Robert Schofield, a Senior Solutions Architect for NetCentrics, and Thomas Cook, a Senior Systems Engineer for NetCentrics, recently published an article in Cyber Defense Magazine. Titled How consistent security reporting in government could prevent the next WannaCry exploit, the article explores the concept of data aggregation as a means to improved cybersecurity in the federal space. Robert and Thomas explain that the abundance of tools results in an equal abundance of information, which isn’t always consistent when compared to data collected from other tools.
NetCentrics was recently recognized as a “Top Workplace” by The Washington Post! The award is based solely on employee feedback and only 150 companies are recognized each year. This is more than a company award – this is an award for each of our employees who live and promote our culture every day, a culture based on our core values and a siple foundation of caring about each other, our customers, and our teammates.
NetCentrics and company CEO, Cynthia Barreda, were recently recognized in the Comparably 2018 Culture Awards for leadership, opportunities for women, diversity, and professional development.
ICYMI: Theft of North Korean secrets may have pushed Kim Jong Un into talks; Watch Out Apple: North Korean Hackers Are Now Developing iPhone Spy Tools; One Year After WannaCry, EternalBlue Exploit Is Bigger Than Ever; Hidden App Malware Found on Google Play; Trump eliminates national cyber-coordinator job, gives Bolton keys to the cybers.
Seli Agbolosu-Amison, PhD, a cybersecurity data scientist for NetCentrics Corporation, has recently published an article in SIGNAL Magazine on four of the main cyber policies transforming government. Seli explains that as a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers, and take a more strategic approach to risk, and breaks down the specific components of the four major policies.
ICYMI: for better cybersecurity, be nice to your CFO; the role of IoT on the battlefield and at sea; Pentagon ans Chinese phone sales on US military bases; Data may be the new oil but artificial intelligence is the engine that it fuels; and, GLitch: new ‘Rowhammer’ attack can remotely hijack android phones.
DCA Live recently announced those who will be recognized as the 2018 DCA Live Federal Entrepreneurs. The award honors some of the exceptional company founders and leading executives from the DC region’s fastest growing federal technology and services ventures. Cyndi and the other recipients will be recognized May 30th at the Eastern Foundry in Arlington, VA.
NetCentrics CIO, Jim DeBardi, recently published an article in FCW, offering four recommendations for federal agencies looking to modernize via consolidation. Between scope, prioritization, staffing/leadership, process, and data-integrity demands, there are a number of challenges agencies must consider and overcome in order to successfully consolidate. In his article, Jim offers four steps that agency leaders should consider before starting down the consolidation path.
ICYMI: Experts describe how hacking back can be done right; House bill would create a ‘naughty list’ for nation-state hacking groups; Researchers found a semi-legit way to turn an Amazon Echo into a wiretap; Hackers build a ‘Master Key’ that unlocks millions of Hotel rooms; and, North Korea linked to global hacking operation against critical infrastructure, telecoms.
ICYMI: Casino Gets Hacked Through Its Internet-Connected Fish Tank Thermometer; Could Russia and West be heading for cyber-war? Command and control: A fight for the future of government hacking; Senate passes DHS bug bounty bill; and, ‘iTunes Wi-Fi Sync’ Feature Could Let Attackers Hijack Your iPhone, iPad Remotely
NetCentrics CEO, Cyndi Barreda, recently published an article in Federal Times titled, “How to take the ‘fear factor’ out of federal IT consolidations,” explaining that consolidation is about technology and cost savings, but a truly successful consolidation is also about people, cultural change, customer service, and maintaining the mission.
ICYMI: Careful what you wish for—change and continuity in China’s cyber threats (part 2); Cyber criminals earn up to $2m a year, study shows; College students battle to control the power grid in Energy Department Challenge; Popular Android phone manufacturers caught lying about security updates; Zuckerberg hearing: Grasping — and grasping for — tech terms.