Viewing posts tagged cybersecurity
Gray Tier Technologies continues the positive trend in January and February 2017. By the end of February Gray Tier will add 5 new employees to its staff, mostly to the JSP-DCO effort. Gray Tier Technologies continues to focus on highly technical talent which will assist the Pentagon Computer Incident Response Team as Cyber Intelligent Analysts and Incident Handlers. We are excited to introduce Andrei Watts, Sergio Capp, Wynoka Munlyn, Brandon Burrell, & Matt Krieger to the Gray Tier Family.
Gray Tier Technologies LLC was on the winning team that won a task order through the Department of Defense Joint Service Provider program to develop and deploy an in-depth security network strategy that will deter and neutralize malicious activities for various offices within the Pentagon. The $114 million task order was awarded under the CIO-SP3 contract vehicle, and has a period of performance over four and a half years.
Gray Tier Technologies LLC was on the winning team which won The General Services Administration and USCYBERCOM announced the Multiple Award, Indefinite Delivery, Indefinite Quantity (MA-IDIQ) contract, which is valued at up to $460 million, on Friday, May 20. Vencore also received the first task order under the contract, valued at $89 million, and will begin performing the work in June. Congratulations Team!
At Gray Tier, would like to reshape how network defense strategies are thought about. Network security policies are usually an afterthought. Put up some firewalls over here, sprinkle some IDS over there; maybe a host based monitoring system and presto - secured! Being compliant is not the same as being secure. No longer can an organization go through this robotic thinking of network security and assume that is good enough. Recently more companies are conducting penetration tests either by internal teams or external companies as a service. The issue with network penetration testing is that this assessment is only a snapshot in time of the organization's network security posture. As soon as something is changed within the network, is the previous assessment still valid? Networks are by nature complex systems-of-systems, and it’s very difficult to know if there are second or third order effects to adding, removing, or changing one of those systems. Moreover, your network might be secure, but are your business partners network’s secure? What kind of trust relationships do you have with them (e.g. Target)?