NEWS & UPDATES
Administrative Office Manager for CyberNINES, Raine is our program expert and keeps CyberNINES organized and efficient so our consultants can focus on our clients and their cybersecurity compliance needs!
An insider threat in cybersecurity refers to the risk of an organization's data or network being compromised by a trusted individual within the organization, such as an employee, contractor, or business partner. Insider threats can be intentional or unintentional, and they can be caused by a variety of factors, including malice, carelessness, or ignorance.
On April 4th, Stacy Bostjanick, DoD’s Director for CMMC, joined PreVeil for an exclusive webinar where the most important DFARS and CMMC questions on the minds of defense contractors were asked. Additionally, our own Scott Singer – CEO – and Marci Womack – Federal Practice Director at Authorized C3PAO Schellman – provided guidance on the steps contractors should be taking to meet these important compliance requirements.
The webinar addressed the following:
Mobile security refers to the protection of mobile devices such as smartphones, tablets, and wearables from threats such as malware, hacking, theft, and unauthorized access. It involves implementing measures and strategies that ensure the safety and privacy of sensitive data and information stored on mobile devices.
JANUARY TOWN HALL MODERATOR: JON HANNY
Fall 2022 Unified Agenda
CyberNINES CEO Scott Singer was last week’s guest on the always informative YouTube channel, 123CMMC - Cyber Security with Dana Mantilia speaking on “How To Prepare For the DIBCAC Assessment In Order To Avoid Questions”.
Check out the interview here! 123CMMC Interview
A severe vulnerability has been identified in the Apache Log4j. Apache Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. A bug in Log4j Java (Log4j 2.0-beta9 through 2.14.1) library is being used to provide hackers the ability to takeover systems without any form of authentication.