Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Why Are Federal Agencies Adopting RPA Now? What Are the Benefits? July 27, 2022

by Kirubeal Mandefro

According to a federal Robotic Process Automation (RPA) Community of Practice publication, RPA is “a low- to no-code Commercial Off the Shelf (COTS) technology that can automate repetitive…

read more
Blog
To Pay or Not To Pay … Is That the Ransomware Question? July 05, 2022

by Jeanne Zepp

Organizations face a complex decision when their systems are encrypted, their data exfiltrated and their operations brought to a halt. There is no universal prescription for how an organization should respond.

The Federal Bureau of Investigation,…

read more
Blog
Passing on Passwords June 09, 2022

by Jeanne Zepp

We all struggle with passwords. Creating them. Remembering them. Updating them. Protecting them. We pride ourselves in our cleverness in devising ones that go beyond “qwerty” or “12345,” believing we can outsmart hackers. Yet, one…

read more
Blog
Microsoft Released Windows Server 2022. What’s New? May 31, 2022

by Guoqing Tian

Microsoft recently released its latest server operating system (OS), Windows Server 2022, to be generally available on September 1, 2022 – nearly three years after the to-be-replaced Windows 2019 was released on October 2, 2018. It seems that Microsoft will…

read more
Blog
Are Your Shields Up? May 23, 2022

by Jeanne Zepp

The threat Russia poses to Ukraine – and the free world – is not lost on anyone. Missiles and other armament daily kill the Ukrainian people and destroy its cities, utilities, transportation hubs and more. Even before the physical invasion, Ukrainian…

read more
Blog
Operating SOCs in a Time of War April 20, 2022

by Jeanne Zepp

Cybersecurity is the buzzword of the day and a concern that’s on everyone’s mind. We are living in an age of heightened awareness precipitated most recently by the Russian invasion of Ukraine. Anticipating a transition from conventional warfare to cyber…

read more
Blog
Top