Contributor Biography

Home  /  Blogs  /  Contributors  /  Contributor Biography
Avatar

Cybersecurity News in Review

Robert DuPree
September 13, 2019

This week’s cybersecurity news in review includes articles on NIST’s draft privacy framework, final release of OMB’s TIC 3.0 security policy, DHS’ expected fall rollout of a new cybersecurity dashboard for federal agencies, the need to protect federal IoT devices as their use skyrockets, upgrades for a DHS cyber threat information sharing to boost utilization, and a pilot program to look at a potential new source of cyber talent for the government. 

Continue Reading ...

September 11th – Reflecting on this 18th anniversary

John B. Wood
September 11, 2019

It’s hard to believe that 9/11 happened 18 years ago. For those of us that were there and lost loved ones in those horrific attacks, even though time goes on and we grow older, we’ll never forget.

Continue Reading ...

JEDI, Why “Disinformation” and Protest Culture Need to Stop

John B. Wood
September 5, 2019

In my last JEDI blog post, I wrote about how important the DoD’s broader enterprise cloud effort is to America’s warfighters. JEDI is the first, single cloud step in this enterprise-wide cloud process, but it has been the subject of repetitious misinformation and protests over its now 19-month (and still running) course.

Continue Reading ...

Talking JEDI and Why U.S. Warfighters Need It NOW!

John B. Wood
September 3, 2019

In light of the continued handwringing and misinformation around Pentagon’s JEDI, and DoD’s latest fact-checking, I wanted to take this opportunity to address the contract.

Continue Reading ...

Infinity and Beyond: Strategic Technology Trends into the 2020’s

Keith Wojciech
August 27, 2019

In our increasingly connected world where IT solutions have not only become ubiquitous, but in many cases, necessary for everyday living, digital change is all around us and will require even more flexible and versatile business models and strategies to compensate for such rapid technology evolution.

Continue Reading ...

Reciprocity: The Good, The Bad and The Ugly

Gianna Price
August 22, 2019

There is a lot of buzz around the Defense Information Systems Agency’s recent announcement that permits DoD mission partners and service components to host DoD Impact Level 2 data in FedRAMP-authorized (Moderate Baseline) cloud environments without waiting for an explicit DoD-written authorization. 

Continue Reading ...

What Does the DoD’s New Cybersecurity Maturity Model Certification Mandate Mean for You?

Kayla Walters
July 29, 2019

Over 300,000 companies will now be required to comply with the CMMC… are you ready?

Continue Reading ...

Establish a Cyber Risk Management Program with Cybersecurity Stepping Stones

Rick Tracy
July 25, 2019

Want to establish a cyber risk management program, but don’t know where to start? Here are 18 security controls most organizations should consider implementing right now.

Continue Reading ...

Could NIST SP 800-171 Be A Model for the Cyber Insurance Industry?

Rick Tracy
July 10, 2019

As discussed in a recent blog post, NIST SP 800-171 is a compliance requirement intended to improve the overall security posture of the 65,000 or so organizations that do work for the federal government. 

Continue Reading ...

NIST SP 800-171B: The Natural Evolution of NIST SP 800-171

Rick Tracy
June 25, 2019

As expected, earlier this week NIST released DRAFT NIST SP 800-171B, which includes 33 enhanced Controlled Unclassified Information (CUI) requirements for critical systems and high value assets.  NIST indicates the focus of these new requirements is on organizations that are likely targets of advanced persistent threat (APT) attacks. 

Continue Reading ...

I’m Ready, I’m Set… Now It’s Time to Understand the FedRAMP Assessment Process!

Milica Green
June 24, 2019

I was happy to participate in a webinar a few weeks ago with my colleague, Corey Clements, director, FedRAMP 3PAO and Advisory for SecureIT.

Continue Reading ...

Secure the Supply Chain by Eliminating the Cyber Attack Surface

Tom Badders
June 12, 2019

According to the Symantec 2019 Internet Security Threat Report, supply chain attacks spiked 78 percent in 2018.  Not only is the volume and severity of these attacks growing, so is their sophistication.

Continue Reading ...

Hyperscale Security Data for Continuous Risk Monitoring

Stephen Horvath
June 6, 2019

If you’re planning to attend AWS PSS DC next week, I hope you’ll join us for our session. It will be a technical conversation on how the exponential growth of data, and other challenges drove the development of the new framework and architecture of Xacta.io.

Continue Reading ...

Ready for Your FedRAMP Assessment? What to Expect While Working With Your 3PAO

Milica Green
June 4, 2019

If you’d like a clearer picture of where your company stands today, as well as obtain a broad roadmap for future steps on the path to FedRAMP success, join me for on Thursday, June 6 at 2pm ET for a free webinar titled: “I’m Ready for My FedRAMP Assessment, Now What?”

Continue Reading ...

The Alliance for Digital Innovation: Supporting Public Sector Innovation and Acquisition Reform

John B. Wood
May 22, 2019

The Alliance for Digital Innovation (ADI) is a new, independent voice calling for greater use of commercial innovation and emerging technologies throughout government.  ADI was founded by like-minded technology companies and industry thought leaders wanting to promote positive change in how the public sector views, acquires, and utilizes innovative technology.  

Continue Reading ...

Got COTS? Why Commercial Offerings Are the Preferred and Legally Mandated Choice for Federal Agencies

Telos Corporation
May 16, 2019

For more than 20 years, federal law has required agencies to use commercial off-the-shelf (COTS) solutions unless there’s a compelling reason to use a government off-the-shelf (GOTS) solution.

Continue Reading ...

Improving Endpoint Security via Obfuscation and Managed Attribution

Tom Badders
April 18, 2019

Organizations’ network communications depend on the internet. This week, we announced enhancements to Telos Ghost, a network infrastructure provided as a service that secures your organization’s valuable network resources by providing high levels of obfuscation and encryption.

Continue Reading ...

What Does the RMF Prepare Step Mean for Security and Compliance Practitioners?

Gianna Price
April 15, 2019

Last week, Xacta® solutions architect Gianna Price presented alongside her colleague, VP of strategy and vision Steve Horvath, about the revised NIST RMF and its Prepare step.

Continue Reading ...

A Night of Female Empowerment at the TAPS Captain Marvel Screening

John B. Wood
April 9, 2019

Recently, Telos had the honor of hosting TAPS families, members of the U.S. Air Force, and Telos employees and their families at the Smithsonian National Air and Space Museum for a screening of the blockbuster movie Captain Marvel.

Continue Reading ...

Addressing the Cyber Workforce Shortage and Supporting FIRST Tech Challenge

John B. Wood
March 19, 2019

One solution to the cyber workforce shortage that I stress often is starting STEM education earlier, as it generates interest, introduces students to a career opportunity they may not have known otherwise (especially for young girls), and creates a knowledge base that will ultimately help students as they continue their education.

Continue Reading ...

Connolly-Meadows – An acceleration lane for FedRAMP

Milica Green
March 12, 2019

Bi-partisan legislation introduced late in the last Congress, and expected to be reintroduced in the new Congress, by Reps. Gerry Connolly (D-V.A.) and Mark Meadows (R-N.C.) to update and improve the FedRAMP process would substantially boost the government’s efforts to make FedRAMP more effective.

Continue Reading ...

A Real-World Look at Education and the “Cybersecurity Workforce Gap”

John B. Wood
March 6, 2019

The Center for Strategic and International Studies (CSIS) recently published a report on “The Cybersecurity Workforce Gap” that contains a number of well-documented statements describing the challenges organizations face in hiring cybersecurity professionals with the needed skillsets.

Continue Reading ...

Get Ready, Get Set… Get FedRAMP Authorized!

Milica Green
February 20, 2019

Telos compliance expert Milica Green recaps the topics and advice she presented in our “Getting to FedRAMP Ready: What You Need to Know” webinar with Rackspace’s Brad Schulteis.

Continue Reading ...

The Irony of RMF Step 0

Gianna Price
February 13, 2019

In my previous post, I mentioned the addition of the Prepare step, often referred to as Step 0, in the revised NIST SP 800-37 Risk Management Framework, a.k.a. RMF 2.0. The Prepare step, which aligns with the core of the NIST Cybersecurity Framework, expands the conversation from system-focused vulnerability management into organizational risk management.  

Continue Reading ...

Tampa Bay Frogman Swim Honors the Fallen and Benefits Naval Special Warfare Foundation

John B. Wood
January 28, 2019

It is always a privilege to be able to support this event and the families of America’s fallen heroes. Thank you and congratulations to all who participated in the Frogman Swim this year.

Continue Reading ...

RMF 2.0: Are you “Prepare’d”?

Gianna Price
January 24, 2019

The updated framework does a great job emphasizing organizational risk management, but the first step (literally) is being prepared.

Continue Reading ...

Cyber Reflections: An Open Letter to Mr. Claus

Maj. Gen. Paul Capasso USAF (Ret.)
December 14, 2018

Holiday greetings!  I can’t believe how quickly time has passed.  A lot has happened in the world of cyber over the four years since I wrote you last.

Continue Reading ...

Cheering for Loudoun Teams Competing in the CyberPatriot Challenge

John B. Wood
November 26, 2018

Telos Corporation is proud to sponsor 17 teams from the Academies of Loudoun in the 11th CyberPatriot National Youth Cyber Defense Competition.

Continue Reading ...

Cyber Reflections: Attention Online Shoppers

Maj. Gen. Paul Capasso USAF (Ret.)
November 19, 2018

By following a few simple guidelines this holiday season you can have a positive “IMPACT” on your pocketbook and stay one step ahead of potential fraudulent cyber activities. Happy Shopping!

Continue Reading ...

Our Rising Star: Recognizing Young Talent in the Workplace

John B. Wood
November 16, 2018

We are thrilled that one of our own, Danielle Lauhoff, was recognized in the 2018 class of Rising Stars.

Continue Reading ...

Veterans Day 2018 – A celebration of heroes in the workplace.

John B. Wood
November 9, 2018

This Veterans Day is an opportunity to honor the contributions our heroes continue to make long after leaving the service.

Continue Reading ...

Cyber Reflections: Trick or Treat During Cybersecurity Month

Maj. Gen. Paul Capasso USAF (Ret.)
October 23, 2018

This month is the time to reflect on how we can better secure our cyber surroundings.  If we can improve upon the key messages of this year’s cybersecurity month, we should be able to remove the “tricks” and increase the “treats” of the web by reducing the risks cyber threats pose to our global community.  Happy Halloween!

Continue Reading ...

Cyber Reflections: Creating Space for Users to Make Informed Cybersecurity Decisions

Maj. Gen. Paul Capasso USAF (Ret.)
September 26, 2018

As society becomes more connected and more dependent on 1’s and 0’s to handle everyday life, adding a focus on the human element of cybersecurity to today’s technology arsenal may help quell the problem at hand. 

Continue Reading ...

The FedRAMP Plan of Action and Milestones (POA&M): Rigorous Guidance for Tracking and Addressing System Weaknesses

Milica Green
September 20, 2018

In my last blog post, I explained the importance of continuous monitoring in the FedRAMP process to assure that security controls are implemented correctly and operate as intended.  Today I’ll cover the importance of having a living action plan to ensure that any system weaknesses or deficiencies are being addressed.

Continue Reading ...

September 11, 2018 – A Reflection on American Resilience

John B. Wood
September 11, 2018

As we recognize the 17th anniversary of these attacks, I am reminded of the personal losses I suffered that day, as well as the heroic stories of so many. I think about the journey of grief and healing.

Continue Reading ...

Xacta.io: The Next Step in our Innovation Journey

Rick Tracy
September 10, 2018

Recently, Telos announced Xacta.io – our next-generation cyber risk management solution that leverages  cutting-edge technologies to ensure massive scalability, ease of access to more types of data at hyper scale, and the ability to deploy in the cloud, on premises, or in a hybrid environment.

Continue Reading ...

Telos Internship Program – Preparing Future Generations for the Workforce

John B. Wood
August 22, 2018

As another summer internship program comes to an end, I want to take the time to say how proud I am of what our interns have learned and accomplished.

Continue Reading ...

Girl Scouts’ Cybersecurity Initiative Provides Hope for Cyber Workforce Gender Deficit

John B. Wood
August 17, 2018

Telos partner Palo Alto Networks has teamed up with Girl Scouts USA to create 18 national cybersecurity badges for girls in grades K-12.

Continue Reading ...

What You Need to Know about FedRAMP Continuous Monitoring.

Milica Green
August 9, 2018

FedRAMP requires cloud service providers to periodically validate that their security controls are implemented and operating correctly. Here’s what you need to know.

Continue Reading ...

AWS Security Competency: Telos Achieves the Next Step in the Partnership Program

Lisa Conway
August 7, 2018

Telos appreciates the support of AWS and the C2S sponsor in creating a case study that helped us earn the Security Competency.

Continue Reading ...

The FedRAMP Deadline for TLS 1.1 or Higher is July 1st 2018 – But is the TLS 1.1 Enough?

Milica Green
June 28, 2018

You may want to skip Transport Layer Security (TLS) 1.1 and go right to 1.2 or 1.3.

Continue Reading ...

AWS Government Competency: Telos Reaches Another Partnership Milestone

Lisa Conway
June 25, 2018

The Government Competency designation solidifies Telos as an experienced government partner by meeting their high-bar criteria.

Continue Reading ...

The Quest for Continuous ATO

Rick Tracy
June 18, 2018

Download the new case study from AWS and Telos featuring the U.S. Intelligence Community

Continue Reading ...

