News & Updates
Apache Log4j Vulnerability
A severe vulnerability was identified in Apache Log4j. Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications—as well as in operational technology products—to log security and performance information. A bug in Log4j...
What’s the Difference between a Vulnerability Scan and a PEN Test?
We find that often customers become confused between a Vulnerability Scan and a Penetration (PEN) test. We've created this table below to show the differences. Basically, A vulnerability scan is an automated, high-level test that looks for and reports potential...
7 Top Tips for Cyber Security Awareness Month
For 18 years, CISA and the National Cyber Security Alliance (NCSA) continue to raise awareness about the importance of cybersecurity across our Nation, ensuring that we all have the resources we need to be safer and more secure online. The following tips would be...
Free Seminar: Cybersecurity for Small Business
Seminar delivers keys to a pragmatic and rock-solid cybersecurity plan While hackers target small businesses as low-hanging fruit, shrewd business owners know there are resources and strategies they can leverage to protect their assets. Complacency is never an option...
CyberNINES to Present at the Wisconsin’s 8th Annual Governor’s Cybersecurity Summit
Scott Singer, President of CyberNINES, will be presenting at the 8th Annual Governor’s Cybersecurity Summit on October 5, 2021. Join Scott to learn about the DoD's new cybersecurity requirements that are being flowed down to the entire Defense Industrial Base. Know...
Scott Singer Featured in a Bloomberg Article
Scott Singer, President of CyberNINES, was quoted by a reporter from Bloomberg about the Department of Defense's (DoD) new cybersecurity requirement and its impact on the small and medium-sized businesses. Singer recently testified before the House Small Business...
Join Our Newsletter
Subscribe to CyberNINES newsletter to receive our latest news and updates.
