Cybersecurity remains the center topic of business discussions throughout the Nation as we begin 2018. US ProTech, having been invited to a private White House briefing, is supporting the U.S. Government’s ambitious cyber security objective named “CDM” or Continuous Diagnostics and Mitigation with its newest Cybersecurity Software: Anamo (www.ANAMO.io).
SUBJECT / NIST 800-171 Deadline Looms for Defense Contractors
Required Attestation of Competency (See 252.204-7008.)
As referenced within your Contract: “(1) By submission of this offer, the Offeror represents that it will implement the security requirements specified by National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171 “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations” that are in effect at the time the solicitation is issued or as authorized by the contracting officer.”
Also see http://dx.doi.org/10.6028/NIST.SP.800-171
What does the Nation of Iran, 144 American Universities and US ProTech have in common? Let’s answer that question right now and discuss “how did they do it and what did they get.” Sure, some of the questions we’ll address are technically sophisticated but the weaknesses exploited could also be considered criminally negligent.
Anamo, Inc. Ranked Top 20 Cyber Security Technology in Digital Threat Intelligence Management Sector by CIO Review Magazine™
Anamo, the leader in digital threat management today announced that it has been named a 2018 Technology Leader by an analyst publication CIO Review Magazine (CIO) in a recent report. The report evaluates threat intelligence management providers by their solution impact and deployment cost efficiency, with Anamo ranking as exceptional in both categories.
On Monday October 16th, 2017, researchers disclosed major weaknesses in WPA2. This link is a full website that has both layman’s details and technical details regarding the vulnerability. US ProTech has learned that “Krack” has been known by key industry players since June of 2017 despite having just been disclosed to the public this week.
The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected in 2017. Cities use IoT to relieve parking congestion by collecting data on open parking spots; farmers can measure moisture in soil; and manufacturers use this technology to track inventory in their supply chain. Because these devices may use machine-to-machine connectivity without human intervention, this can increase the IoT Security Challenge. Here are some security considerations for IoT.
Recent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.
According to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in their Cloud Service Provider. No wonder research firm IDC predicts the market for public and private cloud security to more than double over the next few years. What Cloud Security Concerns are top of mind with business owners, and what can you do to reduce your risk? Read more to find out…
Your network is the backbone of your IT Infrastructure. Your network health is also an integral part of your defense against Cyber threat. Cloud Computing, Communications and Collaboration, Data Protection, and Digital Transformation put more reliance on your network. This begs the question, how is your network health? Ask yourself these three questions to find out the answer…
Reputation Management is a hot topic in the boardroom these days. Having a solid business continuity plan could make or break your company’s ability to survive a data breach or other systems failure that could tarnish your hard-earned reputation. Company news about data loss, systems downtime and other unplanned interruptions occur with regularity. According to technology research firm Gartner, a business that has a catastrophic data event has a two-year survival rate of just 6%. Surprisingly, your company can avoid these scenarios by having a solid BC/DR Plan.