When evaluating software, business units need to evaluate not only whether the solution meets their business needs, but also whether it meets the security requirements of the organization. Based on the security of the offering, the risk of using the software or service may prove too high.
Over the past three years, I have watched an unbelievably dysfunctional Washington (Congress and the Administration) fail to put aside political grudges and find a way to work together, forge consensus and compromise, and perform their most basic ...
As the complexity of a software development project increases, there is a greater need for the development team to tighten integration, collaboration, and planning to control each step of the process. The practice of “continuous integration” ...
This week the 16th annual Cyberspace Symposium will convene in Colorado Springs, and expects some 1300 attendees among its communities of interest, USG/DoD, corporate sponsors and exhibitors. This three-day event will host nationally recognized industry and government keynote speakers and interactive panel discussions addressing the critical technology and security issues facing our nation.
As a nation, especially during this time of fiscal uncertainty, we should start 2014 by insisting on a cybersecurity innovation call to arms. Innovation birthed this great nation and is key to the future of our national security and economic interests.
What are the most important cybersecurity or IT challenges facing civilian and intel agencies, the DoD, and commercial enterprises in the coming year? Telos subject matter experts offer their insights in this 2014 preview.
Microsoft’s latest operating system isn’t just a revamped version of its predecessor. While the new user interface draws the bulk of the attention, new and improved security features have also been added to Windows 8 and 8.1.
On the internet highway, there is often unspoken -- but also unwarranted -- trust between individuals, the confidence that another person will do the right thing or that technology will function correctly within the cyber domain. Today we often operate with blind trust, hedging our bets on the success of state-of-the-art defensive strategies, tools and strengths of the human being.