Category Archives: Risk

ApplyLogic Ranked on Inc. 5000’s Fastest Growing List for Third Year in a Row!

ApplyLogic Consulting Group, LLC is proud to announce that we have ranked on the 2017 Inc. 5000 list of America’s fastest-growing private companies. This is the third year in a row with our continued growth in the Federal Information Technology sector.

“I am excited and proud of the ApplyLogic staff as we continuously exceed customer expectations, growing the services and mission support we provide,” said Jeff Ramella, Founder and President of ApplyLogic Consulting Group, LLC.

ApplyLogic, a Virginia based, veteran owned small business, provides services and solutions such as:

  • ApplyLogic Data Analytics Portfolio Tool
  • Cloud (AWS and Azure)
  • Cybersecurity
  • Network & System Engineering
  • Project Management Solutions.

About Inc. 5000
Inc. magazine, founded in 1979 and based in New York City, is an American monthly publication focused on growing companies. The Inc.5000 is ranked according to percentage revenue growth over a four-year period. The Inc.5000 is an expansion of the previous Inc.500, which now ranks the country’s top 5000 fastest-growing private companies.

About ApplyLogic Consulting Group, LLC.
Founded in 2004, ApplyLogic is a privately held, veteran owned small business with corporate headquarters in Dunn Loring, Virginia. ApplyLogic, a Virginia based, veteran owned small business, provides services and solutions such as: ApplyLogic Data Analytics Portfolio Tool, Cloud (AWS and Azure), Cybersecurity, Network & System Engineering, Project Management solutions for the Federal Information Technology sector.

Tagged , , , , , , , , , ,

ApplyLogic Ranked on Inc. 5000’s Fastest Growing List for Second Year in a Row!

ApplyLogic Consulting Group, LLC is proud to announce that they have ranked on the 2016 Inc. 5000 list of America’s fastest-growing private companies. The company made the list for the second year in a row with its continued growth in the Federal Information Technology sector.

NEW YORK, August 17, 2016 – Inc. magazine today ranked ApplyLogic on its 35th annual Inc. 5000, the most prestigious ranking of the nation’s fastest-growing private companies. The list represents a unique look at the most successful companies within the American economy’s most dynamic segment— its independent small businesses. Companies such as Microsoft, Dell, Domino’s Pizza, Pandora, Timberland, LinkedIn, Yelp, Zillow, and many other well-known names gained their first national exposure as honorees of the Inc. 5000.

“Being on the Inc.5000’s list for the second consecutive year is a significant achievement and not possible without the support of our talented staff and customers,” said Jeff Ramella, Founder and President of ApplyLogic Consulting Group, LLC, about the inclusion of ApplyLogic on the list. “We’ve worked very hard to sustain and grow our business over the past year. It’s nice to have our results publically acknowledged on a national level.”

ApplyLogic, a Virginia based, veteran owned small business, provides tools and solutions such as:
• The ApplyLogic Data Analytics Portfolio Tool
• IT Staffing Solutions
• IT Professional Services such as Cybersecurity, Network & System Engineering and Project Management Solutions.

About Inc. 5000
Inc. magazine, founded in 1979 and based in New York City, is an American monthly publication focused on growing companies. The Inc.5000 is ranked according to percentage revenue growth over a four-year period. The Inc.5000 is an expansion of the previous Inc.500, which now ranks the country’s top 5000 fastest-growing private companies.

About ApplyLogic Consulting Group, LLC.
Founded in 2004, ApplyLogic is a privately held, veteran owned small business with corporate headquarters in McLean, Virginia. ApplyLogic, provides customers with tools and solutions such as: The ApplyLogic Data Analytics Portfolio Tool, IT Staffing, and IT Professional Services such as Cybersecurity, Network & System Engineering and Project Management solutions for the Federal Information Technology sector.

 

Tagged , , , , , , , , , ,

ApplyLogic Named To Washington Technology Fast 50

“The Fast 50 is a reflection of our commitment to providing outstanding services…in a time where mediocrity is the norm, we go above and beyond. Thanks to all our staff, partners and customers for their support,” said Jeff Ramella Founder | President  of ApplyLogic.   Read more here:  http://washingtontechnology.com/articles/2015/08/02/fast-50-intro.aspx

Tagged , , , , , ,

ISO 9001:2008 Certification

QAS ISO 9001 2008 LogoApplyLogic Consulting Group, LLC underwent a stringent evaluation process that included quality management system development, documentation review, internal audits, and internal audit training. We are pleased to announce that ApplyLogic Consulting Group was granted ISO Certification 9001:2008 by QAS International Ltd. (QAS is an established certification company that has been operating within the UK and selected international markets for over 20 years.)

ApplyLogic’s President, Jeff Ramella said, “We believe that our decision to become ISO 9001:2008 certified is proactive.  It anticipates the demands of our customers and demonstrates our commitment to provide outstanding performance.  This certification is the culmination of years of dedication, hard work, and consistent top-quality results achieved by our employees at ApplyLogic.”

ISO 9001 is a set of international standards and guidance documents for quality management and quality assurance. The standard represents an international consensus on good management practices, policies and procedures with the aim of ensuring that our organization can, time and time again, deliver the product or services that meet the customer’s quality requirements.

To maintain our certification, QAS International will perform annual audits to ensure compliance and to assess initiatives for continued improvement. This certification further strengthens our commitment to adhere to our company policies for continually improving the products and services that will meet or exceed our customers’ expectations. Our customers can be confident that ApplyLogic is dedicated to maintaining the highest effectiveness and responsiveness in achieving our goal of total customer satisfaction.

Tagged , , ,

The 4th Factor?

