image/svg+xml
image/svg+xml
image/svg+xml

News & Insights

Thought Leadership

The Value of Knowledge Management in the Enterprise

by Andrew Paulette
Enterprise knowledge management is an important, ongoing process.

Thought Leadership

Ghosts of Users’ Past – Recovering Data from Discarded, Resold, Salvaged, and Stolen Hard Drives

by Katie McCaskey
Destruction is the only guarantee that data won't be stolen.

White paper

Leveraging the CCRI Process to Support Ongoing Authorization within the Risk Management Framework

by Katie McCaskey
Risk analysts struggle to calculate, prioritize and communicate risks to the Authorizing Official (AO), who accepts or denies the risk in support of a system’s accreditation based on a risk report.

To Pay or Not to Pay? Recovering from a Crypto-Ransomware Attack

by Andrew Paulette
Part 2 of a 2-part series on Crypto-ransomware By Andrew Paulette Editor's Note: This two-part series was published in 2016.

Hidden in Plain Sight: Turning Encryption Against Us through Ransomware

by Andrew Paulette
Part 1 of a 2-part series on Crypto-ransomware By Andrew Paulette Editor's Note: This two-part series was published in 2016.

Layers of Security: In Defense of the Web Application Layer

by Andrew Paulette
By Marvin Marin NetCentrics Technology Program Manager and Cybersecurity Expert Security Operation Centers (SOCs) are built on the concept of managing and monitoring a bulwark of layered defenses.

The Increasing Need For Comprehensive Cybersecurity

by Andrew Paulette
The understanding of the need for cybersecurity with businesses of all sizes and in all industries is becoming increasingly evident.