image/svg+xml
image/svg+xml
image/svg+xml

News & Insights

Thought Leadership

Understanding the Power of SOAR for Government

by Robert Schofield
By now, it’s clear that the shifting cyberattack landscape requires new approaches and tools on the part of the federal government.

Thought Leadership

How Federal Agencies Can Unleash the Power of Quantum Cryptography

by Seli Agbolosu-Amison
Seli Agbolosu-Amison June 5, 2019 In developing tools and methods to safeguard data, government and industry technology leaders are constantly seeking out new sources of innovation.

Thought Leadership

Why Federal Agencies Need AIOps

by Jim DeBardi
Jim Debardi & Justin Long June 2, 2019 Federal government Security Operations Center (SOC) and Network Operations Center (NOC) teams are overwhelmed with tools.

How to Plan and Execute an Effective Consolidation – 5 Recommendations to Help Your Federal Organization Succeed

by Katie McCaskey
In part I of this series, we discussed some of the common consolidation challenges facing the Federal Government. In part II, we’ll explore five recommendations to ensure organizations are well-prepared for consolidation.

Ransomware: Playing an Effective Defense

by Katie McCaskey
In this final installment in our series on ransomware, we will discuss what you and your organization can do to protect yourself from the threat of ransomware and how to mitigate the damages, both financially and to your organizational reputation, if you find yourself the victim of an attack.

White paper

Leveraging the CCRI Process to Support Ongoing Authorization within the Risk Management Framework

by Katie McCaskey
Risk analysts struggle to calculate, prioritize and communicate risks to the Authorizing Official (AO), who accepts or denies the risk in support of a system’s accreditation based on a risk report.

To Pay or Not to Pay? Recovering from a Crypto-Ransomware Attack

by Andrew Paulette
Part 2 of a 2-part series on Crypto-ransomware By Andrew Paulette As discussed in Part I of this series, crypto-ransomware is quickly becoming the extortion tool of choice for cybercriminals.

Hidden in Plain Sight: Turning Encryption Against Us through Ransomware

by Andrew Paulette
Part 1 of a 2-part series on Crypto-ransomware By Andrew Paulette By now most people who follow IT in any way know that encryption is used to scramble and lock data so that cyber thieves cannot gain access to it.

Layers of Security: In Defense of the Web Application Layer

by Andrew Paulette
By Marvin Marin, NetCentrics Technology Program Manager and Cybersecurity Expert Security Operation Centers (SOCs) are built on the concept of managing and monitoring a bulwark of layered defenses.

The Increasing Need For Comprehensive Cybersecurity

by Andrew Paulette
The understanding of the need for cybersecurity with businesses of all sizes and in all industries is becoming increasingly evident.