.5 Million in Seed Round funding
Establishes HQ in Arlington, VA
Shift5 awarded contract with Army RCCTO
U.S. Air Force Awards Shift5 Phase II Small Business Innovation Research Contract
Shift5 doubles employee headcount and raises $20 Million in Series A funding
Shift5 awarded four Small Business Innovation Research Phase III Contracts across the DoD
Shift5 raises $50 Million in Series B funding
AEI Industrial Partners joins