The Empower & Protect Blog

Cybersecurity and information technology insights from Telos industry experts.

10/01/2014

Landing in Arlington for the ACI-NA Public Safety & Security Conference

Dawn Lucini director business development aviation security Telos ID
We look forward to seeing you during the ACI-NA Public Safety & Security Conference, October 6-9, 2014 in Arlington, VA. Telos ID is proud to be an Associate Member of ACI-NA, which is the authoritative voice of U.S. airports, representing airport members that enplane 95 percent of all domestic and virtually all the international airline passengers and cargo traffic in North America.
09/30/2014

How Access Management and Control Can Help You Detect and Thwart Insider Threats

Download our executive report: The Snowden Incident: Lessons Learned in Access Management and Information Security
09/23/2014

CyberWhat? CyberPatriot!

J Klemens 2011sm
The shortage of cybersecurity professionals has been well documented, and it impacts not only our national security but also corporations and individuals as they connect to the Internet as any number of recent instances document. Having been involved in computer security since 1991, this topic is near and dear to my heart.
09/03/2014

Vigilance

Steve Horvath
Just as individuals shouldn’t rely solely on their banks’ fraud-monitoring alerts for financial protection, so cybersecurity personnel shouldn’t rely solely on tools like network or host intrusion detection to let them know when something is amiss with information resources. We need to take an active, hands-on role in ensuring the protection of our networks.
08/20/2014

Preview: AFCEA Technology & Cyber Day at Tinker Air Force Base

On Thursday, August 21, 2014 the AFCEA Oklahoma City Chapter will host the 10th Annual Information Technology & Cyber Security Day at Tinker Air Force Base.
08/19/2014

How Access Management and Control Can Help You Avoid a Target-like Security Breach

If America’s #2 discount retailer is vulnerable, so are we all. Download our executive report: “The Target Breach: An Expensive Cautionary Tale in Access Management and Information Security”
08/04/2014

Cybersecurity and a Box of Crayons

Capasso Paul 5x7
I recently rediscovered the classic children’s book, “Harold and the Purple Crayon.”  I remember reading this to my children when they were younger.  It brought to mind how imaginative, resourceful, and creative children are when solving problems…
07/29/2014

Telos ID Looks Forward To Seeing You at the Florida Airports Council 45th Annual Conference & Exposition

Dawn Lucini director business development aviation security Telos ID
Telos ID will be attending and exhibiting during the FAC 45th Annual Conference & Exposition, August 3-6, 2014, in Jacksonville, FL.
07/07/2014

Cybersecurity isn’t the same thing as information assurance.

Is a paper shredder really a cybersecurity solution?
06/30/2014

The Inevitability of Change - Transitioning to the NIST Risk Management Framework

Hugh Barrett
The information security field has gone through a number of significant changes in its processes and technologies over the past 20 years. Change can be hard — but sometimes change has a long-term benefit that isn’t obvious at first. The latest change in the DoD infosec environment is the transition from DIACAP to the NIST risk management framework announced last March.
1 2 315
Showing 110 of 141 Items