Reston, VA, USA
2009
  |  By Centripetal
In April 2025, a logistics firm suffered a breach that followed a pattern security teams are seeing with increasing frequency—one that began with a single forgotten API. It wasn’t a zero-day exploit, or a sophisticated nation-state intrusion. It was an exposed development endpoint—one that had quietly been left online long after its purpose was served.
  |  By Centripetal
Today, most security reporting is trapped in a defensive cycle: detect a threat, react to it, report how serious it was. Rinse and repeat. The problem? Executive fatigue. Boards and leadership teams are tired of hearing about noise. They don’t want another dashboard of inbound attacks. They want to understand how cybersecurity protects revenue, sustains operations, and strengthens governance. It’s time to stop reporting on threats—and start reporting on business continuity.
  |  By Eamonn Larkin
When we analyzed Ireland's critical national infrastructure (CNI) through an intelligence lens, the findings were sobering. Of 222 CNI organizations examined, 98—nearly 44%—have exposed known vulnerabilities. We then analyzed whether these open doors were being actively exploited by threat actors. Ireland is home to 15,776 attack origins, and 85% of them are the very same IPs and networks in CNI organizations with those exposed known vulnerabilities.
  |  By Lauren Farrell
You’ll notice things look different. Because the world you’re defending has changed—and so have the stakes. Every breach proves the same thing: the tools you’ve been given aren’t enough. Firewalls let attacks through. “Next-gen detection” leaves you drowning in alerts after the fact. Threat intelligence is treated like a forensic tool, not a preventative defense.
  |  By Lauren Farrell
Modern cyber threats are increasingly stealthy. A favorite tactic? DNS tunneling—a method used to bypass traditional network security controls by hiding malicious traffic inside DNS queries and responses. This can be done by embedding or encoding command and control instructions or data within subdomains or DNS record fields like TXT, CNAME or other rarely used record types.
  |  By Lauren Farrell
Cybercriminals don’t need to be sophisticated. They just need the opportunity—and in Ireland, there’s still too much low-hanging fruit. Many of the vulnerabilities being exploited across Irish networks today aren’t new. They’re years old. Attackers are taking advantage of outdated systems that haven’t been patched, relying on free, off-the-shelf tools to scan for weaknesses—and finding them far too easily. This isn’t a theoretical risk.
  |  By Lauren Farrell
If you’ve done everything you can think of to stay protected — patched systems, trained employees, upgraded tools — but the number of threats still keep increasing, you’re not alone. You’re not behind. You’re not unprepared. But you may be operating on outdated assumptions. For small and midsize businesses, the real danger isn’t just what attackers are doing—it’s the cybersecurity myths you’ve been told to believe. The ones that seem logical.
  |  By Lauren Farrell
On June 25, 2025, Cisco disclosed two critical vulnerabilities affecting Cisco Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC). Tracked as CVE-2025-20281 and CVE-2025-20282, these flaws enable unauthenticated remote attackers to execute arbitrary commands as the root user via exposed HTTPS APIs. CVE-2025-20281 arises from insufficient validation of user-supplied input in a public API, allowing crafted requests to trigger remote code execution.
  |  By Centripetal
The cybersecurity landscape has undergone dramatic transformation since the early days of the Internet. What began as a revolutionary communication platform has evolved into a complex battleground where defenders struggle to keep pace with increasingly sophisticated threats. Understanding this evolution is crucial for organizations seeking to regain the defender’s advantage in an era of exponential digital growth.
  |  By Lauren Farrell
Processing a million IOCs was once groundbreaking. Today, we’ve achieved something revolutionary: CleanINTERNET 6.0 Horizon. Our newest release of CleanINTERNET processes over ten billion IOCs with sextillion-range decisions per second at wire speed, that is 10x the previous capacity. Watch The Future of Your Defense to learn more about CleanINTERNET 6.0 Horizon This isn’t incremental improvement—it’s a complete reimagining.
  |  By Centripetal
We are proud to announce that we have won three prestigious Cybersecurity Excellence Awards! Join us in congratulating Jess Parnell for being named CISO of the Year. We are also honored to be recognized for: Most Innovative Cybersecurity Company Intelligence Powered Cybersecurity These awards showcase our unwavering commitment to excellence and innovation in cybersecurity. Thank you to our incredible team and the Centripetal community for their hard work and support. Together, we will continue to push the boundaries of cybersecurity to build a secure digital future.
