I recently rediscovered the classic children’s book, “Harold and the Purple Crayon.” I remember reading this to my children when they were younger. It brought to mind how imaginative, resourceful, and creative children are when solving problems…
The information security field has gone through a number of significant changes in its processes and technologies over the past 20 years. Change can be hard — but sometimes change has a long-term benefit that isn’t obvious at first. The latest change in the DoD infosec environment is the transition from DIACAP to the NIST risk management framework announced last March.
The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy showcasing our cybersecurity, mission planning, and network security solutions at three different events, from Baltimore, DC, all the way to San Antonio, Texas.
With the increase of high profile cybersecurity events, it is no wonder that cyber insurance has become more mainstream, even said to be “the fastest growing area of insurance.” But unlike traditional types of insurable events, there is range of impact associated with cybersecurity breaches
Installing agents on your workstations and servers is the most efficient and reliable way to understand asset configuration, which is essential for determining susceptibility to vulnerabilities such as HeartBleed.