Contributor Biography

Home  /  Blogs  /  Contributors  /  Contributor Biography
Avatar

Automation – a Key Component to Overcoming Audit Fatigue

Rick Tracy
September 18, 2020

As organizations struggle to achieve and maintain compliance, many are on a mission to find relief. The bottom line is, when it comes to audit fatigue, there are a variety of strategies that allow you to automate one or many parts of the compliance process.

Continue Reading ...

Cybersecurity News in Review

Robert DuPree

This week’s cybersecurity news in review includes coverage on a recent breach of personal information at the Department of Veterans Affairs, as well as cyber attacks against other federal agencies, the Navy and American political operatives.

Continue Reading ...

Cloud to the Rescue for Cyber Risk Management and Compliance

Rick Tracy
August 27, 2020

Hosted, as-a-service offerings help make business operations pandemic-resistant.

Continue Reading ...

How Commercial Enterprises Benefit from Updates to NIST Special Publications

Stephen Horvath
August 6, 2020

  In a recent webinar on the upcoming final release of NIST SP 800-53 Rev. 5, NIST Fellow Dr. Ron Ross mentioned an interesting fact: private sector and international adoption of the NIST standards is on the rise. Why might that be? Personally, I think it has to do with

Continue Reading ...

How the Latest NIST Updates Help You Build a More Robust Cyber Risk Management Program

Stephen Horvath
August 4, 2020

A look back on a recent conversation with Dr. Ron Ross from NIST.

Continue Reading ...

Compliance with multiple NIST frameworks – is there an easy button?

Gianna Price
July 27, 2020

With the emergence of several IT risk management frameworks such as NIST CSF, RMF, SP 800-171, FedRAMP, and the more recent CMMC, many are asking if the general concept of reciprocity can be used to comply with several frameworks at once.

Continue Reading ...

Determining an Authorization Boundary Is a Critical First Step of Cloud Security

Milica Green
July 23, 2020

Authorization boundaries allow you to establish the scope of protection for information systems, including people, processes, and technologies.

Continue Reading ...

The NIST Cybersecurity Framework Takes the RMF from Manufactured Compliance to Enterprise Risk Management

Gianna Price
July 22, 2020

Getting to the core of the Cybersecurity Framework is the answer to maturing the RMF from manufactured compliance to organizational risk management.  If your commands and compliance teams are not talking about CSF, start asking questions.  CSF is key to success not only with the RMF but also with overall mission assurance.

Continue Reading ...

A Fresh Start for Enterprise Security and Privacy: Dr. Ron Ross Explains the Latest NIST Revisions.

John B. Wood
July 2, 2020

Last week, Dr. Ron Ross, National Institute of Standards and Technology fellow, joined Telos’ own Steve Horvath for a webinar to discuss the upcoming release of NIST Special Publication 800-53 Rev. 5, its relationship with the NIST RMF Rev. 2, as well as other prevalent cybersecurity topics. This webinar dealt with a number of topics that allowed Dr. Ross to provide some insight into the NIST way of thinking, in addition to how and why perspectives and requirements have changed over the years.

Continue Reading ...

CMMI: A Business Differentiator

Maj. Gen. Paul Capasso USAF (Ret.)
July 1, 2020

In a world of constant change, maintaining business relevancy is becoming more challenging for many organizations. To be successful in today’s environment, one must adapt or face extinction. According to the CMMI Institute, “nearly half of the organizations surveyed do not have standard processes in place that enable them to adapt quickly.”

Continue Reading ...

Five Foundational Steps to Control and Secure Your Cloud Assets

Ryan Sydlik
June 29, 2020

Cloud adoption is now ubiquitous in almost all organizations – from the smallest startups to the largest of global enterprises. To maintain relevance, let alone be able to grow in the changing technological landscape, your organization needs to embrace this transformation even with the complexity it entails.

Continue Reading ...

How to protect cyber red teams from blowing their cover.

Tom Badders
June 17, 2020

Organizations employ red teams to stress-test the security of their IT systems and the personnel who use and manage them.  The red team may be an internal unit or they may be consultants engaged from the outside. In either case, the team takes on the persona of an adversary whose mission is to find, exploit, and report on vulnerabilities in systems and people under hostile real-world conditions.  

Continue Reading ...

How Cyber Adversaries Take Advantage of our Most Vulnerable Moments

Maj. Gen. Paul Capasso USAF (Ret.)
June 8, 2020

COVID-19 and cybersecurity – who would have guessed that these two words would be spoken in the same sentence? But for our cyber adversaries, it is a common tactic out of their playbook — take full advantage of disaster-like situations and prey upon the unexpectant during their most vulnerable moments.

Continue Reading ...

TAPS’ “Love Lives On” Honors our Fallen Service Members This Memorial Day

John B. Wood
May 25, 2020

This Memorial Day, I’d like to commend our dear friends at Tragedy Assistance Program for Survivors (TAPS) for putting together Love Lives On – a beautiful album honoring both the heroes who gave their lives in service to our country and their surviving families.

Continue Reading ...

New Xacta Integration Creates a “Fast-Lane” for Azure Customers Traveling the ATO and Compliance Highway

Lisa Conway
May 18, 2020

In July 2019, Telos signed a development agreement with Microsoft to optimize Telos’ Xacta® 360 for Microsoft Azure. The goal was simple.

Continue Reading ...

Controls Inheritance – Easing the burden of compliance and reducing audit fatigue

Rick Tracy
May 5, 2020

Audit fatigue is all too real and, unfortunately, there is no magic cure-all. However, there are some ways to help relieve it.

Continue Reading ...

Let’s Not Forget the Lessons Learned from COVID-19

Maj. Gen. Paul Capasso USAF (Ret.)
April 29, 2020

As a cybersecurity practitioner, I am always on the lookout for lessons learned that will help our nation be better prepared to survive a major cyber event. 

Continue Reading ...

The Role Inheritance Plays in Cloud Compliance

Law Floyd
April 27, 2020

Compliance is a rather daunting subject.  The governing body that an organization is beholden to can have a massive amount of security controls that are expected to be not only implemented but monitored, maintained, and documented.

Continue Reading ...

Keep OPSEC Front and Center, Even When Working from Home

Gianna Price
April 22, 2020

During these critical times we are pushed to our limit.  Our accomplishments and shortcomings are valid and should be acknowledged.  However, before you post on the internet, I encourage all of you to remember OPSEC — the protection of unclassified information that could be interpreted or pieced together to derive critical information in time to be useful to adversaries.  

Continue Reading ...

How to become invisible on the internet – legally.

Maj. Gen. Paul Capasso USAF (Ret.)
April 15, 2020

Many might think that masking one’s identity, location or motive is only used by those individuals involved in criminal activities, espionage or terrorist undertakings. But that’s not the case.

Continue Reading ...

NIST SP 800-53 Rev. 5 – One Ring to Rule Them All

Stephen Horvath
April 9, 2020

In the world of compliance, some very good news was announced by NIST related to their consolidated and comprehensive control catalog, Special Publication 800-53.  Revision 5 (Rev. 5), which has been in the works for a couple of years now, was released as a Final Public Draft last month, which means any changes from this point forward until final publication should be minor.

Continue Reading ...

Control Mapping – A Powerful Ally in the Fight Against Audit Fatigue

Rick Tracy
April 7, 2020

From the federal government to the commercial sector, all highly regulated organizations are susceptible to audit fatigue; and providing the evidence that shows your organization meets multiple federal, industry, or organizational information security standards can be one of the major factors that lead there.

Continue Reading ...

Was Telework Part of Your Disaster Recovery Plan?

Maj. Gen. Paul Capasso USAF (Ret.)
March 24, 2020

Maj Gen Paul Capasso draws on his experience as a senior military leader, including his time as commander of Keesler Air Force Base in Biloxi, Miss., in the aftermath of Hurricane Katrina, which left two-thirds of the base underwater and three of every four buildings damaged.

Continue Reading ...

Four Ways to Stay Secure While Working From Home

Ian Fagan
March 19, 2020

For those fortunate enough to have the option of doing their jobs remotely, here are some quick and dirty tips on how to work from home more securely: Keep your system connected to a corporate VPN. Even if you’re on your home Wi-Fi you should always connect to your company’s

Continue Reading ...

New GAO Report Questions Adoption and Effectiveness of NIST CSF across Critical Infrastructure

Rick Tracy
March 18, 2020

A recent GAO report indicates there is not enough information about the level or effectiveness of NIST Cybersecurity Framework (CSF) adoption across the 16 critical infrastructure sectors.

Continue Reading ...

Weakness Invites Attack: Cybersecurity Vigilance in the Time of Coronavirus

Stephen Horvath
March 17, 2020

It’s a difficult job to be a cybersecurity professional, especially if you’ve been one for a while.  It skews your sensibilities, and at least for me, has turned me into a fairly risk-averse person. 

Continue Reading ...

A Hitchhiker’s Guide to the Lawless Internet

Tom Badders
March 12, 2020

What you can do to protect your information when it leaves the enterprise network.

Continue Reading ...

Easing the Friction between Security Operations and Compliance

A.J. Turcot
March 6, 2020

Security operations teams aren’t usually looking for things to do to pass the time.  Their days are filled with critical security functions like managing intrusion detection systems, reviewing audit logs, and patching applications and operating systems – and that’s before lunch.  As you can imagine, amidst their heavy workload, they love taking the time to respond to auditors and compliance teams.

Continue Reading ...

Five Things You Should Do While You’re Waiting for CMMC

Gianna Price
March 2, 2020

Take a breath, DIB community. There’s time to prepare. 