Telos and AWS: Proud of Our Partnership, Looking Forward to the Public Sector Summit

John B. Wood
June 11, 2018

I am proud that Telos Corporation is a Diamond Sponsor of this year’s AWS Worldwide Public Sector Summit in Washington, D.C.  It’s a reflection of our commitment to our partnership with AWS, which has grown exponentially over the past two-and-a-half years. Just last month we were honored to have Teresa

Continue Reading ...

Mark Zuckerberg Opens a Door for Greater Privacy Protection

Rick Tracy
May 2, 2018

Mark Zuckerberg’s pledge to make GDPR information available to all Facebook users may open the floodgates to more data-privacy legislation.

Continue Reading ...

Telos Achieves Advanced Technology Partner Status in AWS Partner Network

Lisa Conway
April 11, 2018

Less than a year since Xacta 360 became available in the AWS Marketplace, Telos is recognized by Amazon Web Services (AWS) as an Advanced Technology Partner.  The advanced tier designation required a rigorous technical validation by AWS, as well as proof of product maturity and adoption among AWS customers.

Continue Reading ...

The Shutdown Ends, But Elected Leaders Shouldn’t Expect Applause

Robert DuPree
January 30, 2018

Congress may have ended the brief government shutdown after three days, but nobody in government should be expecting applause.  This doesn’t even warrant a “golf clap.” That’s because passing another CR is what I call the “BME” – bare minimal effort.

Continue Reading ...

Xacta 360 Offers an Easy Button for Upgrading to New Versions of NIST SP 800-53

Rick Tracy
December 12, 2017

News of a new version of NIST SP 800-53 is enough to make many information security professionals want to cry.  The truth is, this upgrade process can be painful when performed manually via spreadsheets, and is magnified based on the number of systems that need to be upgraded.

Continue Reading ...

AWS, Google and Microsoft in Agreement on the State of Cloud Security and Compliance

John B. Wood
December 7, 2017

Note: This piece originally appeared on the Northern Virginia Technology Council (NVTC) Blog on December 5, 2017.   At the second annual NVTC Capital Cybersecurity Summit, I was privileged to moderate an amazing panel discussion on “The State of Cloud Security and Compliance: Dispelling the Myth of Cloud Insecurity.” What made

Continue Reading ...

IoT Insecurity – At What Expense this Holiday Season?

Maj. Gen. Paul Capasso USAF (Ret.)
December 6, 2017

With the holiday shopping season upon us, we need to be aware of the gifts we give to our children and loved ones.  The potential of our children becoming pawns on the back of IoT insecurity should be a “wake-up” moment for government, industry and individuals alike to take seriously the security of our personal information and privacy in the world of IoT.

Continue Reading ...

Q&A with NIST’s Matt Barrett on CSF Adoption

Rick Tracy
November 29, 2017

To learn more about the adoption rates of the CSF since its introduction in 2014, Rick Tracy spoke with Matt Barrett, Program Manager for the NIST CSF.

Continue Reading ...

Connecting with Our Veterans

John B. Wood
November 10, 2017

You may not have a personal connection to the military, but you don’t need that connection to truly be grateful for the sacrifices our military and their families make to protect our country.

Continue Reading ...

Sustained Commitment to IT Modernization Will Realize Security Benefits, Savings

Robert DuPree
November 6, 2017

The federal government is on the precipice of a huge move, as they strive to cut the cord to outdated legacy IT systems and embrace the cloud — a move far too important to be delayed due to inadequate funding.

Continue Reading ...

The NIST CSF and the Freedom of Flexibility

Rick Tracy
October 12, 2017

The CSF isn’t linear and it’s not static; it is a living, breathing framework that is constantly evolving. For so many companies and organizations it’s pivotal to have a framework that evolves as the organization does, so that your risk management process and security infrastructure can adapt to changes and remain strong.

Continue Reading ...

NIST RMF Workshop: Approaches to SDLC Risk Management

Stephen Horvath
September 28, 2017

The software development life cycle (SDLC) is a considerable topic of conversation as it relates to cybersecurity.  In fact, many features of our Xacta 360 product have been built to aid developers in understanding exactly what information assurance controls they are responsible to comply with as they build systems that will be deployed in the federal government.

Continue Reading ...

Survey Says: Frameworks Are Good, Compliance Could Be Better

John B. Wood
September 26, 2017

This year at AWS Public Sector Summit, the Telos team conducted a survey of the public sector technology community. I’m happy to announce we’ve released the results of that survey in the 2017 Public Sector Cyber Risk Management Report.

Continue Reading ...

Your Identity History and the FBI

Keith Wojciech
September 20, 2017

Equally as important as your identity, is your identity history. The new Telos ID IDVetting™ service makes obtaining your FBI Identity History Record easier than ever.

Continue Reading ...

Cyber Shouldn’t Be Overlooked in Naval Collision Investigations

Maj. Gen. Paul Capasso USAF (Ret.)
August 28, 2017

It is yet to be determined what role cyber vulnerabilities played in the tragic naval collisions – though the questions must be asked.

Continue Reading ...

Ensuring our security; celebrating our freedom

John B. Wood
July 3, 2017

The Cogswell Award for outstanding industrial security achievement is especially meaningful to Telos because it reflects key components of our Core Values – integrity and trust.

Continue Reading ...

Memorial Day Ruck to Remember – 60 to 60

Lyndsey Hoffmann
May 25, 2017

As a cybersecurity company serving federal customers, Telos has the privilege of supporting our military on a daily basis. It’s a great privilege to provide these solutions and support to the warfighter as our “day-job,” but I think it’s just as important to remember these individuals and the sacrifices they make for our freedom when we’re off the clock.

Continue Reading ...

A Tale of Two Frameworks: The NIST CSF and NIST RMF Are Not the Same

Rick Tracy
May 18, 2017

One of the most important aspects of the new Cybersecurity Executive Order (EO) is also the aspect of the order causing the most confusion.

Continue Reading ...

Statement on the Cybersecurity Executive Order

John B. Wood
May 11, 2017

Earlier today, President Trump signed the long awaited “Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” Even the most rigorous processes for managing modern cyber threats require a foundation of modern technology. Today’s cybersecurity executive order is an important step forward in the modernization of

Continue Reading ...

Encouraging NIST CSF Adoption with Automation

Rick Tracy
May 3, 2017

Automation has a critical role to play when operationalizing the NIST Cybersecurity Framework (CSF). Emerging tools can help organizations embrace the CSF without spending heavily to meet compliance requirements. This will further reduce barriers to deploying the CSF, increasing the number of “native speakers” and continuing a sea change in

Continue Reading ...

Trump Gives Green Light on Federal IT Modernization

Robert DuPree
April 13, 2017

According to the White House, President Trump said at a meeting April 11 with business leaders that his Administration plans a “massive program to modernize” government computer systems.  Citing the high cost of simply maintaining current systems, the President indicated it would be better for the taxpayers to buy entirely

Continue Reading ...

Encryption is Key to Building a Secure Identity Management Solution

Keith Wojciech
March 20, 2017

In a non-descript courtyard on the grounds of the CIA in Langley, Virginia, sits a sculpture of copper plates resembling a large scroll inscribed with hundreds of Latin characters. Created by American artist Jim Sanborn 25 years ago, the 12-foot-high sculpture entitled “Kryptos” contains four hidden messages within those Latin

Continue Reading ...

9/11 and Today’s Aviation Security Infrastructure

Keith Wojciech
February 1, 2017

After 9/11, the federal government improved our nation’s aviation security infrastructure by increasing efforts to vet the backgrounds of aviation workers.

Continue Reading ...

IT Industry Says of the Cloud: Look What We Can Do, Securely.

Stephen Horvath
January 24, 2017

My perspective on the cloud has shifted. I have admiration and respect for organizations like AWS that have defined a market by making the incredible achievable – not by selling a solution, but by promoting the idea that individuals can invent incredible things, and giving them the platform to do so.

Continue Reading ...

LPTA Reform – A Welcome Change in DoD’s Cyber Security Acquisition

Robert DuPree
January 12, 2017

To protect our national interests, cyber security contracts need to be awarded based on quality or value, not price. LPTA is a welcome change.

Continue Reading ...

‘Tis the Season

Maj. Gen. Paul Capasso USAF (Ret.)
December 2, 2016

Holiday cyber criminals are out in full force. Follow these suggestions cyber tips to keep your holiday season merry and bright.

Continue Reading ...

The Next Chapter of Compliance – To the Cloud!

Rick Tracy
November 29, 2016

The next chapter of IT security and risk compliance management, is compliance in the cloud.

Continue Reading ...

Thanksgiving Note

John B. Wood
November 23, 2016

Thanksgiving could not have come at a better time.

Continue Reading ...

Insider Threats and Balancing Security and Privacy in Your Organization

C.A. Carpenter
November 16, 2016

Understanding the insider threat requires looking beyond conventional technologies, and using a socio-technical approach… all while balancing privacy and security.

Continue Reading ...

The Fingerprints of Adoption

Keith Wojciech
November 10, 2016

How long is the adoption process? If you’re a prospective parent, it can seem like an eternity. But tools like Telos ID’s IDVetting can help you accelerate the adoption process.

Continue Reading ...

Easing the CSF Implementation Burden with Xacta

Rick Tracy
November 7, 2016

Cyber risk management is a complex business process requiring extensive explanation and guidance. However, many companies do not have the time or expertise necessary to understand, implement, and operationalize such frameworks.

Continue Reading ...

Can Your Thermostat Take Down the Internet?

Tom Badders
September 27, 2016

The recent Krebs attack is a case study in exploiting IoT for DDoS.

Continue Reading ...

Federal CISO Faces Big Challenges – Let’s Keep Politics Out of It

John B. Wood
September 22, 2016

Let’s hope the next Administration rises above their own politics, and keeps the momentum going in protecting our national cyber security.

Continue Reading ...

It’s Back to School for Kids and Cyber Security Pros

Katie Sheldon Hammler
September 6, 2016

Leave no network behind: What private industry needs to know about preparing for NIST SP 800-171.

Continue Reading ...

Cyber Hide and Seek

Maj. Gen. Paul Capasso USAF (Ret.)
August 18, 2016

As we can learn from the hunters and the hunted draped in camouflage – the best way to defend yourself in cyberspace, is to never be seen at all.

Continue Reading ...

IT GRC Geek Speak: Controls Inheritance

Rick Tracy
August 17, 2016

What is controls inheritance, and how can it help your organization manage risk?

Continue Reading ...

Faster Time to Compliance: Discovering the “One Thing” at DoDIIS

Katie Sheldon Hammler
August 11, 2016

Whether you are responsible for protecting the world’s most secure networks, or you are in charge of compliance at a small regulated organization in the health care or financial sector, Xacta can help your firm focus on its “one thing,” faster time to compliance.

Continue Reading ...

IT GRC Geek Speak: Body of Evidence

Rick Tracy
August 9, 2016

What is a body of evidence and why does your organization need it?

Continue Reading ...

Get Moving and Keep Moving to Stay Secure on the Network

Col. Stephen P. Corcoran USMC (Ret)
August 3, 2016

In the IT sector, “staying on the move” means keeping your users and information constantly moving and hidden in your network environment.

Continue Reading ...

IT GRC Geek Speak: Compliance vs. Security

Rick Tracy
August 2, 2016

Everyone in the IT GRC space has heard it: “Compliance does not equal security,” usually said as a way to portray compliance as a burdensome, check-the-box process, that doesn’t do anything to keep your organization safe. But it’s a false argument.

Continue Reading ...

Making Healthy Cyber Risk Choices for Your Organization

Katie Sheldon Hammler
July 26, 2016

IT GRC solutions may not offer a quick fix – just like eating a single kale leaf or doing one sit-up won’t make you healthy – and we shouldn’t expect them to. IT GRC is about resilience.

Continue Reading ...

NIST CSF: A Swiss Army Knife for Managing Cyber Risk

Rick Tracy
July 12, 2016

The NIST CSF can be used to address a wide range of cyber risk management activity… it is the Swiss Army Knife for managing your cyber risk.

Continue Reading ...

Securing an Empire Built on Bits and Bytes

Maj. Gen. Paul Capasso USAF (Ret.)
July 6, 2016

Ones, zeros, bits and bytes underpin the very nature of modern warfare.

Continue Reading ...

AWS Public Sector Summit Recap

Hugh Barrett
June 29, 2016

Telos and AWS can help streamline the cloud compliance process in any organization looking to move to the cloud by reducing controls documentation and validation – by anywhere from 20 to 50%.

Continue Reading ...

Mobile device management and the future of enterprise mobility.

Tom Badders
June 21, 2016

Integration, interoperability, and security are the key factors in deploying a successful mobile enterprise.

Continue Reading ...

Accelerating Secure and Compliant Cloud Deployment with AWS

Katie Sheldon Hammler
June 16, 2016

To learn more about accelerating secure and compliant cloud deployments, I invite you to download our white paper, and let us know how we can help your organization get to the cloud faster.

Continue Reading ...

Cloud Compliance at AWS Public Sector Summit 2016

Stephen Horvath
June 14, 2016

Telos and AWS can help streamline the cloud compliance process by dramatically reducing controls documentation and validation. Faster to cloud, means faster to mission, production, and value.

Continue Reading ...

Three Reasons NOT to Use Spreadsheets for Cyber Risk Management

Rick Tracy
June 8, 2016

Spreadsheets are great for many tasks — but not for managing risk and compliance processes. Choose an IT GRC platform that best meets your organization’s needs.

Continue Reading ...

On Behalf of a Grateful Nation

John B. Wood
May 27, 2016

  “On behalf of a grateful nation, please accept this flag as a symbol of our appreciation for your loved one’s honorable and faithful service.” These are words that many of us will recognize from scenes in the movies or dramatic TV shows, but will never really know.  Today, I

Continue Reading ...

