The Empower & Protect Blog

Cybersecurity and information technology insights from Telos industry experts.

07/07/2014

Cybersecurity isn’t the same thing as information assurance.

Is a paper shredder really a cybersecurity solution?
06/30/2014

The Inevitability of Change - Transitioning to the NIST Risk Management Framework

The information security field has gone through a number of significant changes in its processes and technologies over the past 20 years. Change can be hard — but sometimes change has a long-term benefit that isn’t obvious at first. The latest change in the DoD infosec environment is the transition from DIACAP to the NIST risk management framework announced last March.
06/23/2014

Kick Off the Summer with Three Cybersecurity, Innovation, and Emerging Technology Events

The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy showcasing our cybersecurity, mission planning, and network security solutions at three different events, from Baltimore, DC, all the way to San Antonio, Texas.
06/18/2014

Cyber Insurance Could Benefit from A&A and Continuous Monitoring Processes

With the increase of high profile cybersecurity events, it is no wonder that cyber insurance has become more mainstream, even said to be “the fastest growing area of insurance.” But unlike traditional types of insurable events, there is range of impact associated with cybersecurity breaches
05/14/2014

Cyber Sirens: Enchanting But Deadly

Underneath the 1’s and 0’s traversing the Internet rests an underbelly no one wants to talk about. We must always be on our guard when it comes to Internet security. 
05/06/2014

The HeartBleed Data Call: Were You Ready?

Installing agents on your workstations and servers is the most efficient and reliable way to understand asset configuration, which is essential for determining susceptibility to vulnerabilities such as HeartBleed.
04/21/2014

Coordination & Collaboration for Successful Emergency Planning, Response & Relief

Effective coordination and collaboration during planning, response, and recovery phases of an emergency can give public and private sector entities the ability to minimize loss of life and property... but the planning needs to start now, before the next emergency strikes.
04/15/2014

FIPS 201-2 and Public Key Encryption Technology

Lisa-Kimball
Last August, NIST released FIPS 201-2, the latest version of their standard for secure PIV (Personal Identity Verification) credentials. The new standard introduces some concepts that are redolent of collaborative credentialing and symbiotic security, so I thought it would be useful to take a look at some of those new concepts.
04/08/2014

Telos Demonstrates SE7EN Mission Planner at Marine South 9 - 10 April

Marine South is a unique opportunity for industry to showcase cutting edge technologies that support the dynamic nature of the Marine Corps mission.
03/31/2014

Continuous Monitoring: Agents vs Vulnerability Scanners

Telos CSO and CTO Rick Tracy
Telos recently launched a product called Xacta Continuum™.  It’s an evolution of a product that Telos developed more than ten years ago. We called that product Xacta Continuous Assessment and it was designed to help automate testing of certain security controls associated with system certification.
1 2 314
Showing 110 of 133 Items