Continue Reading ...

Facing the Reality of IT Audit Fatigue Head-On

A.J. Turcot
February 21, 2020

Does your organization find itself scrambling to support data calls from multiple internal and external auditors to support varying IT risk management and compliance standards?  You are not alone.  

Continue Reading ...

“Now You See Me, Now You Don’t”: A Boxer’s Strategy for Cybersecurity

Maj. Gen. Paul Capasso USAF (Ret.)
February 18, 2020

Muhammad Ali provides us insight into how we can go the distance in combatting cyber threats.

Continue Reading ...

Rackspace, AWS and Telos: Reducing FedRAMP Authorization Effort by Over 80%

Stephen Horvath
February 14, 2020

Approximately four years ago, Telos began working with AWS to enable Xacta to both integrate with and run on the AWS cloud. About two years after that, understanding how difficult the FedRAMP process can be, we launched an effort to greatly reduce the barrier to entry for organizations wishing to sell quality software as a service (SaaS) to the federal government.

Continue Reading ...

Naming and its Importance in Securing Cloud Assets

Law Floyd
January 30, 2020

Names are an integral part of our society, and the importance of a name does not change in the world of IT.

Continue Reading ...

Information Warfare and Election Security

Maj. Gen. Paul Capasso USAF (Ret.)
January 28, 2020

The presidential race is in full stride.  Potential candidates are canvassing our country in an effort to appeal to the American public for their vote.  As our nations prepares itself for its next major election, predictions indicate it will be a close race.  Americans want a secure, fair and transparent election process.

Continue Reading ...

Reevaluating Your Security Posture in Today’s Cyber Landscape

John B. Wood
January 27, 2020

With recent events triggering a nationwide alert to the Iranian cyber threat, organizations and individuals are feeling the pressure to increase their cybersecurity.

Continue Reading ...

Cyber threat from Iran isn’t new. Are you ready?

Rick Tracy
January 20, 2020

NIST offers several resources to help commercial enterprises prepare for threats and manage cyber risk.

Continue Reading ...

Ensuring Privacy and Security in the Wake of the Iranian Cyber Threat

Tom Badders
January 15, 2020

DHS’ practical advice contains good housekeeping measures for normal organizational operation over the internet. However, we can no longer afford to pursue our organizational missions as if these are normal times.

Continue Reading ...

TAPS – Helping Surviving Families for 25 Years

John B. Wood
December 20, 2019

This year, the Tragedy Assistance Program for Survivors (TAPS) is celebrating its 25th anniversary. For those who are not already familiar, TAPS is a national nonprofit that offers services and support to those grieving the loss of a loved one who died during, or as a result of, their military service.

Continue Reading ...

Treat Every Day Like It’s Giving Day

John B. Wood
December 3, 2019

Today is Giving Tuesday – a day devoted to helping others, created several years ago in response to the consumer excesses of Black Friday and Cyber Monday. The thought and message are spot on, but, instead of devoting a single day in the calendar year to it, every day should be about giving.

Continue Reading ...

The Past, Present and Potential Future of the NIST RMF

Gianna Price
November 22, 2019

Recently I had the opportunity to co-present a webinar with my colleague Steve Horvath, titled: The RMF is Dead. Long Live the RMF! 

Continue Reading ...

State CIOs Adopt Role of Service Broker in Era of Shrinking IT Agencies

Ben Cronin
November 18, 2019

State and local IT agencies are shrinking. Long gone are the days where state agencies both procure and deliver their own technology solutions and services.

Continue Reading ...

Looking Forward to the Tenth Annual Alamo ACE

David Kovach
November 13, 2019

The Alamo AFCEA Chapter also puts an emphasis on the rapidly changing cybersecurity, homeland security and education and training landscapes.

Continue Reading ...

Celebrating our Veterans

John B. Wood
November 11, 2019

Today, as I take the opportunity to look back on the history of the holiday, it seems important to remember our need to celebrate as well.

Continue Reading ...

Control Inheritance: The Power of Crowd Sourcing

Rick Tracy
November 7, 2019

Whether you call it control inheritance or crowd sourcing, the reality is that, the more data sharing there is, the greater the benefit to the broader ATO ecosystem. 

Continue Reading ...

The 2019 Washington Exec Pinnacle Awards Recognize Debbie Smith

John B. Wood
November 5, 2019

My right hand here at Telos, Debbie Smith, was selected as a finalist for WashingtonExec’s Pinnacle Award for Executive Assistant of the Year.

Continue Reading ...

Digital Disguises for Cyber Operations

Tom Badders
November 4, 2019

There are various types of cyber operations that need to disguise the identities of their personnel and avoid detection to protect networks and information: red teams, penetration testers, security researchers, and cyber threat analysts.

Continue Reading ...

Xacta and IT GRC: Similar Tools for Different Jobs

Rick Tracy
October 28, 2019

If a GRC solution is a hammer, then by contrast, Xacta is a screwdriver.  Both tools are useful, but are designed to perform similar — but different — functions.

Continue Reading ...

Security and Compliance Automation Drives Cloud Adoption

John B. Wood
October 17, 2019

Automation eliminates uncertainty and reduces the burden of security and compliance. The result is a more confident organization with a greater appetite for cloud adoption.  

Continue Reading ...

Xacta.io, the Next Generation of Cyber Risk Management

Rick Tracy
October 9, 2019

Yesterday we celebrated an important milestone in Telos’ corporate history: the general availability of Xacta.io™ — the next generation of our renowned cyber risk management platform. 

Continue Reading ...

Xacta.io: The Next Step in our Innovation Journey

Rick Tracy
September 26, 2019

Recently, Telos announced Xacta.io – our next-generation cyber risk management solution that leverages  cutting-edge technologies to ensure massive scalability, ease of access to more types of data at hyper scale, and the ability to deploy in the cloud, on premises, or in a hybrid environment.

Continue Reading ...

Does the CMMC Solve the Problem, or Simply Distribute Liability?

Gianna Price
September 25, 2019

It’s time for the public and private sectors to take a strategic pause as we digest the existing frameworks and determine what is and isn’t working before adding a new burden on both communities.

Continue Reading ...

September 11th – Reflecting on this 18th anniversary

John B. Wood
September 11, 2019

It’s hard to believe that 9/11 happened 18 years ago. For those of us that were there and lost loved ones in those horrific attacks, even though time goes on and we grow older, we’ll never forget.

Continue Reading ...

JEDI, Why “Disinformation” and Protest Culture Need to Stop

John B. Wood
September 5, 2019

In my last JEDI blog post, I wrote about how important the DoD’s broader enterprise cloud effort is to America’s warfighters. JEDI is the first, single cloud step in this enterprise-wide cloud process, but it has been the subject of repetitious misinformation and protests over its now 19-month (and still running) course.

Continue Reading ...

Talking JEDI and Why U.S. Warfighters Need It NOW!

John B. Wood
September 3, 2019

In light of the continued handwringing and misinformation around Pentagon’s JEDI, and DoD’s latest fact-checking, I wanted to take this opportunity to address the contract.

Continue Reading ...

Infinity and Beyond: Strategic Technology Trends into the 2020’s

Keith Wojciech
August 27, 2019

In our increasingly connected world where IT solutions have not only become ubiquitous, but in many cases, necessary for everyday living, digital change is all around us and will require even more flexible and versatile business models and strategies to compensate for such rapid technology evolution.

Continue Reading ...

Reciprocity: The Good, The Bad and The Ugly

Gianna Price
August 22, 2019

There is a lot of buzz around the Defense Information Systems Agency’s recent announcement that permits DoD mission partners and service components to host DoD Impact Level 2 data in FedRAMP-authorized (Moderate Baseline) cloud environments without waiting for an explicit DoD-written authorization. 

Continue Reading ...

What Does the DoD’s New Cybersecurity Maturity Model Certification Mandate Mean for You?

Kayla Walters
July 29, 2019

Over 300,000 companies will now be required to comply with the CMMC… are you ready?

Continue Reading ...

Establish a Cyber Risk Management Program with Cybersecurity Stepping Stones

Rick Tracy
July 25, 2019

Want to establish a cyber risk management program, but don’t know where to start? Here are 18 security controls most organizations should consider implementing right now.

Continue Reading ...

Could NIST SP 800-171 Be A Model for the Cyber Insurance Industry?

Rick Tracy
July 10, 2019

As discussed in a recent blog post, NIST SP 800-171 is a compliance requirement intended to improve the overall security posture of the 65,000 or so organizations that do work for the federal government. 

Continue Reading ...

NIST SP 800-171B: The Natural Evolution of NIST SP 800-171

Rick Tracy
June 25, 2019

As expected, earlier this week NIST released DRAFT NIST SP 800-171B, which includes 33 enhanced Controlled Unclassified Information (CUI) requirements for critical systems and high value assets.  NIST indicates the focus of these new requirements is on organizations that are likely targets of advanced persistent threat (APT) attacks. 

Continue Reading ...

I’m Ready, I’m Set… Now It’s Time to Understand the FedRAMP Assessment Process!

Milica Green
June 24, 2019

I was happy to participate in a webinar a few weeks ago with my colleague, Corey Clements, director, FedRAMP 3PAO and Advisory for SecureIT.

Continue Reading ...

Secure the Supply Chain by Eliminating the Cyber Attack Surface

Tom Badders
June 12, 2019

According to the Symantec 2019 Internet Security Threat Report, supply chain attacks spiked 78 percent in 2018.  Not only is the volume and severity of these attacks growing, so is their sophistication.

Continue Reading ...