Pen-testing Security Solutions Is as Valuable as Pen-testing Security Environments

Stephen Horvath
May 25, 2016

Pen-testing is just as valuable for vetting an IT security offering as it is for vetting the security of an IT environment.

Continue Reading ...

Challenging Presidential Candidates to Strengthen Cyber Security and Risk Management

John B. Wood
May 23, 2016

How cyber insurance and the NIST cyber security framework (CSF) can promote better risk management.

Continue Reading ...

The Virginia Cyber Security Commission – An Insider’s View

John B. Wood
May 17, 2016

The Commission served to shine a bright light on the challenges facing Virginia. We made a number of recommendations that led to subsequent actions by the Governor and General Assembly, improving Virginia’s cyber security posture.

Continue Reading ...

Where are the Women in Cyber Security?

Katie Sheldon Hammler
May 11, 2016

Employing more women in cyber security fields could make our networks more secure, and our connected world a safer place.

Continue Reading ...

How to Operationalize Cyber Risk Management Frameworks

Rick Tracy
May 5, 2016

IT-GRC platforms like Xacta AE help organizations navigate the complex process of cyber risk management.

Continue Reading ...

IoT Security and the IoTpocalypse

Maj. Gen. Paul Capasso USAF (Ret.)
May 2, 2016

IoT is truly transforming how we live, work, and play. In this hyper connected world, the paradox becomes: IoT security.

Continue Reading ...

What Constitutes a Reasonable Cyber Risk Management Practice?

Rick Tracy
April 28, 2016

It isn’t just a failure to manage cyber risk that can be costly to a company; the inability to demonstrate such cyber risk management practices exist can be just as costly in the court of law.

Continue Reading ...

Keys to an Effective RMF Transition – Lessons Learned from the Intelligence Community

Patrick Sullivan
April 19, 2016

With fewer resources, tighter budgets, and requirements accumulating, it is imperative that organizations use available experience and tools to effectively implement the Risk Management Framework (RMF) and understand how it fits into the bigger organizational picture.

Continue Reading ...

Empowering the NIST Cybersecurity Framework with Cyber Insurance — and Vice Versa

Rick Tracy
April 13, 2016

Cyber insurance and the NIST Cybersecurity Framework have a symbiotic relationship, in which one enables and reinforces the other.

Continue Reading ...

Launching Xacta AE 5.0 and Looking Back on 15 Years of Innovation

Katie Sheldon Hammler
April 7, 2016

Xacta AE 5.0 is a significant milestone in the history of the product, the first in the IT-GRC space. It’s the logical culmination of over 15 years of ongoing innovation to automate risk management and compliance.

Continue Reading ...

The Cyber “Buck” Stops in the Board Room

Rick Tracy
April 4, 2016

Officers and directors held accountable for cyber risk management.

Continue Reading ...

Transitioning to the Risk Management Framework: Potential Challenges

Patrick Sullivan
March 31, 2016

As happens with any major change, the transition to NIST’s Risk Management Framework (RMF) has the potential for presenting challenges to the organizations involved.

Continue Reading ...

Recently at RSAC… and in a galaxy far, far away…

Katie Sheldon Hammler
March 14, 2016

Community and a common framework for understanding are the keys to technological achievement in risk management and security compliance.

Continue Reading ...

AUSA Global Force Symposium Arrives in Huntsville

Winston Payne
March 11, 2016

While at the AUSA Global in Huntsville, I invite you to stop by Telos booth #1131 to share your cyber security challenges and stories.

Continue Reading ...

The President’s Cybersecurity National Action Plan

John B. Wood
March 3, 2016

A Realistic Look at What the President’s Cybersecurity National Action Plan (CNAP) Can Achieve, and What Else is Needed President Obama recently announced a Cybersecurity National Action Plan (CNAP), which combines short-term actions and a long-term strategy to help protect our nation, our businesses, and our citizens from cyber-attacks. In

Continue Reading ...

#CourageCaps Bring Smiles to Families of the Fallen

John B. Wood
January 27, 2016

Courage Caps and t-shirts go on sale TODAY, Jan 27th with 100% of proceeds benefiting TAPS. This is the third year Telos has presented the Courage Caps program, in collaboration with Monumental Sports and Entertainment Foundation and the Washington Capitals. In that period of time, Courage Caps has raised nearly $300,000 for TAPS, and we look forward to increasing that total with this year’s campaign!

Continue Reading ...

Government Turns to Private Sector for Cyber Security Insight

John B. Wood
January 8, 2016

This morning, the federal government turned to the private sector for insights into cyber security. Telos CEO John B. Wood had the privilege of speaking before the Congressional Subcommittees on Research and Technology and Oversight at a hearing titled Cyber Security: What the Federal Government Can Learn from the Private Sector.

Continue Reading ...

Worst Tech Predictions throughout History

Telos Corporation
December 28, 2015

As the saying goes, predicting the future is easy… getting it right is the hard part. We dug through the internet archives and found a handful of predictions that were so far off the mark, that we had to share. Predicting the direction of technology is not easy, but that didn’t deter these folks from taking a shot…

Continue Reading ...

What’s YOUR Security Point of View?

Telos Corporation
December 21, 2015

Over the last year, we’ve shared security related quotes from all walks of life – technology professionals, military visionaries, business leaders, philosophers, and even comedians. All have a unique point of view that can be directly or indirectly applied to information security. We want to know: What’s YOUR security point of view?

Continue Reading ...

2016 IT Security Preview and Predictions: The Good, the Bad and the Ugly

Telos Corporation
December 16, 2015

We polled a few of our Telos experts to see what they expect to see in 2016, in the areas of cyber security, secure mobility, and identity management. Here’s what they see on the horizon – the good, the bad, and the ugly.

Continue Reading ...

Governance, Risk and Compliance – A Market to be Thankful For

Katie Sheldon Hammler
December 8, 2015

The GRC market has dramatically grown since 2002. There are over 600 vendors providing solutions in 16 different categories. IT GRC is one of the fastest growing segments, according to GRC2020, and is the bedrock of cyber security.

Continue Reading ...

Bonnie Carroll and TAPS: Servant Leader and National Treasure

John B. Wood
December 1, 2015

Along with her world class team at TAPS, Bonnie Carroll helps pull survivors out of the darkest moments they will ever know, and shows them a path to hope and healing. TAPS is the heart of America’s family, and Bonnie is truly a national treasure.

Continue Reading ...

Are there really only “two kinds of enterprises”?

Frank Johnson
October 26, 2015

Has every company really been hacked?  Is every company really going to be? A popular meme in the information security industry is, “There are only two types of companies: those that know they’ve been compromised, and those that don’t know.” And the second is like unto it: “There are only

Continue Reading ...

Smart things require smart users.

admin
October 23, 2015

Smart things require smarter users. Understand how to keep IoT devices secure. #CyberAware

Continue Reading ...

Advanced Persistent Threat

admin
October 17, 2015

If you’re unprepared, APTs (Advanced Persistent Threats) can bring you down with a knockout punch.

Continue Reading ...

Cybersecurity

admin

Cybersecurity. Don’t let it become another meaningless phrase.

Continue Reading ...

Lowest Priced Technically Acceptable (LPTA)

admin

The house Lowest Priced Technically Acceptable (LPTA) built.

Continue Reading ...

Cybersecurity Elephant

admin

Cybersecurity Elephant

Continue Reading ...

Death-Taxes-Hacked

admin

Death Taxes Hacked

Continue Reading ...

Chief Security Office

admin

What keeps a Chief Security Office (CSO) awake at night?

Continue Reading ...

The Cybersecurity Chess Match

admin

Today’s cybersecurity environment is like playing 1,000 simultaneous chess matches against different opponents of varying skill levels.

Continue Reading ...

Stay secure on the go.

admin
October 16, 2015

Share these tips with friends and family to keep them secure while on the go! #CyberAware

Continue Reading ...

Cloud Cuckoo Land: 3 Questions to Ask about Cloud Solutions and Cyber Security

Maj. Gen. Paul Capasso USAF (Ret.)
October 14, 2015

“If a man has good corn or wood, or boards, or pigs, to sell, or can make better chairs or knives, crucibles or church organs, than anybody else, you will find a broad hard-beaten road to his house, though it be in the woods.”  — Ralph Waldo Emerson

Continue Reading ...

Congratulating a Cyber Security Leader – Dr. Ron Ross

John B. Wood
October 12, 2015

Last week, our friend and public sector colleague Dr. Ron Ross received the 2015 Samuel J. Heyman Service to America Medal for his tireless public work in federal cyber security.  On behalf of myself and Telos, I’d like to offer a hearty congratulations to Dr. Ross. It’s an impressive resume. 

Continue Reading ...

Practice safe desk at work and home.

admin
October 9, 2015

Practice safe desk at work and at home. #CyberAware

Continue Reading ...

Stop. Think. Connect.

admin
October 2, 2015

Stop. Think. Connect. October is cyber security awareness month. Follow along with #CyberAware.

Continue Reading ...

Effective Cyber Security through Discipline and Teamwork

Katie Sheldon Hammler
September 29, 2015

I recently attended the 2015 Department of Defense Intelligence Information System (DoDIIS) Worldwide Conference in San Antonio.  It was an inspiring several days, led by Janice Glover-Jones, CIO at the Defense Intelligence Agency. What struck me the most was the emphasis on teamwork and new levels of integration through the

Continue Reading ...

Don’t tweet your location.

admin
September 25, 2015

Sharing your location on social media may threaten your operational security. #opsec #infosec

Continue Reading ...

Pirated software can damage you computer.

admin
September 19, 2015

Pirated software can damage your computer; only buy from reputable dealers. #TalkLikeaPirateDay

Continue Reading ...

CyberPatriot VIII Registration Ends Soon!

John Klemens
September 17, 2015

Registration for CyberPatriot closes on October 9th. I urge you to act now to become involved as a coach, mentor, assistant, or team member.

Continue Reading ...

Don’t get burned by too many plugins.

admin
September 12, 2015

Don’t get burned by too many plugins. Only install the ones you need and remove any you don’t use.

Continue Reading ...

Post-its. This is not a good password management strategy.

admin
September 4, 2015

Post-its. This is not a good password management strategy.

Continue Reading ...

Never share your passwords.

admin
August 28, 2015

Friends come and go. Make sure your personal data doesn’t go with them. Never share your passwords.

Continue Reading ...

Best Practices for Designing Distributed Systems – Part 3

Ramil Alfonso
August 24, 2015

This multi-part series explores the different aspects of designing a distributed system, optimized to support the multitude of devices — the characteristics of distributed systems, the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Passwords, privacy, and school policy

admin
August 21, 2015

As your kids go back to school, talk to them about phone passwords, privacy, and policies.

Continue Reading ...

Two-factor authentication provides a higher level of security

admin
August 14, 2015

Two-factor authentication provides a higher level of security.

Continue Reading ...

How to Protect Your Business from Reverse Engineering & Code Modification

Ian Fagan
August 10, 2015

Reverse engineering and code modification present significant security and business risks. They allow for malicious hackers (or competitors) to easily gain access to your proprietary source code, including your algorithms, ideas, data formats, licensing, security mechanisms, and potentially even your customer data.

Continue Reading ...

Getting rid of your old computer?

admin
August 7, 2015

Getting rid of your old computer? Securely remove sensitive files from the hard drive first.

Continue Reading ...

Debunking the 8 Fallacies of Distributed Systems – Part 2

Ramil Alfonso
August 3, 2015

Part two of this multi-part series explores the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Be mindful of personal information you give away.

admin
July 31, 2015

Online quizzes collet more than you realize. Be mindful of personal information you give away.

Continue Reading ...

Use 3G/4G instead of public Wi-Fi.

admin
July 24, 2015

Dogs days of summer have you sweating? Stay cool, and use 3G/4G instead of public Wi-Fi.

Continue Reading ...

Hurricane Katrina Recovery at Keesler Air Force Base

Maj. Gen. Paul Capasso USAF (Ret.)
July 23, 2015

On this 10th anniversary of Hurricane Katrina striking Keesler Air Force Base, we remember the catastrophic destruction, immediate relief, sustained recovery, progress and shared experience. The story of Operation Dragon Comeback at Keesler AFB is the standard which all others should follow during disaster and recovery efforts.

Continue Reading ...

An Intro to Designing Distributed Systems – Part 1

Ramil Alfonso
July 21, 2015

This multi-part series explores the different aspects of designing a distributed system, optimized to support the multitude of devices — the characteristics of distributed systems, the fallacies that come along with the concept of distributed systems, as well as suggestions on how to handle known challenges.

Continue Reading ...

Don’t let other priorities dwarf your cyber security mission.

admin
July 17, 2015

Don’t let other priorities dwarf your cyber security mission.

Continue Reading ...

Tomorrow’s Cyber Problem

Stephen Horvath
July 13, 2015

In a world where breaches are commonplace, it’s imperative that we develop solutions to verify the integrity and authenticity of data and information.

Continue Reading ...

Don’t be shocked by loss of data during a storm.

admin
July 10, 2015

Don’t be shocked by loss of data during a storm. Use surge protection and back up your work before lightning strikes.

Continue Reading ...

Don’t share your travel plans on social media.

admin
July 3, 2015

Your vacation plans shouldn’t be a display for all to see. Don’t share your travel plans on social media.  

Continue Reading ...

Level up your security.

admin
June 26, 2015

Level up your security. Use WPA2 and change the default password on your router.

Continue Reading ...

