Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


01:35 PM
Dark Reading
Dark Reading
Products and Releases

nCircle Announces Support For CyberScope Continuous Monitoring Requirements And Report Formats

nCircle customers can automatically produce CyberScope-formatted reports and automate the FISMA submission process

SAN FRANCISCO—January 12, 2011—nCircle, the leader in security and compliance auditing solutions today announced support for the US Federal government’s CyberScope continuous monitoring and reporting requirements. With this new functionality, nCircle customers can automatically produce CyberScope-formatted reports and automate the FISMA submission process. nCircle’s CyberScope support is delivered in advance of the monthly submission deadline of January 31, 2011.

CyberScope is a US Federal government collection tool designed to automate the way government agencies submit their FISMA audit results to the Office of Management and Budget (OMB). CyberScope standardizes report formats and improves security over the previously manual paper and email-driven methods. CyberScope also creates a central repository for the report results, enabling in-depth data mining.

Government agencies using the nCircle IP360 vulnerability management solution and nCircle Configuration Compliance Manager can now export CyberScope formatted reports for configuration, vulnerability and inventory purposes. The new functionality enables agencies to automate the reports and make it easy to upload them to CyberScope monthly or as often as necessary, which helps agencies meet OMB’s requests for continuous monitoring and more frequent reporting.

“OMB is driving agencies to achieve a more continuous view of their security risk and compliance challenges through the requirement for monthly reports. Automating the submission process via Cyberscope will undoubtedly help make the FISMA reporting process more automated and less burdensome for agencies who are ready to comply,” noted Keren Cummins, nCircle's Director, Federal Market. “nCircle is committed to comprehensive and ongoing support for OMB’s security and compliance efforts and our new CyberScope report and automation capabilities are a clear reflection of that support.”

About nCircle Suite360 nCircle's solutions includes IP360™ for vulnerability management and risk management, WebApp360™ for web application vulnerability auditing, Configuration Compliance Manager™ (CCM) for configuration auditing of servers, desktops and network devices and file integrity monitoring, and Suite360 Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics. nCircle Suite360 includes policies for NIST, CIS benchmarks, Microsoft, Oracle, VMware, HIPAA, Sarbanes-Oxley, FDCC, DISA STIG, ISO 27001 and more, enabling organizations to efficiently determine the security and compliance of their networks.

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,500 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-11-17
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
PUBLISHED: 2019-11-17
An issue was discovered in Xorux Lpar2RRD 6.11 and Stor2RRD 2.61, as distributed in Xorux 2.41. They do not correctly verify the integrity of an upgrade package before processing it. As a result, official upgrade packages can be modified to inject an arbitrary Bash script that will be executed by th...
PUBLISHED: 2019-11-17
An integer overflow in the search_in_range function in regexec.c in Oniguruma 6.x before 6.9.4_rc2 leads to an out-of-bounds read, in which the offset of this read is under the control of an attacker. (This only affects the 32-bit compiled version). Remote attackers can cause a denial-of-service or ...
PUBLISHED: 2019-11-17
iTerm2 through 3.3.6 has potentially insufficient documentation about the presence of search history in com.googlecode.iterm2.plist, which might allow remote attackers to obtain sensitive information, as demonstrated by searching for the NoSyncSearchHistory string in .plist files within public Git r...
PUBLISHED: 2019-11-17
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.