Robert Schofield, a Senior Solutions Architect for NetCentrics, and Thomas Cook, a Senior Systems Engineer for NetCentrics, recently published an article in Cyber Defense Magazine. Titled How consistent security reporting in government could prevent the next WannaCry exploit, the article explores the concept of data aggregation as a means to improved cybersecurity in the federal space. Robert and Thomas explain that the abundance of tools results in an equal abundance of information, which isn’t always consistent when compared to data collected from other tools.
Seli Agbolosu-Amison, PhD, a cybersecurity data scientist for NetCentrics Corporation, has recently published an article in SIGNAL Magazine on four of the main cyber policies transforming government. Seli explains that as a result of recent federal legislative and administrative activity, government agencies are expected to launch significant modernizations of their cybersecurity systems, get offensive with hackers, and take a more strategic approach to risk, and breaks down the specific components of the four major policies.
Kalai Kandasamy, a Sr. Network Engineer for NetCentrics, and Colby Proffitt, a Sr. Analyst for NetCentrics, recently co-authored an article titled, “7 Skills Federal Cyber Pros Need to Know”. The article, featured by NextGov, highlights seven cyber skills that will likely be in high demand in 2018 and beyond, largely on account of advances in AI, automation, and machine learning.
ICYMI: New global cybersecurity center announced at Davos; Facebook hires first ever head of cybersecurity policy; Alphabet launches new cybersecurity company, Chronicle, out of its X moonshot factory; Free Linux Tool Monitors Systems for Meltdown Attacks; ATM makers warn of ‘jackpotting’ hacks on U.S. machines.
It’s been seven years since the Office of Management and Budget mandated that federal agencies adopt a cloud-first policy, yet it’s no surprise this major change is still a work in progress. While the cloud brings benefits, security remains a particular area of concern, because it’s not always clear who’s responsible for securing what. Before moving to the cloud, there are several things that federal CIOs and CISOs should consider.
Colby Proffitt, a Senior Analyst for NetCentrics Corporation, was recently published in the United States Cyber Security Magazine. In his article titled Cyber Deterrence and Active Cyber Defense, Proffitt explains that effective deterrence must be legally viable, technically capable, and strategically aligned to policy. He then identifies the principles and challenges of deterrence, and explains that a combination of deterrence and active cyber defense can be an effective approach for defending against the rise of nation-state attacks.
Colby Proffitt, a Senior Analyst for NetCentrics Corporation, has published an article in Tripwire titled Protecting Critical Infrastructure in the Age of IoT. In his article, Colby highlights the cyber challenges and risks of IoT, and acknowledges the need to implement standards and best practices for a unified, fortified front against cyber adversaries. Colby then offers five recommendations for both government and industry to consider as a means to combat cyber adversaries and protect critical infrastructure, including networks, systems and data, without barring the benefits and use of new technology on those networks.
In the United States, critical infrastructure is defined as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.”
Marvin Marin, a Technical Program Manager for NetCentrics Corporation at the US Coast Guard, and a 2016 Finalist for the EC-Council Foundation’s Chief Information Security Officer of the year, was recently published in FCW. In his article Prudence over Panic, Marin explains how a hyper-focus on zero-day exploits tends to negatively impact an organization’s response to vulnerability management in general. Read the dull story on FCW here: https://fcw.com/articles/2017/06/02/comment-0day-martin.aspx.
In case you missed it, here’s the latest in cyber news from this week. From the OneLogin breach and intelligence data found in the cloud, to the new DHS Hack Department and BitCoin tracking tools.
Philip Lee, a senior information security analyst for NetCentrics Corporation, has published an article in GCN titled After a data spill: Containing and repairing the damage. Philip points out the differences between a data spill and a hack and explains that spills are difficult to avoid on account of the human factor of IT. He then lays out five recommendations for federal agencies to consider after a spill – how to minimize the damage, recover, and get back to business. To read the full story on GCN, click here.
In this final installment in our series on ransomware, we will discuss what you and your organization can do to protect yourself from the threat of ransomware and how to mitigate the damages, both financially and to your organizational reputation, if you find yourself the victim of an attack.