OPM Breach and Cyber – Less Talk, More Action

John B. Wood
June 25, 2015

When are we going to realize that defending our nation in cyberspace requires a long-term national effort and commitment, much like the Space Race? We have a cyber race to the moon on our hands, and we are falling behind.

Continue Reading ...

Old anti-virus software?

admin
June 19, 2015

Dad’s tie may not be the only thing that’s out of date. How old is his anti-virus software?

Continue Reading ...

Cyber Rope-A-Dope

Maj. Gen. Paul Capasso USAF (Ret.)
June 18, 2015

Don’t be a sucker for the cyber rope-a-dope. Understanding the basics of APTs, and keeping abreast of APT trends will help ensure you can go the distance against any cyber heavyweight.

Continue Reading ...

Has information been compromised?

admin
June 12, 2015

Has your information been compromised? Watch out for typos, blind links, and other signs of spear phising.

Continue Reading ...

Air Force Cyberspace Operations and Support Hall of Fame Class of 2015 Includes Telos Director John Maluda

John B. Wood
May 29, 2015

Earlier this month, my good friend and colleague, Maj Gen John Maluda (ret.), was honored for his extraordinary career when he was inducted into the Air Force Cyberspace Operations and Support Hall of Fame.

Continue Reading ...

Memorial Day 2015 – Reflections on the Cost of Freedom

John B. Wood
May 27, 2015

Each Memorial Day since 2012, I have had the privilege of attending TAPS’ National Survivor Seminar and Good Grief Camp. And each year, it has been an even more deeply moving experience than the year before.

Continue Reading ...

Turn off bluetooth when it’s not in use.

Renate Neely
May 22, 2015

Turn off bluetooth when it’s not in use. Your personal information is at risk.

Continue Reading ...

Cyber Security… More than Just a Bad Hair Cut

Maj. Gen. Paul Capasso USAF (Ret.)
May 20, 2015

“A complacent satisfaction with present knowledge is the chief bar to the pursuit of knowledge.” B.H. Liddell Hart Have you ever made a decision that you later regretted? That Mohawk haircut that was so cool in high school doesn’t look so appealing today, does it? Selling that ’64 Mustang for

Continue Reading ...

Stand up to cyber bullying.

Renate Neely
May 15, 2015

Stand up to cyber bullying.

Continue Reading ...

Preparation for CyberPatriot VIII Starts Now!

John Klemens
May 13, 2015

To get the most out of the CyberPatriot program, now is the time to form a team. Registering now will get a team access to the exhibition rounds where they can learn without the pressure of competition. Teachers, cyber security professionals, students, and their parents can visit the CyberPatriot website to find out more about becoming a coach, a mentor, or a competitor.

Continue Reading ...

Give Mom the gift of security.

Renate Neely
May 8, 2015

Give Mom the gift of security. Offer to review her social media account settings to ensure her personal information is kept private.

Continue Reading ...

Trout Unlimited VSP – Veterans and Spouses Find Hope in the Water

John B. Wood
April 30, 2015

For the last few years, Telos has provided funding for Trout Unlimited’s Veterans Service Partnership (VSP), which provides veterans with hope, rehabilitation, and camaraderie through the healing power of water. The program has been a wonderful success; to date, TU Chapters across the country have helped nearly 7,000 wounded veterans, donating over 60,000 volunteer hours. VSP also provides fishing retreats for veterans with physical and emotional scars, and their spouses.

Continue Reading ...

Don’t strike out.

Renate Neely
April 24, 2015

Don’t strike out. Keep your apps and anti virus software up to date to stay in the game.

Continue Reading ...

Spring into action.

Renate Neely
April 16, 2015

Spring into action. Keep track of your digital footprint before it gets out of control.

Continue Reading ...

Effective Project Management Starts Early

Dan Zwart
April 14, 2015

At Telos, we value the opportunity to pore in to future technologists. As a project manger, I’ve been privileged to work beside several recent graduates – and been very pleased with their backgrounds, eagerness and aptitude to absorb new technologies and learn new skills.

Continue Reading ...

Death and Taxes

Renate Neely
April 10, 2015

Nothing is certain except death, taxes, and getting hacked. Have a cyber incident response plan ready.

Continue Reading ...

Defense wins championships.

Renate Neely
April 3, 2015

Defense wins championships. Defend your digital identity with two-factor authentication.

Continue Reading ...

Collaborative Innovation

John B. Wood
March 31, 2015

A program based on a public-private-education template would allow us to find real solutions to real problems, while cultivating a pipeline of graduates with advanced STEM degrees in this critical field of cyber and information security.

Continue Reading ...

Incident Response and Continuous Monitoring: When InfoSec and Diabetes Management Intersect

Dan Sherman

My daughter has childhood diabetes, which can be a frightening disease for a family to manage.  If her blood glucose spikes too high or dips too low, swift action needs to be taken.  Without immediate corrective action, conditions can become serious, or even life threatening.  But, we have developed a

Continue Reading ...

Digital spring cleaning

Renate Neely
March 27, 2015

Don’t forget, your digital footprint requires spring cleaning too: Deactivate old online accounts Remove unneeded programs and apps (Finally) get a password manager

Continue Reading ...

Is your bracket busted?

Renate Neely
March 20, 2015

Your bracket may be busted, but your security doesn’t have to be. Only connect to secure, trusted wifi.

Continue Reading ...

Effective cyber defense is more about mindset than budget

Stephen Horvath
March 19, 2015

Implementing an effective cyber defense program is not out of reach for small to medium sized organizations. More important than size of budget, is having the correct mindset and processes for training security professionals, preventing attacks, and responding appropriately when, not if, they occur.

Continue Reading ...

On Approach to the ACI-NA Public Safety & Security Conference in YVR

Dawn E. Lucini
March 17, 2015

I’m looking forward to seeing you during the ACI-NA Public Safety & Security Conference, March 22-25, 2015 in Vancouver, BC. 

Continue Reading ...

Stay infinitely secure.

Renate Neely
March 14, 2015

Stay infinitely secure. Happy (Ultimate) Pi Day!

Continue Reading ...

The Dress

Renate Neely
March 6, 2015

With cybersecurity, perception may not be reality. Make sure you’re secure as well as compliant. #TheDress

Continue Reading ...

Don’t get lazy.

Renate Neely
February 27, 2015

Don’t get lazy. Stay secure and keep a clean machine. (Did you know Sunday, March 1st is National Pig Day? … yeah, neither did we.)

Continue Reading ...

Parson Brown

Renate Neely
February 20, 2015

He found all the information he needed on social media to pretend that he was Parson Brown.

Continue Reading ...

Links are like a box of chocolates.

Renate Neely
February 13, 2015

You never know what you’re gonna get. Be suspicious of every link, especially those you’re not sure of.

Continue Reading ...

Who Influences You?

Rick Tracy
February 12, 2015

Like it or not, we are all products of our environments and our life experiences. The people we choose to surround ourselves with, personally and professionally, have a huge impact. My career in cybersecurity is a testament to …

Continue Reading ...

Telos Supports the Tampa Bay 2015 Frogman Swim

John B. Wood
February 9, 2015

For the second year, Telos was a corporate sponsor for this three-mile swim across Tampa Bay, commemorating the fallen members within the Naval Special Warfare Community, and raising money for the Naval Special Warfare Foundation

Continue Reading ...

There’s no debate on vaccinating your computer.

Renate Neely
February 6, 2015

There’s no debate on vaccinating your computer.  Install anti-virus software as part of your layered security strategy.

Continue Reading ...

CyberPatriot Regional Round

John Klemens
February 5, 2015

Congratulations are in order for the NerdHerd, an all-girls CyberPatriot team from Stone Bridge High School. They placed second in the Mid-Atlantic Region in the Silver Tier of the Air Force Association’s CyberPartiot national cybersecurity education program!

Continue Reading ...

Physical security of IT assets is critical.

Renate Neely
January 30, 2015

Physical security of IT assets is critical. Don’t let anyone mess around with your equipment.

Continue Reading ...

That moment you should have backed up your data…

Renate Neely
January 23, 2015

That moment you should have backed up your data…

Continue Reading ...

White House Proposals Don’t Address Most Critical Cybersecurity Needs

Robert DuPree
January 22, 2015

But Congress Won’t Act, Either

Continue Reading ...

Add another layer of protection.

Renate Neely
January 16, 2015

Add another layer of protection. Opt for 2-factor authentication.

Continue Reading ...

Three Problems Facing Cyber Professionals When Manually Monitoring Security Controls

Justin Ford
January 14, 2015

A common challenge that all organizations face — whether federal agencies, the Defense Industrial Base (DIB), private organizations, or commercial entities — is regulatory and policy compliance.

Continue Reading ...

Shake ’em off.

Renate Neely
January 9, 2015

Bob’s pop music fandom and cybersecurity awareness had finally merged. Cause the hackers gonna hack hack hack hack hack, and the phishers gonna phish phish phish phish phish. Baby I’m gonna patch, scan, upate, and shake ’em off, shake ’em off.

Continue Reading ...

What’s your resolution?

Renate Neely
January 2, 2015

Is digital security one of your new year’s resolutions?

Continue Reading ...

Power down.

Renate Neely
December 26, 2014

Power down. Look up. Talk with your family. Happy holidays from your friends at Telos.

Continue Reading ...

A Holiday Challenge: Make the World A Better Place

John B. Wood
December 22, 2014

There is a lot of tragedy in this world. But it’s on each of us to make this world a better place. Each decision is an opportunity to be kind and to see the world in a better light. Are you willing to step up to the challenge?

Continue Reading ...

‘Tis the time for shopping…

Renate Neely
December 19, 2014

‘Tis the time for shopping, Online and in stores; Evil elves are lurking, Hoping for a score. So, take care when you’re buying, Don’t let them blind your eyes; Review your statements daily, Make sure there’s no surprise!

Continue Reading ...

Has Subject Matter Expertise Gone to the Dogs?

Stephen Horvath
December 18, 2014

From dog training to complex technology solutions – true subject matter expertise will deliver better outcomes.

Continue Reading ...

Dear Santa Cyber

Maj. Gen. Paul Capasso USAF (Ret.)
December 15, 2014

An open letter to Santa Cyber from a cybersecurity professional.

Continue Reading ...

Is your digital security half-baked?

Renate Neely
December 12, 2014

Is your digital security half-baked? Visit STOP. THINK. CONNECT. to learn more about staying safe and secure online.

Continue Reading ...

Too good to be true?

Renate Neely
November 28, 2014

Pssst… Is that promo code too good to be true? Fake promo codes could lead to malicious websites.

Continue Reading ...

CyberPatriot Update – Rounds 1 and 2

John Klemens
November 24, 2014

I was impressed with the knowledge and skills the teams from Stone Bridge High School demonstrated during these first two rounds.

Continue Reading ...

Be thankful for family —

Renate Neely
November 21, 2014

and keep them out of your passwords.

Continue Reading ...

Lucky to Hire a Veteran

John B. Wood
November 11, 2014

Our veterans are of the highest caliber, astute leaders and dedicated professionals. Employers should consider themselves lucky to have veterans in their candidate pools.

Continue Reading ...

How often do you review your online accounts?

Renate Neely
November 7, 2014

Check transactions often to identify a fraud attempt quickly.

Continue Reading ...

The internet is full of cyber-ghouls and goblins.

Renate Neely
October 31, 2014

Know how to stay safe online. StopThinkConnect.org (Happy Halloween!)

Continue Reading ...

Does your small business have a cybersecurity plan?

Renate Neely
October 24, 2014

Go to fcc.gov/cyberplanner and make one today. This week, #NCSAM highlights the need for our small business friends and neighbors to create a cybersecurity plan. Visit http://www.fcc.gov/cyberplanner to make yours today!

Continue Reading ...

Coming Up: A New and Exciting Alamo AFCEA Gathering

David Kovach
October 23, 2014

Looking Forward to San Antonio’s Alamo AFCEA Conference and Expo. We’ll see you next week, October 27-30, at the Telos Booth – #30/31

Continue Reading ...

IoT Standardization: Changing the Game

Emerging Technologies Group
October 22, 2014

aIoT is more than just technology hype. It’s predicted to continue to gain ground in the next five years or so, seamlessly integrating cloud, Big Data, wearable technology, and ubiquitous computing, among others, thereby spurring on the era of a hyper-connected world.

Continue Reading ...

Cybersecurity touches everything.

Renate Neely
October 17, 2014

Get to know how the Internet of Things impacts your life.

Continue Reading ...

What keeps a CSO awake at night?

Rick Tracy
October 7, 2014

Are you a CSO or security professional? What keeps you awake at night?

Continue Reading ...

Stop. Think. Connect.

Renate Neely
October 3, 2014

Cybersecurity is shared responsibility.

Continue Reading ...

Landing in Arlington for the ACI-NA Public Safety & Security Conference

Dawn E. Lucini
October 1, 2014

We look forward to seeing you during the ACI-NA Public Safety & Security Conference, October 6-9, 2014 in Arlington, VA. Telos ID is proud to be an Associate Member of ACI-NA, which is the authoritative voice of U.S. airports, representing airport members that enplane 95 percent of all domestic and virtually all the international airline passengers and cargo traffic in North America.

Continue Reading ...

CyberWhat? CyberPatriot!

John Klemens
September 23, 2014

The shortage of cybersecurity professionals has been well documented, and it impacts not only our national security but also corporations and individuals as they connect to the Internet as any number of recent instances document. Having been involved in computer security since 1991, this topic is near and dear to my heart.

Continue Reading ...

Online accounts add up quickly.

Renate Neely
September 19, 2014

Keep track of your logins in a password manager. How many online accounts do you have? Are they secure?

Continue Reading ...

Making new friends is good.