Hyperscale Security Data for Continuous Risk Monitoring

Stephen Horvath
June 6, 2019

If you’re planning to attend AWS PSS DC next week, I hope you’ll join us for our session. It will be a technical conversation on how the exponential growth of data, and other challenges drove the development of the new framework and architecture of Xacta.io.

Continue Reading ...

Ready for Your FedRAMP Assessment? What to Expect While Working With Your 3PAO

Milica Green
June 4, 2019

If you’d like a clearer picture of where your company stands today, as well as obtain a broad roadmap for future steps on the path to FedRAMP success, join me for on Thursday, June 6 at 2pm ET for a free webinar titled: “I’m Ready for My FedRAMP Assessment, Now What?”

Continue Reading ...

The Alliance for Digital Innovation: Supporting Public Sector Innovation and Acquisition Reform

John B. Wood
May 22, 2019

The Alliance for Digital Innovation (ADI) is a new, independent voice calling for greater use of commercial innovation and emerging technologies throughout government.  ADI was founded by like-minded technology companies and industry thought leaders wanting to promote positive change in how the public sector views, acquires, and utilizes innovative technology.  

Continue Reading ...

Got COTS? Why Commercial Offerings Are the Preferred and Legally Mandated Choice for Federal Agencies

Telos Corporation
May 16, 2019

For more than 20 years, federal law has required agencies to use commercial off-the-shelf (COTS) solutions unless there’s a compelling reason to use a government off-the-shelf (GOTS) solution.

Continue Reading ...

Improving Endpoint Security via Obfuscation and Managed Attribution

Tom Badders
April 18, 2019

Organizations’ network communications depend on the internet. This week, we announced enhancements to Telos Ghost, a network infrastructure provided as a service that secures your organization’s valuable network resources by providing high levels of obfuscation and encryption.

Continue Reading ...

What Does the RMF Prepare Step Mean for Security and Compliance Practitioners?

Gianna Price
April 15, 2019

Last week, Xacta® solutions architect Gianna Price presented alongside her colleague, VP of strategy and vision Steve Horvath, about the revised NIST RMF and its Prepare step.

Continue Reading ...

A Night of Female Empowerment at the TAPS Captain Marvel Screening

John B. Wood
April 9, 2019

Recently, Telos had the honor of hosting TAPS families, members of the U.S. Air Force, and Telos employees and their families at the Smithsonian National Air and Space Museum for a screening of the blockbuster movie Captain Marvel.

Continue Reading ...

Addressing the Cyber Workforce Shortage and Supporting FIRST Tech Challenge

John B. Wood
March 19, 2019

One solution to the cyber workforce shortage that I stress often is starting STEM education earlier, as it generates interest, introduces students to a career opportunity they may not have known otherwise (especially for young girls), and creates a knowledge base that will ultimately help students as they continue their education.

Continue Reading ...

Connolly-Meadows – An acceleration lane for FedRAMP

Milica Green
March 12, 2019

Bi-partisan legislation introduced late in the last Congress, and expected to be reintroduced in the new Congress, by Reps. Gerry Connolly (D-V.A.) and Mark Meadows (R-N.C.) to update and improve the FedRAMP process would substantially boost the government’s efforts to make FedRAMP more effective.

Continue Reading ...

A Real-World Look at Education and the “Cybersecurity Workforce Gap”

John B. Wood
March 6, 2019

The Center for Strategic and International Studies (CSIS) recently published a report on “The Cybersecurity Workforce Gap” that contains a number of well-documented statements describing the challenges organizations face in hiring cybersecurity professionals with the needed skillsets.

Continue Reading ...

Get Ready, Get Set… Get FedRAMP Authorized!

Milica Green
February 20, 2019

Telos compliance expert Milica Green recaps the topics and advice she presented in our “Getting to FedRAMP Ready: What You Need to Know” webinar with Rackspace’s Brad Schulteis.

Continue Reading ...

The Irony of RMF Step 0

Gianna Price
February 13, 2019

In my previous post, I mentioned the addition of the Prepare step, often referred to as Step 0, in the revised NIST SP 800-37 Risk Management Framework, a.k.a. RMF 2.0. The Prepare step, which aligns with the core of the NIST Cybersecurity Framework, expands the conversation from system-focused vulnerability management into organizational risk management.  

Continue Reading ...

Tampa Bay Frogman Swim Honors the Fallen and Benefits Naval Special Warfare Foundation

John B. Wood
January 28, 2019

It is always a privilege to be able to support this event and the families of America’s fallen heroes. Thank you and congratulations to all who participated in the Frogman Swim this year.

Continue Reading ...

RMF 2.0: Are you “Prepare’d”?

Gianna Price
January 24, 2019

The updated framework does a great job emphasizing organizational risk management, but the first step (literally) is being prepared.

Continue Reading ...

An Open Letter to Mr. Claus

Maj. Gen. Paul Capasso USAF (Ret.)
December 14, 2018

Holiday greetings!  I can’t believe how quickly time has passed.  A lot has happened in the world of cyber over the four years since I wrote you last.

Continue Reading ...

Cheering for Loudoun Teams Competing in the CyberPatriot Challenge

John B. Wood
November 26, 2018

Telos Corporation is proud to sponsor 17 teams from the Academies of Loudoun in the 11th CyberPatriot National Youth Cyber Defense Competition.

Continue Reading ...

Attention Online Shoppers

Maj. Gen. Paul Capasso USAF (Ret.)
November 19, 2018

By following a few simple guidelines this holiday season you can have a positive “IMPACT” on your pocketbook and stay one step ahead of potential fraudulent cyber activities. Happy Shopping!

Continue Reading ...

Our Rising Star: Recognizing Young Talent in the Workplace

John B. Wood
November 16, 2018

We are thrilled that one of our own, Danielle Lauhoff, was recognized in the 2018 class of Rising Stars.

Continue Reading ...

Veterans Day 2018 – A celebration of heroes in the workplace.

John B. Wood
November 9, 2018

This Veterans Day is an opportunity to honor the contributions our heroes continue to make long after leaving the service.

Continue Reading ...

Trick or Treat During Cybersecurity Month

Maj. Gen. Paul Capasso USAF (Ret.)
October 23, 2018

This month is the time to reflect on how we can better secure our cyber surroundings.  If we can improve upon the key messages of this year’s cybersecurity month, we should be able to remove the “tricks” and increase the “treats” of the web by reducing the risks cyber threats pose to our global community.  Happy Halloween!

Continue Reading ...

Creating Space for Users to Make Informed Cybersecurity Decisions

Maj. Gen. Paul Capasso USAF (Ret.)
September 26, 2018

As society becomes more connected and more dependent on 1’s and 0’s to handle everyday life, adding a focus on the human element of cybersecurity to today’s technology arsenal may help quell the problem at hand. 

Continue Reading ...

The FedRAMP Plan of Action and Milestones (POA&M): Rigorous Guidance for Tracking and Addressing System Weaknesses

Milica Green
September 20, 2018

In my last blog post, I explained the importance of continuous monitoring in the FedRAMP process to assure that security controls are implemented correctly and operate as intended.  Today I’ll cover the importance of having a living action plan to ensure that any system weaknesses or deficiencies are being addressed.

Continue Reading ...

September 11, 2018 – A Reflection on American Resilience

John B. Wood
September 11, 2018

As we recognize the 17th anniversary of these attacks, I am reminded of the personal losses I suffered that day, as well as the heroic stories of so many. I think about the journey of grief and healing.

Continue Reading ...

Telos Internship Program – Preparing Future Generations for the Workforce

John B. Wood
August 22, 2018

As another summer internship program comes to an end, I want to take the time to say how proud I am of what our interns have learned and accomplished.

Continue Reading ...

Girl Scouts’ Cybersecurity Initiative Provides Hope for Cyber Workforce Gender Deficit

John B. Wood
August 17, 2018

Telos partner Palo Alto Networks has teamed up with Girl Scouts USA to create 18 national cybersecurity badges for girls in grades K-12.

Continue Reading ...

What You Need to Know about FedRAMP Continuous Monitoring.

Milica Green
August 9, 2018

FedRAMP requires cloud service providers to periodically validate that their security controls are implemented and operating correctly. Here’s what you need to know.

Continue Reading ...

AWS Security Competency: Telos Achieves the Next Step in the Partnership Program

Lisa Conway
August 7, 2018

Telos appreciates the support of AWS and the C2S sponsor in creating a case study that helped us earn the Security Competency.

Continue Reading ...

The FedRAMP Deadline for TLS 1.1 or Higher is July 1st 2018 – But is the TLS 1.1 Enough?

Milica Green
June 28, 2018

You may want to skip Transport Layer Security (TLS) 1.1 and go right to 1.2 or 1.3.

Continue Reading ...

AWS Government Competency: Telos Reaches Another Partnership Milestone

Lisa Conway
June 25, 2018

The Government Competency designation solidifies Telos as an experienced government partner by meeting their high-bar criteria.

Continue Reading ...

The Quest for Continuous ATO

Rick Tracy
June 18, 2018

Download the new case study from AWS and Telos featuring the U.S. Intelligence Community

Continue Reading ...

Telos and AWS: Proud of Our Partnership, Looking Forward to the Public Sector Summit

John B. Wood
June 11, 2018

I am proud that Telos Corporation is a Diamond Sponsor of this year’s AWS Worldwide Public Sector Summit in Washington, D.C.  It’s a reflection of our commitment to our partnership with AWS, which has grown exponentially over the past two-and-a-half years. Just last month we were honored to have Teresa

Continue Reading ...

