Maintaining Regulatory Compliance in a Complex Framework
Businesses have to maintain regulatory compliance with multiple regulations and keep data classification and governance up to par; something which is difficult given the sheer amount of data organizations hold. 53% of companies keep over 1,000 sensitive files accessible to every employee and interconnectivity further complicates the compliance process, with many organizations now using cloud […]
Centripetal Networks x Cisco: Willful Patent Infringement
Centripetal Networks Awarded $2.6 to $3.2 billion in Patent Damages for Cisco’s Willful Patent Infringement Herndon, Virginia – October 6, 2020 — Yesterday, United States District Judge for the Eastern District of Virginia, the Honorable Henry Coke Morgan, Jr. issued Judgment in favor of Centripetal Networks after the conclusion of a 22-day bench trial in […]
Improve Cyber Resilience Without Disrupting Business Operations
For organizations trying to improve cyber resilience, security activities and business operations have traditionally been in a seesaw balance of increasing security measures to mitigate against ever-increasing and complex threats, without the disruption of business operations. Organizations that implement a cyber security strategy by creating unrealistic policies risk interrupting the business processes and losing customers, […]
Implementing and Maintaining Cyber Threat Intelligence
With annual cyber security spending projected to eclipse $43 billion by the end of 2020, organizations are increasingly willing to invest far more into cyber threat intelligence capabilities. However, with vendors charging up to $100,000 for their security tools and support, and the growing cyber security skills shortage affecting 76% of organizations, installation can be […]
An Interview with Centripetal’s CEO, Steven Rogers
As the CEO and Founder of Centripetal, Steven Rogers is a pioneer of intelligence-based cyber defense. We sat down with Steven to find out more about his career in security, his role as CEO, and how he sees Centripetal growing in the future. How did your career lead you to founding Centripetal? My background […]
CTI Challenges Faced by Mid-size Organizations
The evolution of the cyber security landscape has initiated a chess game between security teams and hackers. As cyber security teams take a toughened stance on cyber threats and continuously invest in improving their cyber security posture, hackers aim to exploit their vulnerabilities with increasingly sophisticated techniques. Hackers now attack every 39 seconds, and security […]
Evolving Trust But Verify
In 1987 at the INF (Intermediate-Range Nuclear Forces) Treaty, President Ronald Reagan used the phrase ‘trust but verify’ when discussing relations between the United States and the Soviet Union. Translated from an old Russian phrase used by Vladimir Lenin and Joseph Stalin, “Doveryai, No Proveryai” is the idea that a responsible person verifies everything before […]
Centripetal Ranks in Deliottes Technology Fast 500â„¢
Centripetal Ranked Number 93 of the Fastest Growing Companies in North America on Deloitte’s 2019 Technology Fast 500â„¢ Centripetal Attributes 1800% Revenue Growth to the Demand for Intelligence Driven Network Defense Herndon, Virginia – December 2, 2019 — Centripetal today announced it ranked 93 on Deloitte’s Technology Fast 500â„¢, a ranking of the 500 fastest growing technology, […]
Centripetal CleanINTERNET in The Last Watchdog
Byron Acohido of The Last Watchdog features Centripetal CleanINTERNET in his article ‘SHARED INTEL: Here’s One Way to Better Leverage Actionable Intel From the Profusion of Threat Feeds.‘ From the article: “Centripetal’s CleanINTERNET service is built around correlating and analyzing threat feeds pulled in from some 90 commercial, government and open-source entities. The heavy lifting Centripetal does […]
Centripetal Discusses Shielding in Infosecurity Magazine
Centripetal Discusses Shielding and Credentials Practice to Prevent Network Infiltration and Data Exfiltration in Infosecurity Magazine’s Article “Boost Mobile Alerts Customers of Security Incident.” Attackers using compromised credentials accounted for 29% of data breaches, according to Verizon’s 2019 Data Breach Investigation Report. The unauthorized access at Boost Mobile is what Byron Rashed, VP of marketing, Centripetal, called […]