Renate Neely
September 12, 2014

Sharing too much… not so much.

Continue Reading ...

It’s good for the environment.

Renate Neely
September 5, 2014

Not for password security.

Continue Reading ...

Vigilance

Stephen Horvath
September 3, 2014

Just as individuals shouldn’t rely solely on their banks’ fraud-monitoring alerts for financial protection, so cybersecurity personnel shouldn’t rely solely on tools like network or host intrusion detection to let them know when something is amiss with information resources. We need to take an active, hands-on role in ensuring the protection of our networks.

Continue Reading ...

Is the URL spelled correctly?

Renate Neely
August 29, 2014

A common type could land you in a phishing trap.

Continue Reading ...

You’re leaving digital fingerprints.

Renate Neely
August 22, 2014

Know what information your browser is sharing.

Continue Reading ...

Preview: AFCEA Technology & Cyber Day at Tinker Air Force Base

Jeremiah Stallcup
August 20, 2014

On Thursday, August 21, 2014 the AFCEA Oklahoma City Chapter will host the 10th Annual Information Technology & Cyber Security Day at Tinker Air Force Base.

Continue Reading ...

Beware of buggy sites.

Renate Neely
August 15, 2014

Don’t click on pop-ups, and update your security software frequently.

Continue Reading ...

Don’t get thrown by a sudden crash.

Renate Neely
August 8, 2014

 Quit horsing around and back up your files.

Continue Reading ...

Cybersecurity and a Box of Crayons

Maj. Gen. Paul Capasso USAF (Ret.)
August 4, 2014

I recently rediscovered the classic children’s book, “Harold and the Purple Crayon.” I remember reading this to my children when they were younger. It brought to mind how imaginative, resourceful, and creative children are when solving problems…

Continue Reading ...

Why did the chicken cross the road?

Renate Neely
August 1, 2014

To do his online banking from a secure wi-fi location.

Continue Reading ...

Telos ID Looks Forward To Seeing You at the Florida Airports Council 45th Annual Conference & Exposition

Dawn E. Lucini
July 29, 2014

Did you know that the Florida Airports Council (FAC) annual conference is the largest and most successful statewide airport event in the country, with more than 700 industry professionals in attendance and outstanding world-renowned speakers?  Wel…

Continue Reading ...

It’s a scary world out there.

Renate Neely
July 25, 2014

Katy did you remember to update your anti-virus software?

Continue Reading ...

Don’t pull the wool over your eyes.

Renate Neely
July 18, 2014

Baaa’d online security habits can lead you astray.

Continue Reading ...

Protect your digital nest egg.

Renate Neely
July 11, 2014

Never do online banking from a public hotspot.

Continue Reading ...

Cybersecurity isn’t the same thing as information assurance.

Frank Johnson
July 7, 2014

Is a paper shredder really a cybersecurity solution?

Continue Reading ...

Don’t get burned.

Renate Neely
July 4, 2014

Copy important files to an external drive and store in a safe place. Wishing you a happy and safe 4th of July!

Continue Reading ...

Defending Our Flag and Our Freedom

John B. Wood
June 30, 2014

Between Independence Day and the World Cup, we have seen a lot of American pride on display recently. But take a minute to think about what that red, white, and blue piece of fabric really means.

Continue Reading ...

The Inevitability of Change – Transitioning to the NIST Risk Management Framework

Hugh Barrett

The information security field has gone through a number of significant changes in its processes and technologies over the past 20 years. Change can be hard — but sometimes change has a long-term benefit that isn’t obvious at first. The latest change in the DoD infosec environment is the transition from DIACAP to the NIST risk management framework announced last March.

Continue Reading ...

Bee vigilant.

Renate Neely
June 27, 2014

 Maintain your digital footprint, and don’t get stung by forgotten accounts.

Continue Reading ...

Kick Off the Summer with Three Cybersecurity, Innovation, and Emerging Technology Events

Stephen Horvath
June 23, 2014

The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy showcasing our cybersecurity, mission planning, and network security solutions at three different events, from Baltimore, DC, all the way to San Antonio, Texas.

Continue Reading ...

Protect yourself from harmful internet rays.

Renate Neely
June 20, 2014

Update your firewall and antivirus software.

Continue Reading ...

Cyber Insurance Could Benefit from A&A and Continuous Monitoring Processes

Rick Tracy
June 18, 2014

With the increase of high profile cybersecurity events, it is no wonder that cyber insurance has become more mainstream, even said to be “the fastest growing area of insurance.” But unlike traditional types of insurable events, there is range of impact associated with cybersecurity breaches

Continue Reading ...

Wh0zY0uRd@dDY?

Renate Neely
June 13, 2014

Luke’s father has a secure password — does yours? Here’s a fun TGIF to kick off Father’s Day weekend.

Continue Reading ...

Investing in the community

John B. Wood
June 11, 2014

Last fall, the strongest storm ever to make landfall hit the Philippines, and caused truly catastrophic damage. Typhoon Haiyan (known locally as Typhoon Yolanda) killed over four thousand people and left millions injured, homeless, or with severe …

Continue Reading ...

A public hotspot is like a beach without a lifeguard…

Renate Neely
May 30, 2014

Surf at your own risk!

Continue Reading ...

Memorial Day: Reflection, Gratitude and TAPS

John B. Wood
May 26, 2014

Over Memorial Day Weekend, the TAPS National Seminar and Good Grief Camp brought together over 3,000 family members of our nation’s fallen military heroes to share in a weekend of hope, courage, and love.  Adult survivors engaged in peer-bas…

Continue Reading ...

Don’t over share.

Renate Neely
May 23, 2014

Once you post it, you can’t take it back. Are you SURE you want to share that? Think twice before you share, post, or tweet!

Continue Reading ...

History Remembered – 9/11 Museum Opening

John B. Wood
May 19, 2014

It is important to make a conscious effort to remember our past—to reflect on the history that has shaped our nation. Once the museum is open to the public later this week, I encourage everyone to attend.

Continue Reading ...

Antivirus software doesn’t age like fine wine.

Renate Neely
May 16, 2014

Update your definitions daily!

Continue Reading ...

Cyber Sirens: Enchanting But Deadly

Maj. Gen. Paul Capasso USAF (Ret.)
May 14, 2014

Underneath the 1’s and 0’s traversing the Internet rests an underbelly no one wants to talk about. We must always be on our guard when it comes to Internet security.

Continue Reading ...

The House That LPTA Built

John B. Wood
May 12, 2014

In the end, you get what you pay for: lower quality, and more rework.

Continue Reading ...

Renate Neely
May 9, 2014

Do you really A special Mother’s Day TGIF… don’t accept friend requests from people you don’t know!

Continue Reading ...

A Lifetime of Service: Air Force Cyberspace Operations and Support Hall of Fame Honors Dave Kovach

John B. Wood
May 7, 2014

Earlier this week, friend and Telos colleague Col. Dave Kovach (USAF, ret.) was inducted into the Air Force Cyberspace Operations and Support Hall of Fame for his lifelong commitment and service to the Air Force and communications career field.

Continue Reading ...

The HeartBleed Data Call: Were You Ready?

Hugh Barrett
May 6, 2014

Installing agents on your workstations and servers is the most efficient and reliable way to understand asset configuration, which is essential for determining susceptibility to vulnerabilities such as HeartBleed.

Continue Reading ...

A tear is fair… but a shredder is better.

Renate Neely
May 2, 2014

 Always shred personal and financial paperwork.

Continue Reading ...

Be smart like your phone.

admin
April 24, 2014

Be smart like your phone. Know how to remotely track and wipe your device.

Continue Reading ...

Coordination & Collaboration for Successful Emergency Planning, Response & Relief

Jeremiah Stallcup
April 21, 2014

Effective coordination and collaboration during planning, response, and recovery phases of an emergency can give public and private sector entities the ability to minimize loss of life and property… but the planning needs to start now, before the next emergency strikes.

Continue Reading ...

Don’t put all of your eggs in one basket.

admin
April 18, 2014

Don’t put all of your eggs in one basket. Use multiple passwords across your accounts.

Continue Reading ...

FIPS 201-2 takes steps toward a more secure, trusted and flexible identity management environment.

Lisa Kimball
April 15, 2014

Last August, NIST released FIPS 201-2, the latest version of their standard for secure PIV (Personal Identity Verification) credentials. The new standard introduces some concepts that are redolent of collaborative credentialing and symbiotic security, so I thought it would be useful to take a look at some of those new concepts.

Continue Reading ...

Don’t make Heartbleed worse.

admin
April 11, 2014

Don’t make Heartbleed worse. Make shore those “change your password” emails are legit.

Continue Reading ...

Telos Demonstrates SE7EN Mission Planner at Marine South 9 – 10 April

Col. Stephen P. Corcoran USMC (Ret)
April 8, 2014

Marine South is a unique opportunity for industry to showcase cutting edge technologies that support the dynamic nature of the Marine Corps mission.

Continue Reading ...

Spring Cleaning?

admin
April 4, 2014

Spring cleaning? Keep your work area clear of all personally identifiable information (PII).

Continue Reading ...

TAPS Honor Guard Gala Provides Message of Hope

John B. Wood
April 3, 2014

I encourage you to watch these two must watch TAPS videos.

Continue Reading ...

Continuous Monitoring: Agents vs Vulnerability Scanners

Rick Tracy
March 31, 2014

Telos recently launched a product called Xacta Continuum™. It’s an evolution of a product that Telos developed more than ten years ago. We called that product Xacta Continuous Assessment and it was designed to help automate testing of certain security controls associated with system certification.

Continue Reading ...

Your smartphone is a computer.

admin
March 28, 2014

Remember… Your smartphone is a computer, which means it is just as susceptible to hacking and malware.

Continue Reading ...

Cybersecurity: Cutting the Gordian Knot

Maj. Gen. Paul Capasso USAF (Ret.)
March 25, 2014

Whether fighting in the air, sea, land, or space domains, American power has dominated the warfighting landscape since the end of the Second World War. The newest warfighting realm, the cyber domain, is presenting a more perplexing scenario in the art of warfare.

Continue Reading ...

Don’t jailbreak your mobile device.

admin
March 21, 2014

Don’t jailbreak your mobile device. Unverified apps pose a greater security risk.

Continue Reading ...

Be aware of your surroundings.

admin
March 14, 2014

Enjoy your St. Patty’s Day celebrations this weekend… but be aware of your surroundings, and don’t leave your smartphone unattended in public.

Continue Reading ...

The IRS never collects taxpayer information by email.

admin
March 7, 2014

The IRS never collects taxpayer information by email. Don’t fall for tax related phishing attempts, and forward any phishy IRS emails to phishing@irs.gov.

Continue Reading ...

Bigger target, bigger problems.

admin
February 28, 2014

Whaling is a phishing attack that targets high-profile users, like C-Suite executives. Bigger target, bigger problems for the company. Don’t let your senior executives become whaling victims!

Continue Reading ...

Telos ID’s Kimball Finalist for Executive Leader Award

John B. Wood
February 24, 2014

The award is designed to honor those who have demonstrated commitment to support the needs of the Loudoun community. I can’t think of a more deserving person than Lisa.

Continue Reading ...

Assessing the Security Posture of Software Vendors

Dan Sherman

When evaluating software, business units need to evaluate not only whether the solution meets their business needs, but also whether it meets the security requirements of the organization. Based on the security of the offering, the risk of using the software or service may prove too high.

Continue Reading ...

Only view event coverage on official websites.

admin
February 21, 2014

Malicious actors create fake Olympic websites to deliver malware to unsuspecting fans. Only view event coverage on official websites.

Continue Reading ...

One Thing Federal Contractors (and Others) Should Demand This Election Year

Robert DuPree
February 17, 2014

Over the past three years, I have watched an unbelievably dysfunctional Washington (Congress and the Administration) fail to put aside political grudges and find a way to work together, forge consensus and compromise, and perform their most basic …

Continue Reading ...

Spread love… not malware.

admin
February 14, 2014

Spread love… not malware. Beware of malicious Valentine’s Day e-cards!

Continue Reading ...

Links are like a box of chocolates.

Renate Neely

Links are like a box of chocolates. You never know what you’re gonna get. Be suspicious of every link, especially those you’re not sure of.

Continue Reading ...

Join Us Next Week at the AUSA Winter Symposium in Huntsville, Alabama

Winston Payne
February 13, 2014

Stop by booth #10 to share your cyber challenges and stories, and to preview capabilities that will assure the security of your enterprise networks and vital assets.

Continue Reading ...

Cybersecurity is like a snowstorm, or not.

Rick Tracy
February 11, 2014

When the forecast for a snowstorm — or a cyber event — ranges between nothing and a disaster, it isn’t really a forecast at all. It is a bad guess.

Continue Reading ...

Continuous Integration through Microsoft Visual Studio’s Team Foundation Server (TFS)

Emerging Technologies Group
February 10, 2014

As the complexity of a software development project increases, there is a greater need for the development team to tighten integration, collaboration, and planning to control each step of the process. The practice of “continuous integration” …

Continue Reading ...

Before you walk away…

admin
February 7, 2014

Always lock your computer (by pressing CTRL + ALT + DELETE and hitting “Enter”) before walking away from it.

Continue Reading ...

Courage Caps for TAPS

John B. Wood
February 5, 2014

It is an honor to play even a small role in helping members of the TAPS family heal and make new memories after the loss of their loved one. We could not be more proud to partner with the MSE Foundation and the Washington Capitals to raise funds and awareness for TAPS. Hats and t-shirts are available for purchase at the Verizon Center in section 104, or online at www.washingtoncaps.com/courage.

Continue Reading ...

