Find additional Electroblogs using the search box below.
by Andrew Seymour
Antivirus software is a critical (but sometimes irritating) program. Luckily, it is less annoying than it once was. For the most part, people no longer think about antivirus programs when using their computer — unless, of course, they haven’t registered…
by Mike Tillman
Certain designations set individuals apart. A Ph.D., a C-level title and a Nobel prize are a few examples. So it is with business organizations, too.
For government contractors, being certified as meeting all the requirements of relevant…
by Jeanne Zepp
Moving federal agencies to a zero trust model is a complex effort comprising many moving parts. A simple read of Executive Order (EO) 14028 and Office of Management and Budget (OMB) Memorandum 22-09 highlights the vast array of challenges the proposition…
by Peter Martini
Office of Management and Budget Circular A-123 requires that federal agencies conduct risk assessments of their operational…
by Allan Watkins
The National Institute of Standards and Technology (NIST) estimates there are nearly 5 million Personal Identity Verification (PIV) cards in existence today. This credential serves as a form of multifactor authentication for federal employees and…