A White Paper by Carver Pace and Kalai Kandasamy, NetCentrics Corp The Joint Regional Security Stack (JRSS) is a joint cyber war fighting platform. According to the Defense Information Systems Agency (DISA), the JRSS is a stack of equipment that performs firewall functions, intrusion detection and prevention, enterprise management, virtual routing and forwarding (VRF), and […]
The importance of managing IoT devices on your network By Mesay Degefu and Colby Proffitt In the United States, critical infrastructure is defined as “systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, […]
Training A&A analysts to think and act like CND professionals. This white paper examines the role of the Authorization and Accreditation analyts performing cybersecurity functions. While cybersecurity threats have evolved, many A&A analysts still review and approve systems by reviewing documentation, rather than considering a holistic approach embraced by Computer Network Defense (CND) professionals. We […]
Download our Cybersecurity Services brochure to learn more about our capabilities, certifications and some key achievements on previous contracts.
Download our Enterprise IT Services brochure which outlines our services, certifications and defines some key achievements on previous contracts.
Issue: Risk analysts struggle to calculate, prioritize and communicate risks to the Authorizing Official (AO), who accepts or denies the risk in support of a system’s accreditation based on a risk report. A major problem not addressed by either the Defense Information Assurance Certification and Accreditation Program (DIACAP) or the National Institute of Standards and […]
As discussed in Part I of this series, crypto-ransomware is quickly becoming the extortion tool of choice for cybercriminals. Even when an organization trains its employees to guard against social engineering, disables macros and configures ad-blockers, and takes an array of other steps to protect its data, it only takes one misstep for threat actors […]