Looking Forward to the Rocky Mountain AFCEA Chapter’s Cyberspace Symposium, Colorado Springs, CO

David Kovach
February 3, 2014

This week the 16th annual Cyberspace Symposium will convene in Colorado Springs, and expects some 1300 attendees among its communities of interest, USG/DoD, corporate sponsors and exhibitors. This three-day event will host nationally recognized industry and government keynote speakers and interactive panel discussions addressing the critical technology and security issues facing our nation.

Continue Reading ...

Don’t click unsubscribe in unwanted email.

admin
January 31, 2014

Clicking the “unsubscribe” link in unwanted email may actually sign you up for more spam — or worse, it might be a malicious link.

Continue Reading ...

2014: A Cybersecurity Call to Arms

Maj. Gen. Paul Capasso USAF (Ret.)
January 27, 2014

As a nation, especially during this time of fiscal uncertainty, we should start 2014 by insisting on a cybersecurity innovation call to arms. Innovation birthed this great nation and is key to the future of our national security and economic interests.

Continue Reading ...

Don’t post it for all to see.

admin
January 17, 2014

You’d think this would go without saying… but, don’t post passwords on your computer monitor.

Continue Reading ...

Telos Investing in Cybersecurity, Virginia, and Nation’s Future

John B. Wood
January 16, 2014

In the first economic development announcement of his administration, Virginia Governor McAuliffe announced that Telos will receive a $500,000 grant from the Governor’s Opportunity Fund, add 160 new jobs in Virginia, and invest $5 million in modernizing our headquarters facility in Ashburn.

Continue Reading ...

Hello, I’m… not suspicious at all.

Renate Neely
January 10, 2014

Never accept friend requests from people you don’t know — even if they look friendly.

Continue Reading ...

Looking Ahead to 2014: Preview and Predictions

Telos Corporation
January 6, 2014

What are the most important cybersecurity or IT challenges facing civilian and intel agencies, the DoD, and commercial enterprises in the coming year? Telos subject matter experts offer their insights in this 2014 preview.

Continue Reading ...

New year, new passwords.

admin
January 3, 2014

New year, new passwords. January is a great time to create a new, strong password for each account.

Continue Reading ...

Weekend getaway?

Renate Neely
December 27, 2013

Think twice before sharing travel plans on social media. Many folks travel to visit family and friends this time of year… but think twice before sharing those travel plans on social media.

Continue Reading ...

Share the gift of online security.

Renate Neely
December 20, 2013

This holiday season, take time to ensure your family is aware of cybersecurity basics.

Continue Reading ...

Holiday Traditions Worth Keeping

John B. Wood

Holidays are a time to disconnect from the clutter in your life so you can reconnect with family and loved ones. Here are a few ways that I plan to reconnect over the next few weeks.

Continue Reading ...

Key Security Features of Windows 8

Emerging Technologies Group
December 16, 2013

Microsoft’s latest operating system isn’t just a revamped version of its predecessor. While the new user interface draws the bulk of the attention, new and improved security features have also been added to Windows 8 and 8.1.

Continue Reading ...

The New Congressional Budget Deal: Yes, BUT…

John B. Wood

Recently someone asked me if I was pleased that congressional negotiators had finally reached a budget agreement. My answer was an immediate and emphatic, “Yes, but…”

Continue Reading ...

Don’t click it if you don’t understand it.

Renate Neely
December 13, 2013

If you don’t understand a dialogue box, don’t click it!

Continue Reading ...

Cyber Trust: Lessons Learned from the Fox and the Raven

Maj. Gen. Paul Capasso USAF (Ret.)
December 9, 2013

On the internet highway, there is often unspoken — but also unwarranted — trust between individuals, the confidence that another person will do the right thing or that technology will function correctly within the cyber domain. Today we often operate with blind trust, hedging our bets on the success of state-of-the-art defensive strategies, tools and strengths of the human being.

Continue Reading ...

In a Networked World, Physical and IT Security Can Be Indistinguishable

Rick Tracy
December 2, 2013

Physical security is a critical component that must always be accounted for when assessing IT security. That should be obvious, but the point is reinforced by this real-world story of a Caribbean adventure.

Continue Reading ...

Don’t forget security on Cyber Monday.

Renate Neely
November 29, 2013

Only make payments on secure websites. Don’t forget security during the excitement of Cyber Monday. Only make online purchases from websites with https (the S stands for SECURE). Pass it along!

Continue Reading ...

Passwords are like toothbrushes.

Renate Neely
November 22, 2013

They shouldn’t be shared — even with people you know and trust.

Continue Reading ...

Cybersecurity — A Story of Idioms

Maj. Gen. Paul Capasso USAF (Ret.)
November 19, 2013

Don’t let cybersecurity become another meaningless phrase. A tongue-in-cheek discussion about a serious problem.

Continue Reading ...

See You at Gartner’s Identity and Access Management Summit

John Quarderer
November 18, 2013

We will be exhibiting at the Gartner Identity and Access Management Summit 2013 at the JW Marriott LA Live in Los Angeles November 18 – 20, 2013. Please join us at Booth #102 to learn more about protecting your cloud and on-premises web APIs using policy-based authorization and a secure integrated attribute store.

Continue Reading ...

Don’t get burned.

Renate Neely
November 15, 2013

Never click links in web-based pop-ups.

Continue Reading ...

Looking Forward to San Antonio’s Alamo AFCEA Conference and Expo

David Kovach
November 13, 2013

We’ll see you next week, November 18-21 at Booth 30/31.

Continue Reading ...

Hope and Care For Our Veterans

John B. Wood
November 10, 2013

The word hope is thrown around a lot, whether in political campaigns or as a way to express a want or desire. I hope it doesn’t rain tomorrow. I hope I win the lottery. But what does it mean to have hope? To have hope, means that you both desire …

Continue Reading ...

Think antivirus software will slow your computer?

Renate Neely
November 8, 2013

 Try getting a virus… slow will be the least of your concerns.

Continue Reading ...

Two Conferences and Four Airport Badging Best Practices

Dawn E. Lucini
October 30, 2013

No one can be two places at once, but that doesn’t stop us from trying! Telos ID will be at two conferences next week: the 13th Annual Aviation Security Summit (November 5-6) in Arlington, Virginia and the FAC Specialty Conference (November 5-8) in Orlando, Florida.

Continue Reading ...

The Hard Part

Stephen Horvath
October 28, 2013

No matter how much technology is thrown at this issue, cybersecurity is still wildly difficult. It requires time, process, oversight, audit, enforcement, policy, hard work, and technology. As with all things, technology will help lighten the load, but you still have to build momentum on your own.

Continue Reading ...

Beware of scareware.

Renate Neely
October 25, 2013

Don’t get ricked by pop-ups that claim your computer needs to be treated with additional security software. Trick or Treat? Beware of #scareware… cybercriminals feed on fear.

Continue Reading ...

Don’t be a sucker.

Renate Neely
October 18, 2013

Know how to spot a phishing attack.

Continue Reading ...

Not raising the debt ceiling is the economic equivalent of hitting the nuclear button.

John B. Wood
October 16, 2013

Our economy – and the world economy – is too important to be taken hostage.

Continue Reading ...

The Shared Responsibility of Cybersecurity

Rick Tracy
October 14, 2013

It occurred to me that this insane government shutdown flies in the face of this year’s National Cybersecurity Awareness Month theme: Our Shared Responsibility. Clearly some important people have not gotten the message and are not taking their shared responsibilities seriously. Shared responsibility isn’t just about patches, passwords, code, and social engineering. Shared responsibility starts at the top.

Continue Reading ...

Don’t fall behind.

Renate Neely
October 11, 2013

Social media #privacy settings change often. Stay current to stay secure.

Continue Reading ...

Government Shutdown Does Not Save Money

John B. Wood
October 8, 2013

There is a piece of the government shutdown narrative that I think many people have missed over the last week.

Continue Reading ...

Privacy in the Mobile Space (with Recommended iOS 7 Settings for Better Privacy Protection)

Jeff Schneider
October 7, 2013

With all of the iOS 7 enhancements, it’s easy to become distracted and overlook some of the key privacy settings that are conveniently defaulted to allow maximum exposure of the user’s sensitive content and information.

Continue Reading ...

Patch your apps.

Renate Neely
October 4, 2013

Download the latest app updates to stay secure. Help us kick off National Cyber Security Awareness Month (#NCSAM), by spreading the word about online safety and security with your friends and family. Here’s a simple tip – Patch your mobile apps. Downloading the latest version of an application will often

Continue Reading ...

Government Shutdown: A Pox on All Their Houses

John B. Wood
October 1, 2013

In the last year not a single appropriations bill was enacted into law, we are no closer to addressing entitlement spending and long-term deficits, and as of midnight last night the government has shut down, because our politicians are acting like children.

Continue Reading ...

Lock it when you leave it.

Renate Neely
September 27, 2013

Never leave your computer unlocked when you walk away. May seem like a no-brainer, but locking your computer when you walk away from your desk is a great first step to securing your information.

Continue Reading ...

Getting Back to the Security Basics in Five Simple Steps

Dan Sherman
September 25, 2013

A reminder for information security specialists: Take a breath, and get back to the basics.

Continue Reading ...

You are the key to your online safety and security.

Renate Neely
September 20, 2013

No one can do it for you. YOU are the key to your online safety and security.

Continue Reading ...

Heading to San Jose for ACI-NAs Annual Conference

Dawn E. Lucini
September 19, 2013

We look forward to seeing you during the ACI-NA Annual Conference, September 22-25, 2013, in San Jose, CA. Visit Telos ID, Booth 911 in the exhibit hall, so you can learn more about Telos ID TSA-approved Designated Aviation Channeling (DAC) Services.

Continue Reading ...

Peeling Back the Onion: LPTA and Acquisition Requirements

Charisse Stokes
September 16, 2013

Over the last few years, we have seen a number of trends in the acquisition community, the most recent being the switch to lowest priced technically acceptable (LPTA), versus best value evaluation. With the focus now on LPTA, it’s been difficult at times to decipher what the customers’ requirements really are.

Continue Reading ...

Hold your aces.

Renate Neely
September 13, 2013

Read privacy policies to understand how your personal information is being used or disclosed.

Continue Reading ...

9/11 for the Next Generation

John B. Wood
September 10, 2013

It is the job of our generation to keep the stories of 9/11 alive, and more importantly, to tell the survivors’ ongoing stories of strength and resilience.

Continue Reading ...

Look to the Cloud for Coordinated Disaster Relief

John Quarderer
September 9, 2013

Experience shows that natural disasters can often overwhelm the ability of governments to respond. This is especially true in poorer nations with limited resources. That’s when the call goes out for help, and the U.S. and other nations mobilize to rush aid to the stricken area and its people.

Continue Reading ...

Watch what you post online.

Renate Neely
September 6, 2013

With date and place of birth, cyber criminals are 98% of the way towards stealing an identity.

Continue Reading ...

“Empower, Connect, Dominate”: Army and Defense Technology Are the Focus at AFCEA TechNet Augusta 2013

Rinaldi Pisani
September 5, 2013

We’ll see you next week September 10-12 at Booth 309.

Continue Reading ...

Turn. It. Off.

Renate Neely
August 30, 2013

Disable auto-connection to wireless networks on all your electronic devices.

Continue Reading ...

Changing to Telos ID Channeling Services: What You Need to Know

Dawn E. Lucini
August 28, 2013

An airport security coordinator offers advice on how to get ready for the switch to Telos ID TSA-approved channeling services.

Continue Reading ...

Don’t click ‘Agree’

Renate Neely
August 23, 2013

…without reading the user agreement fine print. Is your data being shared with a third party? You should know. Don’t click ‘agree’ without reading the fine print of any user agreement.

Continue Reading ...

The Blind Men and the Cybersecurity Elephant

Maj. Gen. Paul Capasso USAF (Ret.)
August 19, 2013

The Blind Men and the Elephant, by John Godfrey Saxe, is a useful illustration of the difficulty of understanding, identifying, and resolving the issues surrounding the security of cyberspace.

Continue Reading ...

Start early.

Renate Neely
August 16, 2013

Talk to your kids about online safety and security as soon as they begin using a computer or mobile device. A back-to-school #TGIF for parents: Start early. Talk to your kids about online safety and #security as soon as they begin using a computer or mobile device. Please share!

Continue Reading ...

Safety first –

Renate Neely
August 9, 2013

Don’t get stuck using the same password for all accounts.

Continue Reading ...

Security Challenges and Technology Solutions Intersect at ACI-NA’s Public Safety Security Conference

Dawn E. Lucini
August 8, 2013

We look forward to seeing you at the Airports Council International – North America Public Safety & Security Fall Conference in Toronto!

Continue Reading ...

Responsive Web Design (RWD): Promise and Limitations

Emerging Technologies Group
August 5, 2013

The wide variety of web browsers and web-enabled devices has made web development even more complicated. Responsive web design (RWD) is a first step toward addressing this challenge.

Continue Reading ...

It isn’t a game.

Renate Neely
August 2, 2013

Be mindful of what you share online and protect your personally identifiable information (PII).

Continue Reading ...

Losing Cybersecurity Whack-a-Mole

Maj. Gen. Paul Capasso USAF (Ret.)
July 29, 2013

Clausewitz and Sun Tzu tried to warn us. We didn’t listen.

Continue Reading ...

Summer fun survival guide

Renate Neely
July 26, 2013

Headed to the beach this summer? Be wary of unprotected hotspots!

Continue Reading ...

Telos ID Looks Forward To Seeing You At The FAC 44th Annual Conference Exposition

Dawn E. Lucini
July 25, 2013

The Florida Airports Council’s annual conference is the largest and most successful statewide airport event in the country with more than 700 industry professionals in attendance and outstanding world-renowned speakers.