Mark Zuckerberg Opens a Door for Greater Privacy Protection

Rick Tracy
May 2, 2018

Mark Zuckerberg’s pledge to make GDPR information available to all Facebook users may open the floodgates to more data-privacy legislation.

Continue Reading ...

Telos Achieves Advanced Technology Partner Status in AWS Partner Network

Lisa Conway
April 11, 2018

Less than a year since Xacta 360 became available in the AWS Marketplace, Telos is recognized by Amazon Web Services (AWS) as an Advanced Technology Partner.  The advanced tier designation required a rigorous technical validation by AWS, as well as proof of product maturity and adoption among AWS customers.

Continue Reading ...

The Shutdown Ends, But Elected Leaders Shouldn’t Expect Applause

Robert DuPree
January 30, 2018

Congress may have ended the brief government shutdown after three days, but nobody in government should be expecting applause.  This doesn’t even warrant a “golf clap.” That’s because passing another CR is what I call the “BME” – bare minimal effort.

Continue Reading ...

Xacta 360 Offers an Easy Button for Upgrading to New Versions of NIST SP 800-53

Rick Tracy
December 12, 2017

News of a new version of NIST SP 800-53 is enough to make many information security professionals want to cry.  The truth is, this upgrade process can be painful when performed manually via spreadsheets, and is magnified based on the number of systems that need to be upgraded.

Continue Reading ...

AWS, Google and Microsoft in Agreement on the State of Cloud Security and Compliance

John B. Wood
December 7, 2017

Note: This piece originally appeared on the Northern Virginia Technology Council (NVTC) Blog on December 5, 2017.   At the second annual NVTC Capital Cybersecurity Summit, I was privileged to moderate an amazing panel discussion on “The State of Cloud Security and Compliance: Dispelling the Myth of Cloud Insecurity.” What made

Continue Reading ...

IoT Insecurity – At What Expense this Holiday Season?

Maj. Gen. Paul Capasso USAF (Ret.)
December 6, 2017

With the holiday shopping season upon us, we need to be aware of the gifts we give to our children and loved ones.  The potential of our children becoming pawns on the back of IoT insecurity should be a “wake-up” moment for government, industry and individuals alike to take seriously the security of our personal information and privacy in the world of IoT.

Continue Reading ...

Q&A with NIST’s Matt Barrett on CSF Adoption

Rick Tracy
November 29, 2017

To learn more about the adoption rates of the CSF since its introduction in 2014, Rick Tracy spoke with Matt Barrett, Program Manager for the NIST CSF.

Continue Reading ...

Connecting with Our Veterans

John B. Wood
November 10, 2017

You may not have a personal connection to the military, but you don’t need that connection to truly be grateful for the sacrifices our military and their families make to protect our country.

Continue Reading ...

Sustained Commitment to IT Modernization Will Realize Security Benefits, Savings

Robert DuPree
November 6, 2017

The federal government is on the precipice of a huge move, as they strive to cut the cord to outdated legacy IT systems and embrace the cloud — a move far too important to be delayed due to inadequate funding.

Continue Reading ...

The NIST CSF and the Freedom of Flexibility

Rick Tracy
October 12, 2017

The CSF isn’t linear and it’s not static; it is a living, breathing framework that is constantly evolving. For so many companies and organizations it’s pivotal to have a framework that evolves as the organization does, so that your risk management process and security infrastructure can adapt to changes and remain strong.

Continue Reading ...

NIST RMF Workshop: Approaches to SDLC Risk Management

Stephen Horvath
September 28, 2017

The software development life cycle (SDLC) is a considerable topic of conversation as it relates to cybersecurity.  In fact, many features of our Xacta 360 product have been built to aid developers in understanding exactly what information assurance controls they are responsible to comply with as they build systems that will be deployed in the federal government.

Continue Reading ...

Survey Says: Frameworks Are Good, Compliance Could Be Better

John B. Wood
September 26, 2017

This year at AWS Public Sector Summit, the Telos team conducted a survey of the public sector technology community. I’m happy to announce we’ve released the results of that survey in the 2017 Public Sector Cyber Risk Management Report.

Continue Reading ...

Cyber Shouldn’t Be Overlooked in Naval Collision Investigations

Maj. Gen. Paul Capasso USAF (Ret.)
August 28, 2017

It is yet to be determined what role cyber vulnerabilities played in the tragic naval collisions – though the questions must be asked.

Continue Reading ...

Ensuring our security; celebrating our freedom

John B. Wood
July 3, 2017

The Cogswell Award for outstanding industrial security achievement is especially meaningful to Telos because it reflects key components of our Core Values – integrity and trust.

Continue Reading ...

Memorial Day Ruck to Remember – 60 to 60

Lyndsey Hoffmann
May 25, 2017

As a cybersecurity company serving federal customers, Telos has the privilege of supporting our military on a daily basis. It’s a great privilege to provide these solutions and support to the warfighter as our “day-job,” but I think it’s just as important to remember these individuals and the sacrifices they make for our freedom when we’re off the clock.

Continue Reading ...

A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same

Rick Tracy
May 18, 2017

One of the most important aspects of the new Cybersecurity Executive Order (EO) is also the aspect of the order causing the most confusion.

Continue Reading ...

Statement on the Cybersecurity Executive Order

John B. Wood
May 11, 2017

Earlier today, President Trump signed the long awaited “Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” Even the most rigorous processes for managing modern cyber threats require a foundation of modern technology. Today’s cybersecurity executive order is an important step forward in the modernization of

Continue Reading ...

Encouraging NIST CSF Adoption with Automation

Rick Tracy
May 3, 2017

Automation has a critical role to play when operationalizing the NIST Cybersecurity Framework (CSF). Emerging tools can help organizations embrace the CSF without spending heavily to meet compliance requirements. This will further reduce barriers to deploying the CSF, increasing the number of “native speakers” and continuing a sea change in

Continue Reading ...

Trump Gives Green Light on Federal IT Modernization

Robert DuPree
April 13, 2017

According to the White House, President Trump said at a meeting April 11 with business leaders that his Administration plans a “massive program to modernize” government computer systems.  Citing the high cost of simply maintaining current systems, the President indicated it would be better for the taxpayers to buy entirely

Continue Reading ...

IT Industry Says of the Cloud: Look What We Can Do, Securely.

Stephen Horvath
January 24, 2017

My perspective on the cloud has shifted. I have admiration and respect for organizations like AWS that have defined a market by making the incredible achievable – not by selling a solution, but by promoting the idea that individuals can invent incredible things, and giving them the platform to do so.

Continue Reading ...

LPTA Reform – A Welcome Change in DoD’s Cyber Security Acquisition

Robert DuPree
January 12, 2017

To protect our national interests, cyber security contracts need to be awarded based on quality or value, not price. LPTA is a welcome change.

Continue Reading ...

‘Tis the Season

Maj. Gen. Paul Capasso USAF (Ret.)
December 2, 2016

Holiday cyber criminals are out in full force. Follow these suggestions cyber tips to keep your holiday season merry and bright.

Continue Reading ...

The Next Chapter of Compliance – To the Cloud!

Rick Tracy
November 29, 2016

The next chapter of IT security and risk compliance management, is compliance in the cloud.

Continue Reading ...

Thanksgiving Note

John B. Wood
November 23, 2016

Thanksgiving could not have come at a better time.

Continue Reading ...

Easing the CSF Implementation Burden with Xacta

Rick Tracy
November 7, 2016

Cyber risk management is a complex business process requiring extensive explanation and guidance. However, many companies do not have the time or expertise necessary to understand, implement, and operationalize such frameworks.

Continue Reading ...

Can Your Thermostat Take Down the Internet?

Tom Badders
September 27, 2016

The recent Krebs attack is a case study in exploiting IoT for DDoS.

Continue Reading ...

Federal CISO Faces Big Challenges – Let’s Keep Politics Out of It

John B. Wood
September 22, 2016

Let’s hope the next Administration rises above their own politics, and keeps the momentum going in protecting our national cyber security.

Continue Reading ...

Cyber Hide and Seek

Maj. Gen. Paul Capasso USAF (Ret.)
August 18, 2016

As we can learn from the hunters and the hunted draped in camouflage – the best way to defend yourself in cyberspace, is to never be seen at all.

Continue Reading ...

IT GRC Geek Speak: Controls Inheritance

Rick Tracy
August 17, 2016

What is controls inheritance, and how can it help your organization manage risk?

Continue Reading ...

IT GRC Geek Speak: Body of Evidence

Rick Tracy
August 9, 2016

What is a body of evidence and why does your organization need it?

Continue Reading ...

Get Moving and Keep Moving to Stay Secure on the Network

Col. Stephen P. Corcoran USMC (Ret)
August 3, 2016

In the IT sector, “staying on the move” means keeping your users and information constantly moving and hidden in your network environment.

Continue Reading ...

IT GRC Geek Speak: Compliance vs. Security

Rick Tracy
August 2, 2016

Everyone in the IT GRC space has heard it: “Compliance does not equal security,” usually said as a way to portray compliance as a burdensome, check-the-box process, that doesn’t do anything to keep your organization safe. But it’s a false argument.

Continue Reading ...

NIST CSF: A Swiss Army Knife for Managing Cyber Risk

Rick Tracy
July 12, 2016

The NIST CSF can be used to address a wide range of cyber risk management activity… it is the Swiss Army Knife for managing your cyber risk.

Continue Reading ...

Securing an Empire Built on Bits and Bytes

Maj. Gen. Paul Capasso USAF (Ret.)
July 6, 2016

Ones, zeros, bits and bytes underpin the very nature of modern warfare.

Continue Reading ...

