ICYMI: NSA advocates data sharing, the Pnyetya ransomware outbreak, Shadow Brokers threaten to unmask a hacker who worked with the NSA, and an in depth look at the latest cyber attack in Ukraine.
NetCentrics Corporation, a leading provider of enterprise IT and cybersecurity services to the federal government, today announced that its 8(a) Mentor-Protégé Agreement with Broadleaf, Inc. has been approved by the Small Business Administration (SBA). The two companies’ commitment to a formal mentoring relationship will provide expanded business development opportunities for both and enhance the range of IT capabilities they can offer federal agencies.
In this week’s cyber weekly roundup – the average cost of a data breach goes down for the first time ever, NSA opens Github account, and hackers use e-cigarettes to transmit malware.
In this week’s cyber weekly roundup – new malware that’s activated just by hovering with your mouse, US-CERT issues North Korean cyberattack patch warning, and why car companies are hiring computer security experts.
ICYMI: hackers add bad data and misinformation to stolen files, flash vulnerabilities, and Trump’s new cyber executive order:
Jake Null, a Problem Manager for NetCentrics Corporation, recently participated in a webinar sponsored by Adaptiva focused on the challenges and opportunities associated with migrating to Win10. Here’s a recap of Jake’s Q&A in case you missed it:
Marvin Marin, a Technical Program Manager for NetCentrics Corporation at the US Coast Guard, and a 2016 Finalist for the EC-Council Foundation’s Chief Information Security Officer of the year, was recently published in FCW. In his article Prudence over Panic, Marin explains how a hyper-focus on zero-day exploits tends to negatively impact an organization’s response to vulnerability management in general. Read the dull story on FCW here: https://fcw.com/articles/2017/06/02/comment-0day-martin.aspx.
In case you missed it, here’s the latest in cyber news from this week. From the OneLogin breach and intelligence data found in the cloud, to the new DHS Hack Department and BitCoin tracking tools.
Philip Lee, a senior information security analyst for NetCentrics Corporation, has published an article in GCN titled After a data spill: Containing and repairing the damage. Philip points out the differences between a data spill and a hack and explains that spills are difficult to avoid on account of the human factor of IT. He then lays out five recommendations for federal agencies to consider after a spill – how to minimize the damage, recover, and get back to business. To read the full story on GCN, click here.