NEWS & UPDATES        

Apache Log4j Vulnerability

A severe vulnerability has been identified in the Apache Log4j.  Apache Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information.  A bug in Log4j Java (Log4j 2.0-beta9 through 2.14.1) library is being used to provide hackers the ability to takeover systems without any form of authentication.

Read More

How to Submit a NIST Score?

The Department of Defense’s (DoD) Interim Final Rule that went into effect on 30 November 2020, requires both primes and sub-contractors to submit their NIST SP 800-171 assessment score to the Supplier Performance Risk System (SPRS). While the rule will only impact new contracts, the DoD plans to do 148 Medium Assessments and 81 High Assessments over the next three years, with an estimated 8,823 basic assessment scores to be uploaded on SPRS each year to award new contracts to small businesses. At CyberNINES, we are aware of these changes and committed to helping small and medium-sized businesses accept purchase orders from the DoD and Prime Contractors.   

Read More

What’s the Difference Between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We’ve created this table below to show the differences. 
 
Basically, a  vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities.
 
A penetration test is a detailed hands-on examination by an actual person that tries to detect and exploit weaknesses in your system.
Read More

7 Top Tips for Cyber Security Awareness Month

For 18 years, CISA and the National Cyber Security Alliance (NCSA) continue to raise awareness about the importance of cybersecurity across our Nation, ensuring that we all have the resources we need to be safer and more secure online.  The following tips would be great to share with employees, family, and friends to raise their cyber awareness to further our protection.  Send out one or two tips a week for employee engagement and training.

Read More

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense’s (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business Committee on recommendations for making the Cybersecurity Maturity Model Certification (CMMC) compliance attainable for DoD’s small business suppliers, expressed his concerns about the insufficient number of approved Certified 3rd Party Assessment Organizations (C3PAOs) to satisfy the need to certify the defense contractors by the 2025 deadline. There is a need for roughly 8,000 C3PAOs to certify 300,000 companies in the Defense Industrial Base (DIB).

Read More

Webinar Recording: Making CMMC Compliance Affordable for Small and Medium-Sized Businesses

Small and medium businesses represent the majority of DoD contractors in the Defense Industrial Base. Unfortunately, for this vital part of the defense industry, the cost of achieving CMMC compliance is a significant challenge as many contractors are already on a tight budget. The DIB needs to find cost-effective solutions to facilitate CMMC compliance.

Read More

CyberNINES Expands to California

CMMC & NIST SP 800-171 Compliance & Cybersecurity Consulting Firm, CyberNINES, Expands in California  

MADISON, WIS. (July 30, 2021) — CyberNINES, a cybersecurity consulting company providing high-value and affordable CMMC & NIST SP 800-171 compliance services for small and medium-sized businesses in the Upper Midwest, has recently expanded its presence in California. Scott Singer, President of CyberNINES, Todd Streicher, Vice President of Business Development, and Nick Alaga, Director of Business Development in Western Region, met this past month with businesses and partners in San Francisco, Los Angeles, and San Diego to discuss the strategic development in the West region.

Read More

Small Businesses Are Especially Vulnerable to Ransomware Trends

Small businesses often rely on Managed Service Providers (MSPs) to handle their IT needs including cybersecurity. However, ransomware targets companies of all sizes, and small businesses are especially vulnerable to supply chain attacks. In this July Newsletter of Cyber Security Summit | Minneapolis, MN Scott Singer, President of CyberNINES, shares a few basic strategies for small businesses to protect themselves from ransomware supply chain attacks.

Read More

Sign up for the latest News & Updates from CyberNINES!