AWS Public Sector Summit Recap

Hugh Barrett
June 29, 2016

Telos and AWS can help streamline the cloud compliance process in any organization looking to move to the cloud by reducing controls documentation and validation – by anywhere from 20 to 50%.

Continue Reading ...

Mobile device management and the future of enterprise mobility.

Tom Badders
June 21, 2016

Integration, interoperability, and security are the key factors in deploying a successful mobile enterprise.

Continue Reading ...

Cloud Compliance at AWS Public Sector Summit 2016

Stephen Horvath
June 14, 2016

Telos and AWS can help streamline the cloud compliance process by dramatically reducing controls documentation and validation. Faster to cloud, means faster to mission, production, and value.

Continue Reading ...

Three Reasons NOT to Use Spreadsheets for Cyber Risk Management

Rick Tracy
June 8, 2016

Spreadsheets are great for many tasks — but not for managing risk and compliance processes. Choose an IT GRC platform that best meets your organization’s needs.

Continue Reading ...

On Behalf of a Grateful Nation

John B. Wood
May 27, 2016

  “On behalf of a grateful nation, please accept this flag as a symbol of our appreciation for your loved one’s honorable and faithful service.” These are words that many of us will recognize from scenes in the movies or dramatic TV shows, but will never really know.  Today, I

Continue Reading ...

Pen-testing Security Solutions Is as Valuable as Pen-testing Security Environments

Stephen Horvath
May 25, 2016

Pen-testing is just as valuable for vetting an IT security offering as it is for vetting the security of an IT environment.

Continue Reading ...

Challenging Presidential Candidates to Strengthen Cyber Security and Risk Management

John B. Wood
May 23, 2016

How cyber insurance and the NIST cyber security framework (CSF) can promote better risk management.

Continue Reading ...

The Virginia Cyber Security Commission – An Insider’s View

John B. Wood
May 17, 2016

The Commission served to shine a bright light on the challenges facing Virginia. We made a number of recommendations that led to subsequent actions by the Governor and General Assembly, improving Virginia’s cyber security posture.

Continue Reading ...

How to Operationalize Cyber Risk Management Frameworks

Rick Tracy
May 5, 2016

IT-GRC platforms like Xacta AE help organizations navigate the complex process of cyber risk management.

Continue Reading ...

IoT Security and the IoTpocalypse

Maj. Gen. Paul Capasso USAF (Ret.)
May 2, 2016

IoT is truly transforming how we live, work, and play. In this hyper connected world, the paradox becomes: IoT security.

Continue Reading ...

What Constitutes a Reasonable Cyber Risk Management Practice?

Rick Tracy
April 28, 2016

It isn’t just a failure to manage cyber risk that can be costly to a company; the inability to demonstrate such cyber risk management practices exist can be just as costly in the court of law.

Continue Reading ...

Keys to an Effective RMF Transition – Lessons Learned from the Intelligence Community

Patrick Sullivan
April 19, 2016

With fewer resources, tighter budgets, and requirements accumulating, it is imperative that organizations use available experience and tools to effectively implement the Risk Management Framework (RMF) and understand how it fits into the bigger organizational picture.

Continue Reading ...

Empowering the NIST Cybersecurity Framework with Cyber Insurance — and Vice Versa

Rick Tracy
April 13, 2016

Cyber insurance and the NIST Cybersecurity Framework have a symbiotic relationship, in which one enables and reinforces the other.

Continue Reading ...

The Cyber “Buck” Stops in the Board Room

Rick Tracy
April 4, 2016

Officers and directors held accountable for cyber risk management.

Continue Reading ...

Transitioning to the Risk Management Framework: Potential Challenges

Patrick Sullivan
March 31, 2016

As happens with any major change, the transition to NIST’s Risk Management Framework (RMF) has the potential for presenting challenges to the organizations involved.

Continue Reading ...

The President’s Cybersecurity National Action Plan

John B. Wood
March 3, 2016

A Realistic Look at What the President’s Cybersecurity National Action Plan (CNAP) Can Achieve, and What Else is Needed President Obama recently announced a Cybersecurity National Action Plan (CNAP), which combines short-term actions and a long-term strategy to help protect our nation, our businesses, and our citizens from cyber-attacks. In

Continue Reading ...

#CourageCaps Bring Smiles to Families of the Fallen

John B. Wood
January 27, 2016

Courage Caps and t-shirts go on sale TODAY, Jan 27th with 100% of proceeds benefiting TAPS. This is the third year Telos has presented the Courage Caps program, in collaboration with Monumental Sports and Entertainment Foundation and the Washington Capitals. In that period of time, Courage Caps has raised nearly $300,000 for TAPS, and we look forward to increasing that total with this year’s campaign!

Continue Reading ...

Government Turns to Private Sector for Cyber Security Insight

John B. Wood
January 8, 2016

This morning, the federal government turned to the private sector for insights into cyber security. Telos CEO John B. Wood had the privilege of speaking before the Congressional Subcommittees on Research and Technology and Oversight at a hearing titled Cyber Security: What the Federal Government Can Learn from the Private Sector.

Continue Reading ...

Worst Tech Predictions throughout History

Telos Corporation
December 28, 2015

As the saying goes, predicting the future is easy… getting it right is the hard part. We dug through the internet archives and found a handful of predictions that were so far off the mark, that we had to share. Predicting the direction of technology is not easy, but that didn’t deter these folks from taking a shot…

Continue Reading ...

What’s YOUR Security Point of View?

Telos Corporation
December 21, 2015

Over the last year, we’ve shared security related quotes from all walks of life – technology professionals, military visionaries, business leaders, philosophers, and even comedians. All have a unique point of view that can be directly or indirectly applied to information security. We want to know: What’s YOUR security point of view?

Continue Reading ...

2016 IT Security Preview and Predictions: The Good, the Bad and the Ugly

Telos Corporation
December 16, 2015

We polled a few of our Telos experts to see what they expect to see in 2016, in the areas of cyber security, secure mobility, and identity management. Here’s what they see on the horizon – the good, the bad, and the ugly.

Continue Reading ...

Bonnie Carroll and TAPS: Servant Leader and National Treasure

John B. Wood
December 1, 2015

Along with her world class team at TAPS, Bonnie Carroll helps pull survivors out of the darkest moments they will ever know, and shows them a path to hope and healing. TAPS is the heart of America’s family, and Bonnie is truly a national treasure.

Continue Reading ...

Are there really only “two kinds of enterprises”?

Frank Johnson
October 26, 2015

Has every company really been hacked?  Is every company really going to be? A popular meme in the information security industry is, “There are only two types of companies: those that know they’ve been compromised, and those that don’t know.” And the second is like unto it: “There are only

Continue Reading ...

Smart things require smart users.

admin
October 23, 2015

Smart things require smarter users. Understand how to keep IoT devices secure. #CyberAware

Continue Reading ...

Advanced Persistent Threat

admin
October 17, 2015

If you’re unprepared, APTs (Advanced Persistent Threats) can bring you down with a knockout punch.

Continue Reading ...

Cybersecurity

admin

Cybersecurity. Don’t let it become another meaningless phrase.

Continue Reading ...

Lowest Priced Technically Acceptable (LPTA)

admin

The house Lowest Priced Technically Acceptable (LPTA) built.

Continue Reading ...

Cybersecurity Elephant

admin

Cybersecurity Elephant

Continue Reading ...

Death-Taxes-Hacked

admin

Death Taxes Hacked

Continue Reading ...

Chief Security Office

admin

What keeps a Chief Security Office (CSO) awake at night?

Continue Reading ...

The Cybersecurity Chess Match

admin

Today’s cybersecurity environment is like playing 1,000 simultaneous chess matches against different opponents of varying skill levels.

Continue Reading ...

Stay secure on the go.

admin
October 16, 2015

Share these tips with friends and family to keep them secure while on the go! #CyberAware

Continue Reading ...

Cloud Cuckoo Land: 3 Questions to Ask about Cloud Solutions and Cyber Security

Maj. Gen. Paul Capasso USAF (Ret.)
October 14, 2015

“If a man has good corn or wood, or boards, or pigs, to sell, or can make better chairs or knives, crucibles or church organs, than anybody else, you will find a broad hard-beaten road to his house, though it be in the woods.”  — Ralph Waldo Emerson

Continue Reading ...

Congratulating a Cyber Security Leader – Dr. Ron Ross

John B. Wood
October 12, 2015

Last week, our friend and public sector colleague Dr. Ron Ross received the 2015 Samuel J. Heyman Service to America Medal for his tireless public work in federal cyber security.  On behalf of myself and Telos, I’d like to offer a hearty congratulations to Dr. Ross. It’s an impressive resume. 

Continue Reading ...

Practice safe desk at work and home.

admin
October 9, 2015

Practice safe desk at work and at home. #CyberAware

Continue Reading ...

Stop. Think. Connect.

admin
October 2, 2015

Stop. Think. Connect. October is cyber security awareness month. Follow along with #CyberAware.

Continue Reading ...

Don’t tweet your location.

admin
September 25, 2015

Sharing your location on social media may threaten your operational security. #opsec #infosec

Continue Reading ...

Pirated software can damage you computer.

admin
September 19, 2015

Pirated software can damage your computer; only buy from reputable dealers. #TalkLikeaPirateDay

Continue Reading ...

CyberPatriot VIII Registration Ends Soon!

John Klemens
September 17, 2015

Registration for CyberPatriot closes on October 9th. I urge you to act now to become involved as a coach, mentor, assistant, or team member.

Continue Reading ...

Don’t get burned by too many plugins.

admin
September 12, 2015

Don’t get burned by too many plugins. Only install the ones you need and remove any you don’t use.

