Centripetal

Reston, VA, USA
2009
  |  By Sean Moore
Last week (19-July-2024), a significant IT outage occurred because CrowdStrike distributed a faulty update to its Falcon security software running on millions of computers using the Microsoft Windows operating system. This faulty update caused many of these computers to crash, which interrupted the operations of businesses across the globe.
  |  By Rebecca Lindley
It’s time to ‘Have Your Say’ on the future of cybersecurity regulations in the European Union. The draft implementing regulation for the NIS2 Directive is now open for public feedback through the ‘Have Your Say’ portal until July 25, 2024. This consultation period allows stakeholders to contribute to refining the regulation, with all feedback shaping the final regulations.
  |  By John Owens
As a crucial member of your law firm’s IT team, you hold the responsibility of safeguarding highly sensitive client information – financial records, personal data, and privileged communications. While you might not be managing cases, you’re protecting the very foundation of client trust. However, this trust faces significant risk. Last year alone, 29% of law firms experienced a security breach, with the average cost per breach soaring to $4.47 million.
  |  By Rebecca Llindley
Time is of the essence, as the transposition deadline for the NIS2 Directive approaches on October 17, 2024, organizations across the EU must brace for its significant impact. This new Directive, updating and expanding its predecessor (NIS1), will dramatically increase the number of regulated entities. According to Ireland’s National Cyber Security Centre, the number of regulated entities is expected to rise from about 120 under NIS1 to an estimated 3,500 under NIS2.
  |  By Lauren Farrell
Earlier this year, a Chinese company named Funnull acquired the polyfillio. Due to this acquisition, this code was used to redirect mobile visitors to scam sites. Over 100,000 websites using the previously popular Polyfill JS open-source project are vulnerable to attacks that redirect traffic to sports betting and pornography sites.
  |  By Lauren Farrell
On June 25, 2024, Progress Software, the parent company of the MOVEit software suite, officially released details for two critical vulnerabilities identified in MOVEit Gateway and MOVEit Transfer, CVE-2024-5805 and CVE-2024-5806 respectively. MOVEit Transfer is a managed file transfer solution that supports the exchange of files and data between servers, systems and applications within and between organizations.
  |  By Lauren Farrell
The explosive growth of TikTok in schools isn’t just a trend—it’s a cybersecurity ticking time bomb. From rampant exposure to harmful content to severe data privacy concerns, TikTok’s unchecked influence poses significant threats to the safety and well-being of students, as well as compromising the technical infrastructure and sensitive data of schools.
  |  By Lauren Farrell
On May 28, 2024, Check Point released an advisory for CVE-2024-24919, a high priority bug which according to NIST NVD is categorized as “Exposure of Sensitive Information to an Unauthorized Actor”. The NVD has yet to assess a CVSS score for CVE-2024-24919 as of this writing. This vulnerability affects Check Point Security Gateway devices connected to the internet and configured with either IP-Sec VPN or Mobile Access software blades.
  |  By Centripetal
Centripetal announceS that it is expanding its offering to include CleanINTERNET® DNS to preemptively safeguard businesses against web-based cyber threats. Unlike other DNS filtering products that rely solely on blocklists, CleanINTERNET® DNS is the first-ever solution to leverage advanced threat intelligence from multiple providers to proactively prevent users from accessing malicious websites and harmful content.
  |  By Lauren Farrell
We are trusted by the world’s most iconic brands with protecting their valuable business assets. Being named The Official Cyber Network Provider of The Boston Red Sox and Fenway Park demonstrates the importance for companies to adopt intelligence powered cybersecurity. When you have millions in revenue on the line like the Red Sox, you can’t afford to ignore intelligence.
  |  By Centripetal
We are proud to announce that we have won three prestigious Cybersecurity Excellence Awards! Join us in congratulating Jess Parnell for being named CISO of the Year. We are also honored to be recognized for: Most Innovative Cybersecurity Company Intelligence Powered Cybersecurity These awards showcase our unwavering commitment to excellence and innovation in cybersecurity. Thank you to our incredible team and the Centripetal community for their hard work and support. Together, we will continue to push the boundaries of cybersecurity to build a secure digital future.
  |  By Centripetal
Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.
  |  By Centripetal
Patents are imperative to innovation as they recognize the success of inventions. But the weakening of their rights leaves companies spending more on legal, instead of research, marketing, sales and market expansion. And ultimately, impeding progress. How can patent law evolve to better help invent the future? #InnovationFriday.
  |  By Centripetal
Across all industries, the incentive for legacy companies to challenge patents, has increased. Why? Because it's proven to be a valuable tactic in slowing or stopping competitors - ultimately impeding innovation as these disruptive companies are forced to spend significant money defending themselves. The impact? According to @Harvard Business Review so-called patent trolls cost defendants an average of $29B per year.
  |  By Centripetal
How can the MITRE ATT&CK Framework help security teams with individuals of differing technical levels and roles easily understand an attack?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
On this inaugural episode of The Cycle, Bob Gourley, Co-Founder and CTO of OODA Loop, speaks on the current global threat landscape - demonstrating both the risks and opportunities for businesses. In addition to the strategic actions business can take to mitigate risks through automation, decision making and more - he dives deep into the geopolitical realities currently being faced and provides actionable recommendations for decision makers.
  |  By Centripetal
Most small businesses handle cybersecurity by crossing their fingers. They don't think they need it until they get hacked. But it doesn't matter if you're a one man shop or a big enterprise company. And while Walt & Company is a small organization, their clients are multibillion dollar global companies operating around the world. Their businesses are critically important and thus the security of their digital assets are critically important to them. So how can a company stay ahead of the curve when it comes to cybersecurity?
  |  By Centripetal
Chuck Veth, CEO of CVM, and his team, advise leaders in manufacturing, finance, education, pharmaceuticals, food service, and more on solutions to protect their networks. Their customers trust that they have their best interest at heart and that when they advise them, it's advising them as mentors and not just as salespeople. In today's world, your network is vulnerable to people all around the globe. And they're patient, slowly finding more and more information, so when they actually perform the attack, it's debilitating. It's not just a bunch of encrypted files.
  |  By Centripetal
Even large, global firms with enormous IT budgets are falling victim to the latest attacks. Why? Because cybercriminals know that popular network inspection and threat intelligence solutions can't keep up with the deluge of attacks hammering at our networks daily. But there is hope! By evolving from traditional threat intelligence to ThreatOps, we can put an end to ransomware and proactively shield your business from 99% of global threats mapped by the threat intelligence community automatically.

A global leader in intelligence powered cybersecurity, we are operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies.

The CleanINTERNET® service works at machine speed and massive scale to shield your business from globally identified cyber threats, preventing costly breaches.

CleanINTERNET® enables businesses of any size and budget to take advantage of every threat feed monitored by the global threat intelligence community to systematically shield against all known threats and provide a reliable zero trust cybersecurity solution.

Delivered as a service that includes experienced threat analysts, CleanINTERNET will act as a seamless and invaluable extension to your existing operations teams.