News & Insights
Thought Leadership
How to Plan and Execute an Effective Consolidation – 5 Recommendations to Help Your Federal Organization Succeed
by Katie McCaskey
We’ll explore five recommendations to ensure organizations are well-prepared for data consolidation.
Ransomware: Playing an Effective Defense
by Katie McCaskey
In this final installment in our series on ransomware, we will discuss what you and your organization can do to protect yourself from the threat of ransomware and how to mitigate the damages, both financially and to your organizational reputation, if you find yourself the victim of an attack.
Thought Leadership
The Value of Knowledge Management in the Enterprise
by Andrew Paulette
Enterprise knowledge management is an important, ongoing process.
Thought Leadership
Ghosts of Users’ Past – Recovering Data from Discarded, Resold, Salvaged, and Stolen Hard Drives
by Katie McCaskey
Destruction is the only guarantee that data won't be stolen.
White paper
Leveraging the CCRI Process to Support Ongoing Authorization within the Risk Management Framework
by Katie McCaskey
Risk analysts struggle to calculate, prioritize and communicate risks to the Authorizing Official (AO), who accepts or denies the risk in support of a system’s accreditation based on a risk report.
To Pay or Not to Pay? Recovering from a Crypto-Ransomware Attack
by Andrew Paulette
Part 2 of a 2-part series on Crypto-ransomware
By Andrew Paulette
Editor's Note: This two-part series was published in 2016.
Hidden in Plain Sight: Turning Encryption Against Us through Ransomware
by Andrew Paulette
Part 1 of a 2-part series on Crypto-ransomware
By Andrew Paulette
Editor's Note: This two-part series was published in 2016.
Layers of Security: In Defense of the Web Application Layer
by Andrew Paulette
By Marvin Marin
NetCentrics Technology Program Manager and Cybersecurity Expert
Security Operation Centers (SOCs) are built on the concept of managing and monitoring a bulwark of layered defenses.
The Increasing Need For Comprehensive Cybersecurity
by Andrew Paulette
The understanding of the need for cybersecurity with businesses of all sizes and in all industries is becoming increasingly evident.