Continue Reading ...

Post-its. This is not a good password management strategy.

admin
September 4, 2015

Post-its. This is not a good password management strategy.

Continue Reading ...

Never share your passwords.

admin
August 28, 2015

Friends come and go. Make sure your personal data doesn’t go with them. Never share your passwords.

Continue Reading ...

Best Practices for Designing Distributed Systems – Part 3

Ramil Alfonso
August 24, 2015

This multi-part series explores the different aspects of designing a distributed system, optimized to support the multitude of devices — the characteristics of distributed systems, the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Passwords, privacy, and school policy

admin
August 21, 2015

As your kids go back to school, talk to them about phone passwords, privacy, and policies.

Continue Reading ...

Two-factor authentication provides a higher level of security

admin
August 14, 2015

Two-factor authentication provides a higher level of security.

Continue Reading ...

How to Protect Your Business from Reverse Engineering & Code Modification

Ian Fagan
August 10, 2015

Reverse engineering and code modification present significant security and business risks. They allow for malicious hackers (or competitors) to easily gain access to your proprietary source code, including your algorithms, ideas, data formats, licensing, security mechanisms, and potentially even your customer data.

Continue Reading ...

Getting rid of your old computer?

admin
August 7, 2015

Getting rid of your old computer? Securely remove sensitive files from the hard drive first.

Continue Reading ...

Debunking the 8 Fallacies of Distributed Systems – Part 2

Ramil Alfonso
August 3, 2015

Part two of this multi-part series explores the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Be mindful of personal information you give away.

admin
July 31, 2015

Online quizzes collet more than you realize. Be mindful of personal information you give away.

Continue Reading ...

Use 3G/4G instead of public Wi-Fi.

admin
July 24, 2015

Dogs days of summer have you sweating? Stay cool, and use 3G/4G instead of public Wi-Fi.

Continue Reading ...

Hurricane Katrina Recovery at Keesler Air Force Base

Maj. Gen. Paul Capasso USAF (Ret.)
July 23, 2015

On this 10th anniversary of Hurricane Katrina striking Keesler Air Force Base, we remember the catastrophic destruction, immediate relief, sustained recovery, progress and shared experience. The story of Operation Dragon Comeback at Keesler AFB is the standard which all others should follow during disaster and recovery efforts.

Continue Reading ...

An Intro to Designing Distributed Systems – Part 1

Ramil Alfonso
July 21, 2015

This multi-part series explores the different aspects of designing a distributed system, optimized to support the multitude of devices — the characteristics of distributed systems, the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Don’t let other priorities dwarf your cyber security mission.

admin
July 17, 2015

Don’t let other priorities dwarf your cyber security mission.

Continue Reading ...

Tomorrow’s Cyber Problem

Stephen Horvath
July 13, 2015

In a world where breaches are commonplace, it’s imperative that we develop solutions to verify the integrity and authenticity of data and information.

Continue Reading ...

Don’t be shocked by loss of data during a storm.

admin
July 10, 2015

Don’t be shocked by loss of data during a storm. Use surge protection and back up your work before lightning strikes.

Continue Reading ...

Don’t share your travel plans on social media.

admin
July 3, 2015

Your vacation plans shouldn’t be a display for all to see. Don’t share your travel plans on social media.  

Continue Reading ...

Level up your security.

admin
June 26, 2015

Level up your security. Use WPA2 and change the default password on your router.

Continue Reading ...

OPM Breach and Cyber – Less Talk, More Action

John B. Wood
June 25, 2015

When are we going to realize that defending our nation in cyberspace requires a long-term national effort and commitment, much like the Space Race? We have a cyber race to the moon on our hands, and we are falling behind.

Continue Reading ...

Old anti-virus software?

admin
June 19, 2015

Dad’s tie may not be the only thing that’s out of date. How old is his anti-virus software?

Continue Reading ...

Cyber Rope-A-Dope

Maj. Gen. Paul Capasso USAF (Ret.)
June 18, 2015

Don’t be a sucker for the cyber rope-a-dope. Understanding the basics of APTs, and keeping abreast of APT trends will help ensure you can go the distance against any cyber heavyweight.

Continue Reading ...

Has information been compromised?

admin
June 12, 2015

Has your information been compromised? Watch out for typos, blind links, and other signs of spear phising.

Continue Reading ...

Air Force Cyberspace Operations and Support Hall of Fame Class of 2015 Includes Telos Director John Maluda

John B. Wood
May 29, 2015

Earlier this month, my good friend and colleague, Maj Gen John Maluda (ret.), was honored for his extraordinary career when he was inducted into the Air Force Cyberspace Operations and Support Hall of Fame.

Continue Reading ...

Memorial Day 2015 – Reflections on the Cost of Freedom

John B. Wood
May 27, 2015

Each Memorial Day since 2012, I have had the privilege of attending TAPS’ National Survivor Seminar and Good Grief Camp. And each year, it has been an even more deeply moving experience than the year before.

Continue Reading ...

Turn off bluetooth when it’s not in use.

Renate Neely
May 22, 2015

Turn off bluetooth when it’s not in use. Your personal information is at risk.

Continue Reading ...

Cyber Security… More than Just a Bad Hair Cut

Maj. Gen. Paul Capasso USAF (Ret.)
May 20, 2015

“A complacent satisfaction with present knowledge is the chief bar to the pursuit of knowledge.” B.H. Liddell Hart Have you ever made a decision that you later regretted? That Mohawk haircut that was so cool in high school doesn’t look so appealing today, does it? Selling that ’64 Mustang for

Continue Reading ...

Stand up to cyber bullying.

Renate Neely
May 15, 2015

Stand up to cyber bullying.

Continue Reading ...

Preparation for CyberPatriot VIII Starts Now!

John Klemens
May 13, 2015

To get the most out of the CyberPatriot program, now is the time to form a team. Registering now will get a team access to the exhibition rounds where they can learn without the pressure of competition. Teachers, cyber security professionals, students, and their parents can visit the CyberPatriot website to find out more about becoming a coach, a mentor, or a competitor.

Continue Reading ...

Give Mom the gift of security.

Renate Neely
May 8, 2015

Give Mom the gift of security. Offer to review her social media account settings to ensure her personal information is kept private.

Continue Reading ...

Trout Unlimited VSP – Veterans and Spouses Find Hope in the Water

John B. Wood
April 30, 2015

For the last few years, Telos has provided funding for Trout Unlimited’s Veterans Service Partnership (VSP), which provides veterans with hope, rehabilitation, and camaraderie through the healing power of water. The program has been a wonderful success; to date, TU Chapters across the country have helped nearly 7,000 wounded veterans, donating over 60,000 volunteer hours. VSP also provides fishing retreats for veterans with physical and emotional scars, and their spouses.

Continue Reading ...

Don’t strike out.

Renate Neely
April 24, 2015

Don’t strike out. Keep your apps and anti virus software up to date to stay in the game.

Continue Reading ...

Spring into action.

Renate Neely
April 16, 2015

Spring into action. Keep track of your digital footprint before it gets out of control.

Continue Reading ...

Effective Project Management Starts Early

Dan Zwart
April 14, 2015

At Telos, we value the opportunity to pore in to future technologists. As a project manger, I’ve been privileged to work beside several recent graduates – and been very pleased with their backgrounds, eagerness and aptitude to absorb new technologies and learn new skills.

Continue Reading ...

Death and Taxes

Renate Neely
April 10, 2015

Nothing is certain except death, taxes, and getting hacked. Have a cyber incident response plan ready.

Continue Reading ...

Defense wins championships.

Renate Neely
April 3, 2015

Defense wins championships. Defend your digital identity with two-factor authentication.

Continue Reading ...

Collaborative Innovation

John B. Wood
March 31, 2015

A program based on a public-private-education template would allow us to find real solutions to real problems, while cultivating a pipeline of graduates with advanced STEM degrees in this critical field of cyber and information security.

Continue Reading ...

Digital spring cleaning

Renate Neely
March 27, 2015

Don’t forget, your digital footprint requires spring cleaning too: Deactivate old online accounts Remove unneeded programs and apps (Finally) get a password manager

Continue Reading ...

Is your bracket busted?

Renate Neely
March 20, 2015

Your bracket may be busted, but your security doesn’t have to be. Only connect to secure, trusted wifi.

Continue Reading ...

Effective cyber defense is more about mindset than budget

Stephen Horvath
March 19, 2015

Implementing an effective cyber defense program is not out of reach for small to medium sized organizations. More important than size of budget, is having the correct mindset and processes for training security professionals, preventing attacks, and responding appropriately when, not if, they occur.

Continue Reading ...

Stay infinitely secure.

Renate Neely
March 14, 2015

Stay infinitely secure. Happy (Ultimate) Pi Day!

Continue Reading ...

The Dress

Renate Neely
March 6, 2015

With cybersecurity, perception may not be reality. Make sure you’re secure as well as compliant. #TheDress

Continue Reading ...

Don’t get lazy.

Renate Neely
February 27, 2015

Don’t get lazy. Stay secure and keep a clean machine. (Did you know Sunday, March 1st is National Pig Day? … yeah, neither did we.)

Continue Reading ...

Parson Brown

Renate Neely
February 20, 2015

He found all the information he needed on social media to pretend that he was Parson Brown.

Continue Reading ...

Links are like a box of chocolates.

Renate Neely
February 13, 2015

You never know what you’re gonna get. Be suspicious of every link, especially those you’re not sure of.

Continue Reading ...

Who Influences You?

