Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Are Two Antivirus Programs Better Than One? December 14, 2022

by Andrew Seymour

Antivirus software is a critical (but sometimes irritating) program. Luckily, it is less annoying than it once was. For the most part, people no longer think about antivirus programs when using their computer — unless, of course, they haven’t registered…

read more
Blog
Maturity Matters in Federal Contracting December 01, 2022

by Mike Tillman

Certain designations set individuals apart. A Ph.D., a C-level title and a Nobel prize are a few examples. So it is with business organizations, too.

For government contractors, being certified as meeting all the requirements of relevant…

read more
Blog
Updates Underway to the NIST Cybersecurity Framework November 10, 2022

by Vince Johnson

The National Institute of Standards and Technology (NIST) initially released the Cybersecurity Framework (CSF) in 2014. The Framework’s use is voluntary for industry, but…

read more
Blog
Federal Agencies Now Must Comply with NIST Guidance on Third-Party Software November 02, 2022

by Jeanne Zepp

Moving federal agencies to a zero trust model is a complex effort comprising many moving parts. A simple read of Executive Order (EO) 14028 and Office of Management and Budget (OMB) Memorandum 22-09 highlights the vast array of challenges the proposition…

read more
Blog
How to Improve Risk Assessments? Start by Untangling Cause, Risk and Impact October 26, 2022

by Peter Martini

Office of Management and Budget Circular A-123 requires that federal agencies conduct risk assessments of their operational…

read more
Blog
The PIV Card: One Key to Keeping Our World Safe From Malicious Attacks September 28, 2022

by Allan Watkins

The National Institute of Standards and Technology (NIST) estimates there are nearly 5 million Personal Identity Verification (PIV) cards in existence today. This credential serves as a form of multifactor authentication for federal employees and…

read more
Blog
Top