Continue Reading ...

You know what they’re eating.

Renate Neely
July 19, 2013

Do you know what they’re tweeting? Use parental controls and monitor what your kids are doing online.

Continue Reading ...

Don’t leave it to chance.

Renate Neely
July 12, 2013

Take charge of your online reputation.

Continue Reading ...

Trust But Verify: Collaborative Credentialing Enabled by Authentication, Authorization Access

Lisa Kimball
July 8, 2013

Leveraging the Three As to achieve symbiotic security and collaborative credentialing will help agencies with complementary missions to reach this degree of mutual confidence – which will, in turn, make our country more secure.

Continue Reading ...

Protect your digital John Hancock.

Renate Neely
July 5, 2013

Never share your password.

Continue Reading ...

Don’t be a silly goose.

Renate Neely
June 28, 2013

Update your browser for the latest security features.

Continue Reading ...

Know the Threat – Going Beyond the Recent NIST Update

Rick Tracy
June 24, 2013

Organizations need to understand what new and evolving threats exist. This knowledge will result in more focused and effective cybersecurity.

Continue Reading ...

Join Us at Next Week’s AFCEA Cyber Symposium

Stephen Horvath
June 20, 2013

The proverb “May you live in Interesting Times” certainly applies to cybersecurity these days. If you’re in the Exhibit Hall at the AFCEA Cyber Symposium Jun 25-27, stop by Booth #1016 to see what Telos has been cooking up lately.

Continue Reading ...

Aviation Channeling: A Working Model for Public-Private Partnerships

Dawn E. Lucini
June 17, 2013

The Telos ID DAC is a highly successful public-private partnership, between TSA, the U.S. aviation community, and Telos ID.

Continue Reading ...

Do you really know who’s watching?

Renate Neely
June 13, 2013

Limit the personal information you share on social networks.

Continue Reading ...

The Stress of Connectivity and Learning to Unplug

John B. Wood
June 12, 2013

What does a hectic pace and need-to-know-now mentality do to us over the long-term? We need to learn to unplug.

Continue Reading ...

Web Maps – A Comparative Summary

Emerging Technologies Group
June 3, 2013

There are dozens of free map applications available on the Internet, providing basic capabilities. However, map services now extend more advanced functionalities and provide APIs that developers can use for integration. The following is a comparative summary of the different features that developers frequently require when integrating applications with a map service as well as a brief description of five leading map services.

Continue Reading ...

Protect your private data.

Renate Neely
May 31, 2013

Delete your cookies.

Continue Reading ...

Doctor Who and Lessons in Cybersecurity

Maj. Gen. Paul Capasso USAF (Ret.)
May 27, 2013

If you are a Whovian, you may be familiar with the recent Dr. Who episode that highlights the dangers of using unsecure Wi-Fi and offers some prudent lessons in the area of cybersecurity.

Continue Reading ...

Handle with Care!

Renate Neely
May 24, 2013

Scan attachments before opening.

Continue Reading ...

Memorial Day at the TAPS Good Grief Camp and Survivor Seminar

John B. Wood

Today I had the opportunity to witness what is quickly becoming one of my favorite events of the year – the TAPS Good Grief Camp and Survivor Seminar. It is a testament to the true meaning of Memorial Day weekend.

Continue Reading ...

A Microwave and a Tuna Fish Sandwich

John B. Wood
May 22, 2013

I was recently reminded of a story that helped shape the type of leader I am, and the type of company we are at Telos.

Continue Reading ...

Cyberstorms: Like a Hurricane

Rick Tracy
May 20, 2013

The next generation of cybersecurity will be very similar to meteorology.

Continue Reading ...

AFCEA Leadership Award

John B. Wood
May 15, 2013

I was recently told that one of our team members was selected as an Armed Forces Communications and Electronics Association (AFCEA) International’s 2013 Leadership Award winner. AFCEA is recognizing what I have known all along.

Continue Reading ...

Supporting the Risk Management Framework for the Defense Industrial Base is Key to National Security

Justin Ford
May 13, 2013

A new risk management framework is the “cornerstone” of cybersecurity to protect the vital information of the DIB.

Continue Reading ...

Is your anti-virus software out of style?

Renate Neely
May 10, 2013

Always keep your anti-virus software up-to-date.

Continue Reading ...

See you next week at AFCEA East

Charisse Stokes
May 9, 2013

As an AFCEAN myself, I can attest to the value of attending AFCEA East. I’m especially excited to be participating at this year’s conference, with its first-rate line-up of keynote speakers, panel sessions, and other opportunities for learning and sharing with colleagues.

Continue Reading ...

Curiosity is Crucial in Math and Science

John B. Wood
May 8, 2013

People who understand and enjoy math and science have a great curiosity for why and how things work. That curiosity drives them not only to discover and learn, but to innovate and create. I fear that many kids are losing a sense of curiosity too early in their development.

Continue Reading ...

A Lesson from Winston Churchill on Cybersecurity Critical Infrastructure

Robert DuPree
May 6, 2013

Let’s not make Churchill’s fears about inaction become prophetic with respect to America’s critical infrastructure and the ever-increasing cyber threats we face.

Continue Reading ...

Focus on internet security.

Renate Neely
May 3, 2013

Remain vigilant and report suspicious activities.

Continue Reading ...

RAA’s 38th Annual Convention is where regional airline executives come together

Dawn E. Lucini
May 2, 2013

Telos ID and Tampa International Airport will offer a joint case study on how DAC services have reduced costs, created efficiencies, and increased customer service for airport badging operations.

Continue Reading ...

The Internet on Steroids: Securing the Internet of Things

Maj. Gen. Paul Capasso USAF (Ret.)
April 29, 2013

Internet of Things (IoT) cybersecurity must garner greater attention, or risk the fate of the whole of human ingenuity coming to a standstill.

Continue Reading ...

Don’t take the bait

Renate Neely
April 26, 2013

Typos, bad grammar and misspelled brand names are all signs of a phishing email.

Continue Reading ...

DBIR Findings – Unsophisticated Attacks, Undetected for Months

Rick Tracy
April 25, 2013

While Chinese cyber espionage tends to grab the headlines, I was initially drawn to a different statistic in the DBIR: 92% of breaches are perpetuated by outsiders, who mostly rely on unsophisticated attack methods, and go largely undetected for months. Weak, stolen and compromised passwords are the “weak locking mechanism at the front door.”

Continue Reading ...

Congrats to GUASFCU on 30 Years of Service

John B. Wood
April 24, 2013

I gained an unbelievable amount of real-world business experience when I worked at the Georgetown University Alumni and Student Federal Credit Union.

Continue Reading ...

TEALS Experience: Sharing My Passion for Computer Science

Malcolm Cooke
April 22, 2013

High school students don’t fully realize the value of getting an early start in computer programming, and many schools don’t have the tools or resources to showcase how beneficial the skill of computer programming would be for their students. So what can be done to get kids involved in Computer Science? Enter TEALS — Technology Education And Literacy in Schools.

Continue Reading ...

Don’t be a joker.

Renate Neely
April 19, 2013

Update your firewall.

Continue Reading ...

BRAC: Embrace DoD’s Efforts to Reform and Control Costs

John B. Wood
April 17, 2013

After every major conflict in our history, the military has retrenched as the post-war budget is dramatically reduced. The same holds true as we wind down our commitments in Afghanistan and Iraq. But unlike past post-war drawdowns, this retrenchment is combined with an unprecedented fiscal firestorm and a long overdue need for budget reform.

Continue Reading ...

11 Design Principles for Secure Applications

Emerging Technologies Group
April 15, 2013

Software applications come in all sizes — from small embedded systems to large-scale enterprise systems. There are no hard rules or silver bullets regarding what security concerns should be considered for an application, but the following secure design principles can help guide architects and designers alike.

Continue Reading ...

Size matters.

Renate Neely
April 12, 2013

Passwords should be at least 14 characters long.

Continue Reading ...

ALEAN’s Spring Conference is where airport law enforcement tackles security and public safety issues

Dawn E. Lucini
April 11, 2013

Next week I’ll be heading to Chicago for the 2013 Spring Conference, offered by Airport Law Enforcement Agencies Network (ALEAN). Having worked with and supported ALEAN since 1999, I’m looking forward to seeing old friends and colleagues and making new ones.

Continue Reading ...

Soft Skills in Addition to STEM

Rick Tracy
April 8, 2013

I agree that skills in the science, technology, engineering, and math (STEM) areas are critical for technology innovation and to maintain our nation’s competitive edge in the global marketplace. However, STEM skills should not come at the exclusion of soft skills that are based in humanities.

Continue Reading ...

She’s a purrrfect companion.

Renate Neely
April 5, 2013

But a terrible password. Pets are great companions, but they make terrible passwords. Remove your pet’s name as your password.

Continue Reading ...

Defending Freedom in Its Hour of Maximum Danger

John B. Wood
April 3, 2013

A few weeks ago I had the privilege of attending the Tragedy Assistance Program for Survivors (TAPS) Honor Guard Gala at the Andrew W. Mellon Auditorium in Washington DC. Just like in previous years, it was an incredibly moving event, and a beautiful tribute to the sacrifices of our fallen heroes and their loved ones.

Continue Reading ...

Practice good cyber hygiene.

Renate Neely
March 29, 2013

Regular software patches, password changes, firewall and antivirus updates. Remember the basics of good cyber hygiene, including: regular software patches, password changes, firewall and antivirus updates. Pass it along!

Continue Reading ...

4 Best Practices for Enhancing the Efficient Security of the Airport Badging Process

Dawn E. Lucini
March 25, 2013

However you’re currently collecting and channeling applicant data for background checks, there are some basic best practices all airports can follow to ensure their badging operations are working efficiently and securely. These steps will help foster data accuracy and eliminate redundant or unnecessary tasks in the badging process.

Continue Reading ...

USB Scan for Viruses

admin
March 22, 2013

TGIF! USB – Scan for viruses… each time you connect a flash drive to your computer. Even if you receive the thumb drive from a friend or coworker — you never know what sort of viruses may be lurking. Pass it along! You don’t need to be a cybersecurity expert

Continue Reading ...

Where Is the Next Generation of America’s Mathematicians and Scientists?

John B. Wood
March 20, 2013

I had become optimistic that as a nation we had finally woken up to the fact that we have a dire need for people skilled in the science, technology, engineering and math (STEM) disciplines. But I stumbled on two articles last week that made me shake my head and wonder — does our nation really get it?

Continue Reading ...

ASACoE Team Demonstrates Support Capabilities for Senior Air Force Leaders

Charisse Stokes
March 18, 2013

Over the past few months, the Application Software Assurance Center of Excellence (ASACoE) team stationed at Maxwell AFB – Gunter Annex in Montgomery, Alabama has hosted multiple visits from senior Air Force leaders and delivered an engaging presentation regarding the “proactive side of cybersecurity.” The ASACoE team stresses the importance of security of applications when protecting sensitive data against today’s threats.

Continue Reading ...

Recycling is great, but not for passwords.

Renate Neely
March 15, 2013

 1 account, 1 password. Reusing the same password for multiple accounts is dangerous.

Continue Reading ...

Continuous assessment is great, but lets not stop there.

Rick Tracy
March 11, 2013

Continuous assessment solved one problem, but created another. Continuous remediation is the obvious next step.

Continue Reading ...

How HOT is your WiFi Hotspot?

Renate Neely
March 7, 2013

WiFi hotspots are convenient, but not secure… surf with caution.

Continue Reading ...

Sutton’s Law—Consider the Obvious

Maj. Gen. Paul Capasso USAF (Ret.)
March 4, 2013

In an effort to improve the integrity, reliability, and security of software, the National Defense Authorization Act for Fiscal Year 2013 directs the DoD to take steps to improve its computer software assurance effectiveness. But before they reinvent the wheel, the DoD “should first consider the obvious” as prescribed by Sutton’s Law, and look to the ASACoE to provide a clear and consistent framework on software assurance processes, standards, and capabilities.

Continue Reading ...

ACI-NA’s Public Safety Security Conferences are where security challenges and technology solutions intersect.

Dawn E. Lucini
February 25, 2013

Next week I’ll be heading to St. Pete for the 2013 Public Safety & Security Spring Conference, offered by Airports Council International-North America (ACI-NA). As the former chair of ACI-NA’s Safety & Security Committee, I’m looking forward to seeing old friends and colleagues and making new ones.

Continue Reading ...

Finally, Cybersecurity Awareness

John B. Wood
February 21, 2013

The optimist in me hopes that something good will come of this cyber media buzz.

Continue Reading ...

“First to the Fight, Lethal and Light”

Maj Gen John Maluda (Ret. USAF)
February 15, 2013

I recently returned from U.S. Air Forces in Europe (USAFE), headquartered at Ramstein Air Base, Germany, where I observed an impressive demonstration of the operational capabilities of the 435th Air Ground Operations Wing (AGOW). My visit reinforced to me the honor Telos enjoys of empowering and protecting Air Force and other warfighters around the world not only with cyber and IT solutions, but also by providing them with world-class service.

Continue Reading ...

The New Cybersecurity Executive Order – Unfunded Mandate or Toothless?

John B. Wood
February 14, 2013

The need to beef up America’s cybersecurity got a strong shout-out in the President’s State of the Union Address on February 12th. This is a huge and long-overdue public recognition of the cyber threat we face.

Continue Reading ...

Social Media to Enable Social Security

Rick Tracy
February 11, 2013

Over the past five years we’ve seen social media severely disrupt technologies like email and industries like print media. Doesn’t it make sense that the same social media benefits could also be used to disrupt stodgy training and awareness programs, making them infinitely better?