Rick Tracy
February 12, 2015

Like it or not, we are all products of our environments and our life experiences. The people we choose to surround ourselves with, personally and professionally, have a huge impact. My career in cybersecurity is a testament to …

Continue Reading ...

Telos Supports the Tampa Bay 2015 Frogman Swim

John B. Wood
February 9, 2015

For the second year, Telos was a corporate sponsor for this three-mile swim across Tampa Bay, commemorating the fallen members within the Naval Special Warfare Community, and raising money for the Naval Special Warfare Foundation

Continue Reading ...

There’s no debate on vaccinating your computer.

Renate Neely
February 6, 2015

There’s no debate on vaccinating your computer.  Install anti-virus software as part of your layered security strategy.

Continue Reading ...

CyberPatriot Regional Round

John Klemens
February 5, 2015

Congratulations are in order for the NerdHerd, an all-girls CyberPatriot team from Stone Bridge High School. They placed second in the Mid-Atlantic Region in the Silver Tier of the Air Force Association’s CyberPartiot national cybersecurity education program!

Continue Reading ...

Physical security of IT assets is critical.

Renate Neely
January 30, 2015

Physical security of IT assets is critical. Don’t let anyone mess around with your equipment.

Continue Reading ...

That moment you should have backed up your data…

Renate Neely
January 23, 2015

That moment you should have backed up your data…

Continue Reading ...

White House Proposals Don’t Address Most Critical Cybersecurity Needs

Robert DuPree
January 22, 2015

But Congress Won’t Act, Either

Continue Reading ...

Add another layer of protection.

Renate Neely
January 16, 2015

Add another layer of protection. Opt for 2-factor authentication.

Continue Reading ...

Three Problems Facing Cyber Professionals When Manually Monitoring Security Controls

Justin Ford
January 14, 2015

A common challenge that all organizations face — whether federal agencies, the Defense Industrial Base (DIB), private organizations, or commercial entities — is regulatory and policy compliance.

Continue Reading ...

Shake ’em off.

Renate Neely
January 9, 2015

Bob’s pop music fandom and cybersecurity awareness had finally merged. Cause the hackers gonna hack hack hack hack hack, and the phishers gonna phish phish phish phish phish. Baby I’m gonna patch, scan, upate, and shake ’em off, shake ’em off.

Continue Reading ...

What’s your resolution?

Renate Neely
January 2, 2015

Is digital security one of your new year’s resolutions?

Continue Reading ...

Power down.

Renate Neely
December 26, 2014

Power down. Look up. Talk with your family. Happy holidays from your friends at Telos.

Continue Reading ...

‘Tis the time for shopping…

Renate Neely
December 19, 2014

‘Tis the time for shopping, Online and in stores; Evil elves are lurking, Hoping for a score. So, take care when you’re buying, Don’t let them blind your eyes; Review your statements daily, Make sure there’s no surprise!

Continue Reading ...

Is your digital security half-baked?

Renate Neely
December 12, 2014

Is your digital security half-baked? Visit STOP. THINK. CONNECT. to learn more about staying safe and secure online.

Continue Reading ...

Too good to be true?

Renate Neely
November 28, 2014

Pssst… Is that promo code too good to be true? Fake promo codes could lead to malicious websites.

Continue Reading ...

Be thankful for family —

Renate Neely
November 21, 2014

and keep them out of your passwords.

Continue Reading ...

How often do you review your online accounts?

Renate Neely
November 7, 2014

Check transactions often to identify a fraud attempt quickly.

Continue Reading ...

The internet is full of cyber-ghouls and goblins.

Renate Neely
October 31, 2014

Know how to stay safe online. StopThinkConnect.org (Happy Halloween!)

Continue Reading ...

Does your small business have a cybersecurity plan?

Renate Neely
October 24, 2014

Go to fcc.gov/cyberplanner and make one today. This week, #NCSAM highlights the need for our small business friends and neighbors to create a cybersecurity plan. Visit http://www.fcc.gov/cyberplanner to make yours today!

Continue Reading ...

Cybersecurity touches everything.

Renate Neely
October 17, 2014

Get to know how the Internet of Things impacts your life.

Continue Reading ...

Stop. Think. Connect.

Renate Neely
October 3, 2014

Cybersecurity is shared responsibility.

Continue Reading ...

Online accounts add up quickly.

Renate Neely
September 19, 2014

Keep track of your logins in a password manager. How many online accounts do you have? Are they secure?

Continue Reading ...

Making new friends is good.

Renate Neely
September 12, 2014

Sharing too much… not so much.

Continue Reading ...

It’s good for the environment.

Renate Neely
September 5, 2014

Not for password security.

Continue Reading ...

Is the URL spelled correctly?

Renate Neely
August 29, 2014

A common type could land you in a phishing trap.

Continue Reading ...

You’re leaving digital fingerprints.

Renate Neely
August 22, 2014

Know what information your browser is sharing.

Continue Reading ...

Beware of buggy sites.

Renate Neely
August 15, 2014

Don’t click on pop-ups, and update your security software frequently.

Continue Reading ...

Don’t get thrown by a sudden crash.

Renate Neely
August 8, 2014

 Quit horsing around and back up your files.

Continue Reading ...

Why did the chicken cross the road?

Renate Neely
August 1, 2014

To do his online banking from a secure wi-fi location.

Continue Reading ...

It’s a scary world out there.

Renate Neely
July 25, 2014

Katy did you remember to update your anti-virus software?

Continue Reading ...

Don’t pull the wool over your eyes.

Renate Neely
July 18, 2014

Baaa’d online security habits can lead you astray.

Continue Reading ...

Protect your digital nest egg.

Renate Neely
July 11, 2014

Never do online banking from a public hotspot.

Continue Reading ...

Cybersecurity isn’t the same thing as information assurance.

Frank Johnson
July 7, 2014

Is a paper shredder really a cybersecurity solution?

Continue Reading ...

Don’t get burned.

Renate Neely
July 4, 2014

Copy important files to an external drive and store in a safe place. Wishing you a happy and safe 4th of July!

Continue Reading ...

Protected: The Inevitability of Change – Transitioning to the NIST Risk Management Framework

Hugh Barrett
June 30, 2014

There is no excerpt because this is a protected post.

Continue Reading ...

Bee vigilant.

Renate Neely
June 27, 2014

 Maintain your digital footprint, and don’t get stung by forgotten accounts.

Continue Reading ...

Protect yourself from harmful internet rays.

Renate Neely
June 20, 2014

Update your firewall and antivirus software.

Continue Reading ...

Protected: Cyber Insurance Could Benefit from A&A and Continuous Monitoring Processes

Rick Tracy
June 18, 2014

There is no excerpt because this is a protected post.

Continue Reading ...

Wh0zY0uRd@dDY?

Renate Neely
June 13, 2014

Luke’s father has a secure password — does yours? Here’s a fun TGIF to kick off Father’s Day weekend.

Continue Reading ...

A public hotspot is like a beach without a lifeguard…

Renate Neely
May 30, 2014

Surf at your own risk!

Continue Reading ...

Don’t over share.

Renate Neely
May 23, 2014

Once you post it, you can’t take it back. Are you SURE you want to share that? Think twice before you share, post, or tweet!

Continue Reading ...

Antivirus software doesn’t age like fine wine.

Renate Neely
May 16, 2014

Update your definitions daily!

Continue Reading ...

Protected: The House That LPTA Built

John B. Wood
May 12, 2014

There is no excerpt because this is a protected post.

Continue Reading ...

Renate Neely
May 9, 2014

Do you really A special Mother’s Day TGIF… don’t accept friend requests from people you don’t know!

Continue Reading ...

A tear is fair… but a shredder is better.

Renate Neely
May 2, 2014

 Always shred personal and financial paperwork.

Continue Reading ...

Be smart like your phone.

admin
April 24, 2014

Be smart like your phone. Know how to remotely track and wipe your device.

Continue Reading ...

Don’t put all of your eggs in one basket.

admin
April 18, 2014

Don’t put all of your eggs in one basket. Use multiple passwords across your accounts.

Continue Reading ...

Don’t make Heartbleed worse.

admin
April 11, 2014

Don’t make Heartbleed worse. Make shore those “change your password” emails are legit.

Continue Reading ...

Spring Cleaning?

admin
April 4, 2014

Spring cleaning? Keep your work area clear of all personally identifiable information (PII).

Continue Reading ...

Protected: Continuous Monitoring: Agents vs Vulnerability Scanners

Rick Tracy
March 31, 2014

There is no excerpt because this is a protected post.

Continue Reading ...

Your smartphone is a computer.

admin
March 28, 2014

Remember… Your smartphone is a computer, which means it is just as susceptible to hacking and malware.

Continue Reading ...

Don’t jailbreak your mobile device.

admin
March 21, 2014

Don’t jailbreak your mobile device. Unverified apps pose a greater security risk.

Continue Reading ...

Be aware of your surroundings.

admin
March 14, 2014

Enjoy your St. Patty’s Day celebrations this weekend… but be aware of your surroundings, and don’t leave your smartphone unattended in public.

Continue Reading ...

The IRS never collects taxpayer information by email.

admin
March 7, 2014

The IRS never collects taxpayer information by email. Don’t fall for tax related phishing attempts, and forward any phishy IRS emails to phishing@irs.gov.

Continue Reading ...

Bigger target, bigger problems.

admin
February 28, 2014

Whaling is a phishing attack that targets high-profile users, like C-Suite executives. Bigger target, bigger problems for the company. Don’t let your senior executives become whaling victims!

Continue Reading ...

Only view event coverage on official websites.

admin
February 21, 2014

Malicious actors create fake Olympic websites to deliver malware to unsuspecting fans. Only view event coverage on official websites.

