NEWS & UPDATES        

Posts about:

Advice (3)

Penetration Test Versus Vulnerability Scan

What’s the Difference Between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We’ve created this table below to show the differences. 
 
Basically, a  vulnerability scan is an automated, high-level test that looks for and reports potential vulnerabilities.
 
A penetration test is a detailed hands-on examination by an actual person that tries to detect and exploit weaknesses in your system.
 
These tests are good steps to maintain Cybersecurity compliance
Read More

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense’s (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business Committee on recommendations for making the Cybersecurity Maturity Model Certification (CMMC) compliance attainable for DoD’s small business suppliers, expressed his concerns about the insufficient number of approved Certified 3rd Party Assessment Organizations (C3PAOs) to satisfy the need to certify the defense contractors by the 2025 deadline. There is a need for roughly 8,000 C3PAOs to certify 300,000 companies in the Defense Industrial Base (DIB).

Read More

Protect Your Company from a Ransomware Attack

OVERVIEW 

Ransomware has become more prevalent than ever, and predictions are that it will continue to be a major form of cybercrime in the coming years. Ransomware is a type of malware designed to encrypt files or even entire drives so that the business infected can no longer access these files or systems without the key to unlock the encryption, which of course is not available unless a ransom is paid, almost always via a cryptocurrency. This can have a devastating effect on the attacked organization, creating an atmosphere of desperation, that can be mitigated with the preparation or avoided altogether with strategic prevention. 

Read More

Recording: IT-OT Integration: Where Information Technology and Industrial Control Systems Collide

A Guide for Manufacturers to Mitigate Risk and Increase Profits by Integrating Their IT & Operations Teams

In this recorded webinar session from WMEP, Scott Singer, President of CyberNINES, and Cory Larson, WMEP Automation and Cybersecurity Consultant will guide you through the best tools and methods for IT-OT Integration and how it will benefit your finances. Learn how to integrate IT and OT Departments (Industrial Control Systems) within your organization. 

Read More

Sign up for the latest News & Updates from CyberNINES!