The Empower & Protect Blog

Cybersecurity and information technology insights from Telos industry experts.


Turning Active Directory to Your Advantage for Fine-grained Identity and Access Management

When leveraging Active Directory to address enterprise identity and access control, having a flexible, standards-based platform greatly reduces cost, complexity, and risk.

Death, Taxes, and Getting Hacked... Just Part of Life

Every organization — large and small — is a potential target.

Coming Up: A New and Exciting Alamo AFCEA Gathering

Looking Forward to San Antonio’s Alamo AFCEA Conference and Expo. We’ll see you next week, October 27-30, at the Telos Booth - #30/31

IoT Standardization: Changing the Game

IoT is more than just technology hype. It’s predicted to continue to gain ground in the next five years or so, seamlessly integrating cloud, Big Data, wearable technology, and ubiquitous computing, among others, thereby spurring on the era of a hyper-connected world.

What keeps a CSO awake at night?

Telos CSO and CTO Rick Tracy
Are you a CSO or security professional? What keeps you awake at night?

Landing in Arlington for the ACI-NA Public Safety & Security Conference

Dawn Lucini director business development aviation security Telos ID
We look forward to seeing you during the ACI-NA Public Safety & Security Conference, October 6-9, 2014 in Arlington, VA. Telos ID is proud to be an Associate Member of ACI-NA, which is the authoritative voice of U.S. airports, representing airport members that enplane 95 percent of all domestic and virtually all the international airline passengers and cargo traffic in North America.

How Access Management and Control Can Help You Detect and Thwart Insider Threats

Download our executive report: The Snowden Incident: Lessons Learned in Access Management and Information Security

CyberWhat? CyberPatriot!

J Klemens 2011sm
The shortage of cybersecurity professionals has been well documented, and it impacts not only our national security but also corporations and individuals as they connect to the Internet as any number of recent instances document. Having been involved in computer security since 1991, this topic is near and dear to my heart.


Steve Horvath
Just as individuals shouldn’t rely solely on their banks’ fraud-monitoring alerts for financial protection, so cybersecurity personnel shouldn’t rely solely on tools like network or host intrusion detection to let them know when something is amiss with information resources. We need to take an active, hands-on role in ensuring the protection of our networks.

Preview: AFCEA Technology & Cyber Day at Tinker Air Force Base

On Thursday, August 21, 2014 the AFCEA Oklahoma City Chapter will host the 10th Annual Information Technology & Cyber Security Day at Tinker Air Force Base.
1 2 315
Showing 110 of 146 Items