The Empower & Protect Blog

Cybersecurity and information technology insights from Telos industry experts.



Just as individuals shouldn’t rely solely on their banks’ fraud-monitoring alerts for financial protection, so cybersecurity personnel shouldn’t rely solely on tools like network or host intrusion detection to let them know when something is amiss with information resources. We need to take an active, hands-on role in ensuring the protection of our networks.

Preview: AFCEA Technology & Cyber Day at Tinker Air Force Base

On Thursday, August 21, 2014 the AFCEA Oklahoma City Chapter will host the 10th Annual Information Technology & Cyber Security Day at Tinker Air Force Base.

How Access Management and Control Can Help You Avoid a Target-like Security Breach

If America’s #2 discount retailer is vulnerable, so are we all. Download our executive report: “The Target Breach: An Expensive Cautionary Tale in Access Management and Information Security”

Cybersecurity and a Box of Crayons

I recently rediscovered the classic children’s book, “Harold and the Purple Crayon.”  I remember reading this to my children when they were younger.  It brought to mind how imaginative, resourceful, and creative children are when solving problems…

Telos ID Looks Forward To Seeing You at the Florida Airports Council 45th Annual Conference & Exposition

Telos ID will be attending and exhibiting during the FAC 45th Annual Conference & Exposition, August 3-6, 2014, in Jacksonville, FL.

Cybersecurity isn’t the same thing as information assurance.

Is a paper shredder really a cybersecurity solution?

The Inevitability of Change - Transitioning to the NIST Risk Management Framework

The information security field has gone through a number of significant changes in its processes and technologies over the past 20 years. Change can be hard — but sometimes change has a long-term benefit that isn’t obvious at first. The latest change in the DoD infosec environment is the transition from DIACAP to the NIST risk management framework announced last March.

Kick Off the Summer with Three Cybersecurity, Innovation, and Emerging Technology Events

The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy showcasing our cybersecurity, mission planning, and network security solutions at three different events, from Baltimore, DC, all the way to San Antonio, Texas.

Cyber Insurance Could Benefit from A&A and Continuous Monitoring Processes

With the increase of high profile cybersecurity events, it is no wonder that cyber insurance has become more mainstream, even said to be “the fastest growing area of insurance.” But unlike traditional types of insurable events, there is range of impact associated with cybersecurity breaches

Cyber Sirens: Enchanting But Deadly

Underneath the 1’s and 0’s traversing the Internet rests an underbelly no one wants to talk about. We must always be on our guard when it comes to Internet security. 
1 2 314
Showing 110 of 138 Items