Find additional Electroblogs using the search box below.
by Sean McGinnis
The National Institute of Standards and Technology (NIST) released the Second Public Draft of Special Publication 800-63, Revision 4 (SP 800-63 Rev 4),…
by Peter Martini
“We failed him,” said our Command Sergeant Major when our organization’s commander was not selected for promotion. In an instant, I moved from empathy to introspection and began a journey of asking, “Am I responsible for my boss’s success, and, if so, how…
by Seth Berger
Perhaps no concept has been more influential since the invention of computing technology than artificial intelligence (AI). AI has had a significant impact on every industry, as it can automate many tasks that were previously performed by humans.
It…
by Retired Air Force Lt. Gen. William Bender
Federal Chief Information Security Officers (CISOs) operate in an increasingly complex threat landscape. To be effective, they cannot rely on a single cybersecurity approach.
To strengthen cyber resilience, CISOs require…
by Francisco Jauregui
As contractors, we work to meet or exceed our customers’ expectations. We focus on requirements, metrics, schedules, and, of course, budgets. We work hard to always provide exceptional customer service. It’s what I’ve been doing for years as a…
by Cecil Dildine
The principle of least privilege (POLP) is a base concept of the Zero Trust (ZT) security model. It operates on the premise of "never trust, always verify."
Did you know that "trust but verify" is an old Russian proverb that President Ronald Reagan…