Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/18/2011
01:35 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

nCircle Announces Support For CyberScope Continuous Monitoring Requirements And Report Formats

nCircle customers can automatically produce CyberScope-formatted reports and automate the FISMA submission process

SAN FRANCISCO—January 12, 2011—nCircle, the leader in security and compliance auditing solutions today announced support for the US Federal government’s CyberScope continuous monitoring and reporting requirements. With this new functionality, nCircle customers can automatically produce CyberScope-formatted reports and automate the FISMA submission process. nCircle’s CyberScope support is delivered in advance of the monthly submission deadline of January 31, 2011.

CyberScope is a US Federal government collection tool designed to automate the way government agencies submit their FISMA audit results to the Office of Management and Budget (OMB). CyberScope standardizes report formats and improves security over the previously manual paper and email-driven methods. CyberScope also creates a central repository for the report results, enabling in-depth data mining.

Government agencies using the nCircle IP360 vulnerability management solution and nCircle Configuration Compliance Manager can now export CyberScope formatted reports for configuration, vulnerability and inventory purposes. The new functionality enables agencies to automate the reports and make it easy to upload them to CyberScope monthly or as often as necessary, which helps agencies meet OMB’s requests for continuous monitoring and more frequent reporting.

“OMB is driving agencies to achieve a more continuous view of their security risk and compliance challenges through the requirement for monthly reports. Automating the submission process via Cyberscope will undoubtedly help make the FISMA reporting process more automated and less burdensome for agencies who are ready to comply,” noted Keren Cummins, nCircle's Director, Federal Market. “nCircle is committed to comprehensive and ongoing support for OMB’s security and compliance efforts and our new CyberScope report and automation capabilities are a clear reflection of that support.”

About nCircle Suite360 nCircle's solutions includes IP360™ for vulnerability management and risk management, WebApp360™ for web application vulnerability auditing, Configuration Compliance Manager™ (CCM) for configuration auditing of servers, desktops and network devices and file integrity monitoring, and Suite360 Intelligence Hub™ for IT governance, risk and compliance (ITGRC) reporting and analytics. nCircle Suite360 includes policies for NIST, CIS benchmarks, Microsoft, Oracle, VMware, HIPAA, Sarbanes-Oxley, FDCC, DISA STIG, ISO 27001 and more, enabling organizations to efficiently determine the security and compliance of their networks.

About nCircle nCircle is the leading provider of automated security and compliance auditing solutions. More than 4,500 enterprises, government agencies and service providers around the world rely on nCircle's proactive solutions to manage and reduce security risk and achieve compliance on their networks. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. Additional information about nCircle is available at www.ncircle.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13864
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
CVE-2020-13865
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
CVE-2020-11696
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
CVE-2020-11697
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
CVE-2020-13646
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.