Continue Reading ...

Spread love… not malware.

admin
February 14, 2014

Spread love… not malware. Beware of malicious Valentine’s Day e-cards!

Continue Reading ...

Links are like a box of chocolates.

Renate Neely

Links are like a box of chocolates. You never know what you’re gonna get. Be suspicious of every link, especially those you’re not sure of.

Continue Reading ...

Before you walk away…

admin
February 7, 2014

Always lock your computer (by pressing CTRL + ALT + DELETE and hitting “Enter”) before walking away from it.

Continue Reading ...

Don’t click unsubscribe in unwanted email.

admin
January 31, 2014

Clicking the “unsubscribe” link in unwanted email may actually sign you up for more spam — or worse, it might be a malicious link.

Continue Reading ...

Don’t post it for all to see.

admin
January 17, 2014

You’d think this would go without saying… but, don’t post passwords on your computer monitor.

Continue Reading ...

Hello, I’m… not suspicious at all.

Renate Neely
January 10, 2014

Never accept friend requests from people you don’t know — even if they look friendly.

Continue Reading ...

New year, new passwords.

admin
January 3, 2014

New year, new passwords. January is a great time to create a new, strong password for each account.

Continue Reading ...

Weekend getaway?

Renate Neely
December 27, 2013

Think twice before sharing travel plans on social media. Many folks travel to visit family and friends this time of year… but think twice before sharing those travel plans on social media.

Continue Reading ...

Share the gift of online security.

Renate Neely
December 20, 2013

This holiday season, take time to ensure your family is aware of cybersecurity basics.

Continue Reading ...

Don’t click it if you don’t understand it.

Renate Neely
December 13, 2013

If you don’t understand a dialogue box, don’t click it!

Continue Reading ...

Protected: In a Networked World, Physical and IT Security Can Be Indistinguishable

Rick Tracy
December 2, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Don’t forget security on Cyber Monday.

Renate Neely
November 29, 2013

Only make payments on secure websites. Don’t forget security during the excitement of Cyber Monday. Only make online purchases from websites with https (the S stands for SECURE). Pass it along!

Continue Reading ...

Passwords are like toothbrushes.

Renate Neely
November 22, 2013

They shouldn’t be shared — even with people you know and trust.

Continue Reading ...

Protected: Cybersecurity — A Story of Idioms

Maj. Gen. Paul Capasso USAF (Ret.)
November 19, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Don’t get burned.

Renate Neely
November 15, 2013

Never click links in web-based pop-ups.

Continue Reading ...

Beware of scareware.

Renate Neely
October 25, 2013

Don’t get ricked by pop-ups that claim your computer needs to be treated with additional security software. Trick or Treat? Beware of #scareware… cybercriminals feed on fear.

Continue Reading ...

Don’t be a sucker.

Renate Neely
October 18, 2013

Know how to spot a phishing attack.

Continue Reading ...

Protected: The Shared Responsibility of Cybersecurity

Rick Tracy
October 14, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Don’t fall behind.

Renate Neely
October 11, 2013

Social media #privacy settings change often. Stay current to stay secure.

Continue Reading ...

Patch your apps.

Renate Neely
October 4, 2013

Download the latest app updates to stay secure. Help us kick off National Cyber Security Awareness Month (#NCSAM), by spreading the word about online safety and security with your friends and family. Here’s a simple tip – Patch your mobile apps. Downloading the latest version of an application will often

Continue Reading ...

Lock it when you leave it.

Renate Neely
September 27, 2013

Never leave your computer unlocked when you walk away. May seem like a no-brainer, but locking your computer when you walk away from your desk is a great first step to securing your information.

Continue Reading ...

You are the key to your online safety and security.

Renate Neely
September 20, 2013

No one can do it for you. YOU are the key to your online safety and security.

Continue Reading ...

Hold your aces.

Renate Neely
September 13, 2013

Read privacy policies to understand how your personal information is being used or disclosed.

Continue Reading ...

Watch what you post online.

Renate Neely
September 6, 2013

With date and place of birth, cyber criminals are 98% of the way towards stealing an identity.

Continue Reading ...

Turn. It. Off.

Renate Neely
August 30, 2013

Disable auto-connection to wireless networks on all your electronic devices.

Continue Reading ...

Don’t click ‘Agree’

Renate Neely
August 23, 2013

…without reading the user agreement fine print. Is your data being shared with a third party? You should know. Don’t click ‘agree’ without reading the fine print of any user agreement.

Continue Reading ...

Protected: The Blind Men and the Cybersecurity Elephant

Maj. Gen. Paul Capasso USAF (Ret.)
August 19, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Start early.

Renate Neely
August 16, 2013

Talk to your kids about online safety and security as soon as they begin using a computer or mobile device. A back-to-school #TGIF for parents: Start early. Talk to your kids about online safety and #security as soon as they begin using a computer or mobile device. Please share!

Continue Reading ...

Safety first –

Renate Neely
August 9, 2013

Don’t get stuck using the same password for all accounts.

Continue Reading ...

It isn’t a game.

Renate Neely
August 2, 2013

Be mindful of what you share online and protect your personally identifiable information (PII).

Continue Reading ...

Summer fun survival guide

Renate Neely
July 26, 2013

Headed to the beach this summer? Be wary of unprotected hotspots!

Continue Reading ...

You know what they’re eating.

Renate Neely
July 19, 2013

Do you know what they’re tweeting? Use parental controls and monitor what your kids are doing online.

Continue Reading ...

Don’t leave it to chance.

Renate Neely
July 12, 2013

Take charge of your online reputation.

Continue Reading ...

Protect your digital John Hancock.

Renate Neely
July 5, 2013

Never share your password.

Continue Reading ...

Don’t be a silly goose.

Renate Neely
June 28, 2013

Update your browser for the latest security features.

Continue Reading ...

Protected: Aviation Channeling: A Working Model for Public-Private Partnerships

Dawn E. Lucini
June 17, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Do you really know who’s watching?

Renate Neely
June 13, 2013

Limit the personal information you share on social networks.

Continue Reading ...

Protect your private data.

Renate Neely
May 31, 2013

Delete your cookies.

Continue Reading ...

Handle with Care!

Renate Neely
May 24, 2013

Scan attachments before opening.

Continue Reading ...

Is your anti-virus software out of style?

Renate Neely
May 10, 2013

Always keep your anti-virus software up-to-date.

Continue Reading ...

Focus on internet security.

Renate Neely
May 3, 2013

Remain vigilant and report suspicious activities.

Continue Reading ...

Don’t take the bait

Renate Neely
April 26, 2013

Typos, bad grammar and misspelled brand names are all signs of a phishing email.

Continue Reading ...

Don’t be a joker.

Renate Neely
April 19, 2013

Update your firewall.

Continue Reading ...

Size matters.

Renate Neely
April 12, 2013

Passwords should be at least 14 characters long.

Continue Reading ...

She’s a purrrfect companion.

Renate Neely
April 5, 2013

But a terrible password. Pets are great companions, but they make terrible passwords. Remove your pet’s name as your password.

Continue Reading ...

Practice good cyber hygiene.

Renate Neely
March 29, 2013

Regular software patches, password changes, firewall and antivirus updates. Remember the basics of good cyber hygiene, including: regular software patches, password changes, firewall and antivirus updates. Pass it along!

Continue Reading ...

USB Scan for Viruses

admin
March 22, 2013

TGIF! USB – Scan for viruses… each time you connect a flash drive to your computer. Even if you receive the thumb drive from a friend or coworker — you never know what sort of viruses may be lurking. Pass it along! You don’t need to be a cybersecurity expert

Continue Reading ...

Recycling is great, but not for passwords.

Renate Neely
March 15, 2013

 1 account, 1 password. Reusing the same password for multiple accounts is dangerous.

Continue Reading ...

Protected: Continuous assessment is great, but lets not stop there.

Rick Tracy
March 11, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

How HOT is your WiFi Hotspot?

Renate Neely
March 7, 2013

WiFi hotspots are convenient, but not secure… surf with caution.

Continue Reading ...

Protected: Risk-based Decision Making. It’s a business thing.

Rick Tracy
January 9, 2013

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: Why do some people think compliance is a 4-letter word?

John Klemens
November 13, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: Efficient and Effective Solutions for Our Nation’s Airports

John B. Wood
October 30, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: Continuous is for people, too.

Rick Tracy
September 25, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: Beyond Continuous Monitoring: Continuous Remediation is the New Frontier

Rick Tracy
September 12, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: Despite Criticism, Compliance Plays Important Role in Security Process

Rick Tracy
August 20, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: STEM + the Arts = STEAM

John B. Wood
May 7, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: A 20 Year Success Story

John B. Wood
February 23, 2012

There is no excerpt because this is a protected post.

Continue Reading ...

Spear Phishing: Dont Take the Bait!

John B. Wood
January 16, 2012

The internet is swarming with malicious hackers, looking for easy targets. Keep your eyes open for phishing and spear phishing attacks, and when in doubt… don’t click the link!

Continue Reading ...

Protected: Network Intrusion Attempts and the Bigger Picture of Cyberwar

John B. Wood
November 17, 2010

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: SmartPhones Extend the Perimeter of Your Network and Increase Risk

Rick Tracy
October 20, 2010

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: My “Double Bottom Line”

John B. Wood
August 25, 2010

There is no excerpt because this is a protected post.

Continue Reading ...

Protected: The Importance of STEM Education

John B. Wood
June 21, 2010

There is no excerpt because this is a protected post.

Continue Reading ...