At ApplyLogic, company success and quality is just not measured in a two dimensional aspect for example: Scope, Cost, Schedule and Quality.  At ApplyLogic, “The 4th Factor” is our highest value, “People”.  ApplyLogic People are the greatest attributes that makes our company surpass our competition.

Tagged ,

Disruptive Age?

A quick read offers an agile perspective on resource management; shifting from plan-based to adaptive and focusing on finishing projects, instead of starting them.  http://www.slideshare.net/rallysoftware/c-connor-pmirockymtntalk

 

Tagged , , ,

What to Secure…

encryptionRecent News articles detailing the NSA surveillance monitoring has shown to extend to other countries and that of their high-level officials. A more recent article states the following:

“The U.S. monitored the phone conversations of 35 world leaders, according to a National Security Agency document provided by its former contractor, Edward Snowden, according to The Guardian newspaper.”

Although most people cannot communicate using secure phone calls, it does raise the importance that the data be what is secured, not just the mode of transport. A phone call or even Internet usage should not be considered secure. There are numerous hops and intermediary systems that connect the signal being used. Each of those points of connection are a potential point of surveillance. Add the additional discoveries regarding ATT, Verizon, and other carriers, the expectation of privacy should no longer be expected.

This means that only the data, if encrypted or secured, provides the potential expectation of privacy. Insuring securing data at rest and during transport is critical to insure privacy. It may take more time and resources, but in an age of “continuous monitoring” of everything, it is the best way to provide the assurance most people and businesses desire.

Tagged , , , , , , , , ,

IPS Grows Up But IDS On Life Support?

In the November 2012 issue of SC Magazine (Pg 26-28) titled “IPS Grows Up”, an article by Fahmida Rashid discusses some of the changing landscape for intrusion protection systems with a variety of experts. There are a variety of interesting topics and statistics regarding IPS such as the following:

While IPS won’t be able to block attacks exploiting zero-day vulnerabilities or thwart skilled adversaries using sophisticated tactics, it should “prevent 99 percent of push-button or automated attacks, Al-Abdulla says.”

While many can agree with that statement, what probably would not receive a great deal of agreement was the following statement within the article:

Holden predicts IDS will “fall by the wayside” in the next three to five years.

While it is understood that IDS is not detective rather than reactive, but one of the things that many businesses and agencies have a hard time tuning IPS in a way that there will not be any issues with mission or business critical traffic. The thought that IDS will no longer be necessary seems very short-sighted and limited. Granted most IPS devices are also IDS, but if defense in-depth is still a valid concept and that risk is a business decision, then IDS will remain in use for the foreseeable future.

Tagged , , , , , , , , , ,

Cyber Pearl Harbor or Just Cyber Space…

There has been a lot of news recently about the potential for the coming Cyber Pearl Harbor. A cyber attack that would mirror the devastation that hit the naval base in Pearl Harbor during the beginning of WWII. According to an article in CSO Magazine on October 18, 2012, the United States is concerned of a coming cyber attack. The concept of comparing the attack to Pearl Harbor has been around for several years. It wasn’t until a recent a speech by U.S. Secretary of Defense Leon Penetta in New York that this has become more of a topic.

The article states the following:

The results of cyberttacks by a hostile nation-state on critical infrastructure like transportation, water supply or the electric grid “could be a cyber Pearl Harbor — an attack that would cause physical destruction and the loss of life,” Panetta said. “In fact, it would paralyze and shock the nation and create a new, profound sense of vulnerability.”

Panetta also invoked the image of a cyberattack on the level of 9/11. “Before September 11, 2001, the warning signs were there. We weren’t organized. We weren’t ready and we suffered terribly for that lack of attention. We cannot let that happen again. This is a pre-9/11 moment,” he said.

In a follow-up article in CSO Magazine November 7th, the opposing viewpoint was brought forth. Many in the security industry feel that the concept and description of a Cyber Pearl Harbor is nothing more than hot air. Experts including Bruce Schneier have chimed in. Bruce has reduced the extent to which he believes the concept to be exaggerated but according to he article:

Critics argue argue that not only is the threat of a catastrophic cyberattack greatly exaggerated, but that the best way to guard against the multiple risks they agree exist is not with better firewalls or offensive strikes against potential attacks, but to “build security in” to the control systems that run the nation’s critical infrastructure.

Bruce Schneier, author, Chief Technology Security Officer at BT and frequently described as a security “guru,” has not backed off of his contention made at a debate two years ago that the cyber war threat “has been greatly exaggerated.” He said that while a major attack would be disruptive, it would not even be close to an existential threat to the U.S.

“This [damage] is at the margins,” he said, adding that even using the term “war” is just a, “neat way of phrasing it to get people’s attention. The threats and vulnerabilities are real, but they are not war threats.”

The reality is that it is probably somewhere in the middle of the two viewpoints. It can be likened to the Y2K issue a little over a decade ago. The world was going to come to an end and the dark ages would re-emerge. The reality was that preparation help minimize what little impact there may have been. Security is a risk decision, but most risk decisions are defensive in nature. The other decision of a preemptive cyber capability is another aspect of the decision-making that needs to be addressed. Should the U.S. begin cyber strikes on perceived threats? What is the impact of doing this on the long-term? The world has already seen a small view of what can be done with Stuxtnet and will these type of state-sponsored cyber attacks the new nuclear deterrent…that is yet to be seen.

Regardless of the direction that gets taken, business needs to look at potential cyber attacks/hacks as a real potential threat and determine what risk is willing to be accepted and what will need to be mitigated. Whether the issue is the size of a country or your home computer, measure twice, cut once is still the best direction.

Tagged , , , , , , , , , , , , , , ,
%d bloggers like this: