image/svg+xml
image/svg+xml
image/svg+xml

News & Insights

Thought Leadership

The Internet of Things: Providing Convenience at the Expense of Security

by Colby Proffitt
Critical infrastructure is defined as “systems and assets, whether physical or virtual, vital to the United States.

Thought Leadership

How to Plan and Execute an Effective Consolidation – 5 Recommendations to Help Your Federal Organization Succeed

by Katie McCaskey
We’ll explore five recommendations to ensure organizations are well-prepared for data consolidation.

Doing More with Less – 5 Challenges of Data Consolidation

by Katie McCaskey
Doing more with less – that’s been a common theme in the Government IT space, even more so in the last decade. Budget growth has slowed dramatically while information technology capabilities and user demands skyrocket. Finding ways to create efficiencies and provide new solutions for customers with flat budgets is paramount. Data Center rationalization, transformation, and consolidation offers perhaps the best opportunity to provide the same or better service with a smaller footprint and greater efficiency. Government agencies think so too: in August 2016, the Office of Management and Budget (OMB) finalized a new data center consolidation directive seeking 25% cost reductions through 2018. The directive encourages data center consolidation and notes that any recommended new data center construction budgets won’t be approved without prior consent of OMB. While data center consolidation and rationalization promise great benefits, these consolidations present significant challenges.

Ransomware: Playing an Effective Defense

by Katie McCaskey
In this final installment in our series on ransomware, we will discuss what you and your organization can do to protect yourself from the threat of ransomware and how to mitigate the damages, both financially and to your organizational reputation, if you find yourself the victim of an attack.

Thought Leadership

The Value of Knowledge Management in the Enterprise

by Andrew Paulette
Enterprise knowledge management is an important, ongoing process.

Thought Leadership

Ghosts of Users’ Past – Recovering Data from Discarded, Resold, Salvaged, and Stolen Hard Drives

by Katie McCaskey
Destruction is the only guarantee that data won't be stolen.

White paper

Leveraging the CCRI Process to Support Ongoing Authorization within the Risk Management Framework

by Katie McCaskey
Risk analysts struggle to calculate, prioritize and communicate risks to the Authorizing Official (AO), who accepts or denies the risk in support of a system’s accreditation based on a risk report.

To Pay or Not to Pay? Recovering from a Crypto-Ransomware Attack

by Andrew Paulette
Part 2 of a 2-part series on Crypto-ransomware By Andrew Paulette Editor's Note: This two-part series was published in 2016.

Hidden in Plain Sight: Turning Encryption Against Us through Ransomware

by Andrew Paulette
Part 1 of a 2-part series on Crypto-ransomware By Andrew Paulette Editor's Note: This two-part series was published in 2016.

Layers of Security: In Defense of the Web Application Layer

by Andrew Paulette
By Marvin Marin NetCentrics Technology Program Manager and Cybersecurity Expert Security Operation Centers (SOCs) are built on the concept of managing and monitoring a bulwark of layered defenses.