In the previous parts of this series, we explored the concepts underlying ransomware as well as some of the tactics and variations on basic ransom-based malware. Here in part IV, we will explore what makes ransomware an appealing enterprise for cybercriminals; as the title of part III indicates, the ransomware industry is booming.
Once considered the domain of nation-state intelligence agencies, tech-savvy teenagers with too much time on their hands, and miscreants devoted to chaos and disorder, the development and deployment of malware has matured into a profitable business model – last year the cost of ransomware was estimated at $1 billion and a report sponsored by Malwarebytes estimated that more than 40% of those affected paid ransom demands.
One of NetCentrics’ cyber experts, Marvin Marin, has published an article about cyber threat hunting as the next leap forward in cybersecurity as a means to defending our networks and staying one step ahead of our adversaries. In his article, Marin offers eight considerations for a more proactive approach to cyber defense. Read the full […]
From planning and communication to expectation management and perception awareness, NetCentrics President Cyndi Barreda lays out seven recommendations that have helped her lead multiple consolidations over her more than 20 years in federal IT consolidation. With so much going on during a consolidation, it can be easy for customer service to suffer. Cyndi believes that for […]
Marvin Marin, one of NetCentrics’ cybersecurity experts and a technical program manager supporting the U.S. Coast Guard Cyber Command, has published an article about the importance of explaining cybersecurity threats in a decision maker context – why it’s important for cyber professionals to explain the potential impacts of a threats in terms of critical system […]
New GSA Cyber Special Item Numbers connect agencies to vendors NetCentrics Corporation, a leading provider of enterprise IT services and cybersecurity for the U.S. government, is one of the first companies to be awarded all four Government Services Administration (GSA) Highly Adaptive Cybersecurity Services (HACS) Special Item Numbers (SINs) under IT Schedule 70. The procurement […]
Colby Proffitt, a Senior Business Process Analyst for NetCentrics Corporation, has published an article in Homeland Security Today about the increasing use of automation in IT and what it means for cybersecurity. Read the full article and learn about the five top reasons both government and commercial organizations should consider shifting to automation: http://www.hstoday.us/industry-news/general/single-article/exclusive-automation-cyber-friend-or-cyber-fiend/f915cf732e5b8bd8642d26be0ac89a3b.html
Edris Amiryar, a Senior Systems Engineer and Operations Manager for NetCentrics Corporation, has published an article in App Developer Magazine about Virtual Desktop Infrastructure (VDI) as the way forward in government mobility. In the full story, Ed discusses the challenges, benefits, the way forward, and how government users will one day be able to work […]
Marvin Marin, one of NetCentrics’ cybersecurity experts and a technical program manager supporting the U.S. Coast Guard Cyber Command, has published an article about a possible solution to the government cyber skills shortage: a cyber range. To learn more about the solution as a forward-thinking, long-term investment for the government, read the full story in […]
NetCentrics’ Cyber Security Program Manager & Technical Advisor Marvin Marin has been named a finalist for the EC-Council Foundation Chief Information Security Officer (CISO) of the Year award. Marvin is one of more than 10 finalists representing the best in the field of cybersecurity, cyber defense, information security, and security innovation. The winners of the […]
By Andrew Paulette Have you ever given away or resold a computer, smart phone, or electronic device? Before you disposed of it, how much time did you invest to ensure the data on the storage device was erased? In many cases, most users rely on the “Empty Recycling Bin” option found in the operating system […]
Marvin Marin, one of NetCentrics’ cybersecurity experts, has published a blog about software development and cybersecurity risks. Learn more about the risks of using dependencies in your code as well as best practices for software development on the SIGNAL blog.