News & Updates

Apache Log4j Vulnerability

A severe vulnerability was identified in Apache Log4j.   Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information.  A bug in Log4j...

What’s the Difference between a Vulnerability Scan and a PEN Test?

We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test.  We've created this table below to show the differences.  Basically, A vulnerability scan is an automated, high-level test that looks for and reports potential...

7 Top Tips for Cyber Security Awareness Month

For 18 years, CISA and the National Cyber Security Alliance (NCSA) continue to raise awareness about the importance of cybersecurity across our Nation, ensuring that we all have the resources we need to be safer and more secure online.  The following tips would be...

Free Seminar: Cybersecurity for Small Business

Seminar delivers keys to a pragmatic and rock-solid cybersecurity plan While hackers target small businesses as low-hanging fruit, shrewd business owners know there are resources and strategies they can leverage to protect their assets. Complacency is never an option...

CyberNINES to Present at the Wisconsin’s 8th Annual Governor’s Cybersecurity Summit

Scott Singer, President of CyberNINES, will be presenting at the 8th Annual Governor’s Cybersecurity Summit on October 5, 2021. Join Scott to learn about the DoD's new cybersecurity requirements that are being flowed down to the entire Defense Industrial Base. Know...

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense's (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business...

Apache Log4j Vulnerability

A severe vulnerability was identified in Apache Log4j.   Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information.  A bug in Log4j...

7 Top Tips for Cyber Security Awareness Month

7 Top Tips for Cyber Security Awareness Month

For 18 years, CISA and the National Cyber Security Alliance (NCSA) continue to raise awareness about the importance of cybersecurity across our Nation, ensuring that we all have the resources we need to be safer and more secure online.  The following tips would be...

Free Seminar: Cybersecurity for Small Business

Free Seminar: Cybersecurity for Small Business

Seminar delivers keys to a pragmatic and rock-solid cybersecurity plan While hackers target small businesses as low-hanging fruit, shrewd business owners know there are resources and strategies they can leverage to protect their assets. Complacency is never an option...

Scott Singer Featured in a Bloomberg Article

Scott Singer Featured in a Bloomberg Article

Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense's (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business...

Join Our Newsletter

Subscribe to  CyberNINES newsletter to receive our latest news and updates.