Kenny Cushing, NetCentrics: “cyberattacks can have ripple effects beyond intended targets”

As the attack surface expands, visibility of the complete landscape is essential to keep an organization’s digital assets safe.

With remote work becoming the new normal, keeping track of all the workload, devices, applications, and domains scattered around the company network becomes an even more difficult task. And while some organizations rush to secure their assets across all environments, according to our guest, enterprises often underestimate how interconnected their systems and domains actually are.

Cybernews invited Kenny Cushing, the CEO of NetCentrics – a company securing assets across cloud, on-prem, and hybrid environments, to discuss what he sees as the most important cybersecurity concerns.

Let’s go back to when it all started. How did NetCentrics originate?

NetCentrics was founded in 1995. We were among the first private companies to support U.S. national defense efforts in the then-emerging digital space. Our specialties are cybersecurity, enterprise IT, and telecommunication services using leading-edge technologies to secure our nation. We develop solutions for the U.S. Department of Defense (DoD), Department of Homeland Security (DHS), Federal Civilian Agencies, and the Intelligence Community.

We recently announced the launch of our flagship product, Wraith™, a software as a service (SaaS) cybersecurity solution. What makes it different from other solutions is that Wraith™ protects across three domains – on-cloud, on-prem, and hybrid environments – all-in-one. This is crucial in a world that is interconnected, and other products only operate in one of those environments.

Can you introduce us to what you do? What are the main challenges you help navigate?

Wraith™ solves the problems presented when securing assets across very different environments. Our solution is a lightweight, modular, multi-cloud architecture that deploys quickly and operates invisibly, hence its name.

Specifically, Wraith™ provides end-to-end connectivity protected by crypto tunneling, enabling near-instant capability deployments across geographically separated locations.

At NetCentrics, you call yourself ​​mission-focused. Would you like to share more about your vision?

NetCentrics’ mission is to Secure Our Nation. Our services support the most mission-critical initiatives surrounding national security and other federal government agencies. Our work is central to operations in no-fail environments.

Being mission-oriented also influences how we view our company culture. We are mission first, people always. We embrace teamwork and act with purpose. Each of us actively works on improving our individual eminence through continued learning, daily habits, and weekly reflection.

Have you noticed any new techniques used by threat actors emerge as a result of the recent global events?

Yes, but I’ll refrain from discussing details. I think the important thing to underscore is how interconnected all of us are by technology. Cyberattacks can have ripple effects beyond intended targets, so it’s imperative that our systems are protected. That’s at its core what we do at NetCentrics.

What enterprise security issues do you think are often overlooked but could pose a significant threat to one’s company?

The biggest security issue for enterprises is underestimating how systems are connected to the domains, and the need to protect digital assets in all of them. For example, a typical company will have everything from local endpoints like smartphones, to on-premise data and software, to cloud-based storage and compute power to manage and protect. All of these systems are interconnected. Yet, security measures often look at these elements in silos instead of as ecosystems. That’s why a solution like Wraith™ is so successful – it provides one cybersecurity solution fluent in all of these domains.

In your opinion, should small businesses and large companies approach cybersecurity differently?

No. Cybersecurity best practices are universal. What’s different is the scale, and the potential for damage should a company be breached. Businesses should consider what’s truly at risk and what’s at stake if damage occurs, and act accordingly. Size doesn’t matter, risk assessment does.

What cyber threats do you find the most concerning at the moment?

The current war in Ukraine is, without a doubt, worrisome. I believe we’ll see more cyber-related attacks, driven first by the usual bad actors, but also potentially ensnaring others on both sides of this war. Retaliation for sanctions is a very real possibility. No country is immune.

Additionally, what security measures are crucial to combat these threats?

It’s never been more important to protect digital infrastructure. We have to prioritize this down to the individual level, doing what we can to minimize our personal exposure to risk. Basic security practices and vigilance are required.

Tell us, what’s next for NetCentrics?

We continue to expand and refine Wraith™’s capabilities to meet unique customer missions and requirements. Now is the time to really push to get this solution in place. The urgency is more apparent with every passing day.

Leave a Reply

Your email address will not be published. Required fields are markedmarked