  |  By Centripetal
Our mission is to build a secure digital world - but when we think about the future, we realize it can't happen without intelligence. Today, cyber threats haven't been tamed, and to get to a point that they are, involves a collective effort globally to solve for them. How? By thinking differently. Join us in building a future in which neutralizing cyber threats is the norm as our security solutions protect us.
  |  By Centripetal
Patents are imperative to innovation as they recognize the success of inventions. But the weakening of their rights leaves companies spending more on legal, instead of research, marketing, sales and market expansion. And ultimately, impeding progress. How can patent law evolve to better help invent the future? #InnovationFriday.
  |  By Centripetal
Across all industries, the incentive for legacy companies to challenge patents, has increased. Why? Because it's proven to be a valuable tactic in slowing or stopping competitors - ultimately impeding innovation as these disruptive companies are forced to spend significant money defending themselves. The impact? According to @Harvard Business Review so-called patent trolls cost defendants an average of $29B per year.
  |  By Centripetal
How can the MITRE ATT&CK Framework help security teams with individuals of differing technical levels and roles easily understand an attack?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
In this day and age securing data and ensuring clients are confident in their information being protected is imperative to build trust. So when integrating solutions how can you make sure that not only is data secure, but that you continue to increase bandwidth within your organization and mitigate future possible vulnerabilities?
  |  By Centripetal
On this inaugural episode of The Cycle, Bob Gourley, Co-Founder and CTO of OODA Loop, speaks on the current global threat landscape - demonstrating both the risks and opportunities for businesses. In addition to the strategic actions business can take to mitigate risks through automation, decision making and more - he dives deep into the geopolitical realities currently being faced and provides actionable recommendations for decision makers.
  |  By Centripetal
Most small businesses handle cybersecurity by crossing their fingers. They don't think they need it until they get hacked. But it doesn't matter if you're a one man shop or a big enterprise company. And while Walt & Company is a small organization, their clients are multibillion dollar global companies operating around the world. Their businesses are critically important and thus the security of their digital assets are critically important to them. So how can a company stay ahead of the curve when it comes to cybersecurity?
  |  By Centripetal
Chuck Veth, CEO of CVM, and his team, advise leaders in manufacturing, finance, education, pharmaceuticals, food service, and more on solutions to protect their networks. Their customers trust that they have their best interest at heart and that when they advise them, it's advising them as mentors and not just as salespeople. In today's world, your network is vulnerable to people all around the globe. And they're patient, slowly finding more and more information, so when they actually perform the attack, it's debilitating. It's not just a bunch of encrypted files.
  |  By Centripetal
Even large, global firms with enormous IT budgets are falling victim to the latest attacks. Why? Because cybercriminals know that popular network inspection and threat intelligence solutions can't keep up with the deluge of attacks hammering at our networks daily. But there is hope! By evolving from traditional threat intelligence to ThreatOps, we can put an end to ransomware and proactively shield your business from 99% of global threats mapped by the threat intelligence community automatically.

A global leader in intelligence powered cybersecurity, we are operationalizing the world’s largest collection of threat intelligence, in real-time, to protect organizations from every known cyberthreat through its innovative patented technologies.

The CleanINTERNET® service works at machine speed and massive scale to shield your business from globally identified cyber threats, preventing costly breaches.

CleanINTERNET® enables businesses of any size and budget to take advantage of every threat feed monitored by the global threat intelligence community to systematically shield against all known threats and provide a reliable zero trust cybersecurity solution.

Delivered as a service that includes experienced threat analysts, CleanINTERNET will act as a seamless and invaluable extension to your existing operations teams.