Continue Reading ...

Beyond Formal Education – Internships and Real World Experience

Lisa Kimball
January 28, 2013

Providing a well-rounded education for high school and college students is not as simple as book-learning and test-taking – it also includes learning proper handshakes, collaboration, teamwork, and other soft skills. Unfortunately, schools often don’t have the bandwidth to accomplish it all, which is why school/business partnerships and internship programs are crucial to the success of our nation’s future workforce.

Continue Reading ...

Triple Jeopardy: Our Nation’s Fiscal Imbalance

John B. Wood
January 21, 2013

Congress needs to stop rationalizing things to death and check their egos and ideology at the door. They must compromise where need be to fund the government on time, get the best deficit reduction deal possible, and not let our nation default on its obligations. The long-term economic consequences of further stalemate are dire.

Continue Reading ...

The Fate of National Cybersecurity Remains a Cyber Odyssey

Maj. Gen. Paul Capasso USAF (Ret.)
January 14, 2013

Despite the economic turbulence facing this country, cybersecurity discussions must be brought to the forefront of the political agenda. The fate of our nation and the global economy are inseparable from cyberspace—they go hand in hand.

Continue Reading ...

35 Years Later: Employee Note and Voyager

John B. Wood
January 11, 2013

I received a nice note from an employee this morning, and I thought I’d share (with his permission of course.)

Continue Reading ...

Risk-based Decision Making. It’s a business thing.

Rick Tracy
January 9, 2013

Rely on your technical security experts for guidance and advice, but make the final decision based on a solid understanding of risk.

Continue Reading ...

Looking Ahead in 2013

Telos Corporation
January 2, 2013

What are the most important cybersecurity and IT challenges going into 2013? Telos subject matter experts offer their insights in this 2013 preview.

Continue Reading ...

Be Present This Holiday Season

John B. Wood
December 20, 2012

We need genuine human interaction, especially during difficult times.

Continue Reading ...

Data Visualization Means Clearer Information, Faster Answers and Better Decisions

Jeff Schneider
December 3, 2012

When done properly, data visualization is a powerful tool. It helps remove the processing time to understanding and acting on key data points, providing a faster way of making critical decisions and reaching goals.

Continue Reading ...

Fix America’s Fiscal Imbalance NOW, Not Next Year: An Open Letter to Congress

John B. Wood
November 30, 2012

Political differences aside, Washington needs to fix our nation’s fiscal problem — now.

Continue Reading ...

The On/Off Button – Missing Link of Cybersecurity

Maj. Gen. Paul Capasso USAF (Ret.)
November 28, 2012

What is missing from current cyber security discussion is how we connect the dots between the human element and cyber security. The answer may lie in ensuring all new security applications can pass a simple ergonomics litmus test.

Continue Reading ...

Thankful For Family

John B. Wood
November 19, 2012

I’d like to take a moment to reflect on why I am thankful for my family, during the holiday season and year round.

Continue Reading ...

Why do some people think compliance is a 4-letter word?

John Klemens
November 13, 2012

Viewing compliance through the prism of policy, procedure, paperwork — while ignoring the fact that compliance includes the mandate to implement, operate, and maintain technical controls — is a fractured view of compliance.

Continue Reading ...

Thank Our Living Heroes on Veterans Day

John B. Wood
November 10, 2012

Too often, Memorial Day and Veterans Day are spoken of interchangeably –simplified into two identical celebrations for our fallen heroes of war. But they are separate holidays for a reason, and it’s important to draw the distinction.

Continue Reading ...

The Achilles Heel of Cyberspace: Three Issues Plaguing Cybersecurity

Maj. Gen. Paul Capasso USAF (Ret.)
November 6, 2012

Protecting cyberspace is a shared responsibility. Ongoing cybersecurity conversations are essential to find the right balance in terms of governance, performance, privacy and usability. We have a duty to act, or face the fate of Achilles.

Continue Reading ...

Efficient and Effective Solutions for Our Nation’s Airports

John B. Wood
October 30, 2012

This goes without saying, but airport security is critical to our national security, which is why commercial airports and airlines are required to conduct background checks for employees who work in secure areas. A large US airport, along with its tenant businesses, may have tens of thousands of employees – which creates the onerous task of processing a large volume of background checks, in a timely fashion.

Continue Reading ...

Don’t Just Change Your Password… Change your Password Habits

Rich Wood
October 22, 2012

Many passwords have been divulged and analyzed over the past few years as a result of large scale breaches at RockYou, LinkedIn, Yahoo!, and Gawker (to name a few). How do you keep your password strong, when hackers continue to arm themselves with knowledge of commonly used passwords and patterns?

Continue Reading ...

The Migration to Mobility and Cloud Computing – A USG/DoD Flight Plan

David Kovach
October 17, 2012

At an AFCEA technical conference earlier this year, various senior DoD officials commented on mobility and cloud computing adoption. The following excerpts summarize their comments and illustrate the nexus of opportunity and resistance.

Continue Reading ...

The Migration to Mobility and Cloud Computing – The Evolution of Client Computing

David Kovach
October 16, 2012

Since late 2011, federal agencies have received new mandates to revamp their previously decentralized, PC-based client computing infrastructures to embrace secure client computing delivery models. This reality affords an opportunity for industry to assist the government in mobility and cloud adoption.

Continue Reading ...

Software Assurance Begins with Secure Development

Bill Barnes
October 12, 2012

Developers are a smart lot. If we’re to ever get ahead of the game in securing applications, we must educate and challenge the development community to only write secure applications.

Continue Reading ...

PON and SDN: What’s wrong with more bandwidth?

Dennis Mooney
October 8, 2012

Mae West said that “Too much of a good thing can be wonderful.” She could have been talking about the bandwidth delivered by passive optical network (PON) technology.

Continue Reading ...

Continuous is for people, too.

Rick Tracy
September 25, 2012

No one argues with the need for continuous monitoring. However, the notion of continuous must not be limited to just technology. As seen in most of the hacks we read about each week, people are often responsible for breakdowns in security that allow the hacks to occur.

Continue Reading ...

All Ages Read Together

John B. Wood
September 20, 2012

This coming Saturday, September 22nd, All Ages Read Together is hosting their 2nd Annual Horseshoe Hoedown event.

Continue Reading ...

Gigabit Wireless: Planning and Testing Are Critical Steps in 802.11ac Implementation

Rob Smith
September 17, 2012

For any wireless infrastructure looking at 802.11ac, ensure mixed technology support is available on both the clients and wireless radios to maintain backward compatibility and to blend the older technologies with 802.11ac. The result will be a hybrid wireless infrastructure that can maximize client support with bandwidth performance.

Continue Reading ...

Beyond Continuous Monitoring: Continuous Remediation is the New Frontier

Rick Tracy
September 12, 2012

As organizations continue to embrace the concept of continuous monitoring, continuous response remediation is the obvious next step. Extending the continuous monitoring framework to include automated methods for triggering remediation and response activity is essential.

Continue Reading ...

Moving Forward

John B. Wood
September 11, 2012

In addition to remembrance of our past, September 11th is also a time to look forward. We can’t alter the past, we can only make changes today and in the future that will have an impact on our lives.

Continue Reading ...

DoD Mobile Device Strategy: Essential for Mission Success and Warfighter Security

Maj. Gen. Paul Capasso USAF (Ret.)
September 4, 2012

Ubiquitous communications is a necessity for a highly mobile and collaborative workforce, and for the Department of Defense (DoD), the stakes could not be higher. Providing the right information, at the right time can mean the difference between life and death on the battlefield.

Continue Reading ...

The Toughest Enemy

John B. Wood
August 22, 2012

Suicide may be the toughest enemy facing today’s Armed Forces.

Continue Reading ...

Despite Criticism, Compliance Plays Important Role in Security Process

Rick Tracy
August 20, 2012

Security compliance has gotten a bad rap as a pedestrian process that doesn’t necessarily improve security. I believe this is a narrow point of view that diminishes the value of security compliance programs.

Continue Reading ...

All Take, No Give on Cybersecurity Legislation

Robert DuPree
August 7, 2012

In March, I said there was a chance to enact a comprehensive cybersecurity bill in 2012, but it would require more give and take from members of the House and Senate. Regrettably, the opposite has happened in both chambers. Looking back six months or so, what give and take should have happened for effective cybersecurity legislation to have been enacted? In hindsight, three things come immediately to

Continue Reading ...

The Real ‘Meaning’ of Sequestration: Zero Political Leadership

John B. Wood
August 3, 2012

It’s not only as a businessman that I’m concerned about the sequestration implications and the general direction in which our country is headed. It’s as a taxpayer and a parent that I’m most appalled.

Continue Reading ...

Fear of Failing

John B. Wood
July 26, 2012

As we kick of the Summer Olympics this week, remind yourself that each of those athletes failed, far more than they succeeded. Failure gives us the strength and motivation to improve.

Continue Reading ...

5 Reasons to Hire Our Nation’s Veterans

John B. Wood
June 15, 2012

It is discouraging that it so difficult for our returning service men and women to find well-suited civilian careers. Our veterans have characteristics that make high caliber employees on and off the battlefield.

Continue Reading ...

Salting Passwords

Dan Sherman
June 11, 2012

Recent high-profile security failures have put the spotlight on password security.

Continue Reading ...

A Spirit of Gratitude on Memorial Day

John B. Wood
May 25, 2012

Earlier today I had the privilege to spend a few hours at the TAPS (Tragedy Assistance Program for Survivors) Good Grief Camp and Survivor Seminar in Arlington, where thousands of surviving children, parents, husbands, wives, and fiancés gathered to remember and heal from the tragic loss of their fallen heroes. What a great kick off to the Memorial Day weekend.

Continue Reading ...

Core Values On and Off the Clock

John B. Wood
May 22, 2012

Our Core Values are simple at Telos, and there is an expectation that we all live these Core Values both on and off the clock.

Continue Reading ...

Augmented Reality: Super-Realism

Jeff Schneider
May 21, 2012

As collaborative and innovative technologies continue to advance, Augmented Reality will become a more integral part of our everyday lives. If executed correctly, Augmented Reality will become inseparable from computing—AR will seamlessly mesh our digital and real-world views.

Continue Reading ...

The Power of a Network

John B. Wood
May 14, 2012

In the next few weeks young adults will be graduating from colleges around the country—fired up and looking for their first big break. My advice to these new grads? Utilize your network early in your career.

Continue Reading ...

STEM + the Arts = STEAM

John B. Wood
May 7, 2012

We need to engage our children early in their schooling, and teach them that science and math can be both fun and cool. What better way than through the arts?

Continue Reading ...

Would Online Voting Trade Security for Convenience?

Rick Tracy
April 30, 2012

There are many who believe that it is not possible to adequately secure an e-voting transaction. Considering all of the other sensitive transactions that are conducted online, I don’t understand this perspective.

Continue Reading ...

Saluting the families of our fallen heroes

John B. Wood
April 26, 2012

Over the years, Telos has formed a wonderful relationship with Tragedy Assistance Program for Survivors (TAPS). We believe strongly in their mission to bring comfort and support to those loved by our fallen heroes.

Continue Reading ...

Cyber Skill Sets Needed for All Future Warfighters

Maj Gen John Maluda (Ret. USAF)
April 23, 2012

Major General John Maluda (Retired USAF) discuss that in cyberspace, every service member is on the front line

Continue Reading ...

BYOD Issues Are with Data, Not Device

Dan Sherman
April 12, 2012

Many of the current issues surrounding BYOD are similar to the BYOD issues from ten, fifteen, or twenty years ago. Whether a floppy disk, USB drive or iPhone–it isn’t the device that needs to be managed, but the data stored within the device.

Continue Reading ...

Updating DOD IT Risk Management Best Practices

David Wilson
April 1, 2012

As of March 2012, the DoD was using the DoD Information Assurance Certification and Accreditation Process (DIACAP) and DoD-specific controls, which were issued in 2007 and 2003 respectively. It is time for these standards and guidelines to be updated.

Continue Reading ...

TSA Security Practices

John B. Wood
March 27, 2012

In a post-9/11 world, additional airport security precautions are our reality. The good news? The TSA is moving towards improving their trusted traveler programs and aviation worker screening practices.

Continue Reading ...

Event Coordination with MAAC: eScheduler

John B. Wood
March 20, 2012

Whether a rock concert or the Super Bowl, all large-scale events require massive venue coordination.

Continue Reading ...

Proactively Guarding Our Networks

Rick Tracy
March 16, 2012

As is the case with conventional warfare, there is a need for proactive intelligence gathering capabilities that allow organizations to “see over the horizon” and anticipate cybersecurity issues before they materialize as real problems within their network.

Continue Reading ...

Shifting the Paradigm with Personalized Learning

John B. Wood
March 13, 2012

JoA strong education system, particularly in the STEM disciplines, is not only crucial to a thriving economy, but also to our national security. I believe there is a shift in the way our country is beginning to view education. The traditional, standardized education system is being challenged by the notion of student-centric, personalized education.

Continue Reading ...

Cybersecurity Legislation Should Be Debated, Voted On and Decided, Not Obstructed

Robert DuPree
March 5, 2012

Telos’ Government Affairs Manager, Robert DuPree, recaps the progression of cybersecurity legislation over the last year.

Continue Reading ...

FedRAMP Security Controls: Points to Ponder

John Klemens
February 24, 2012

In the wake of the release of FedRAMP’s baseline security controls and the FedRAMP CONOPS, questions about customizing controls and leveraging cloud service providers (CSPs) abound.

Continue Reading ...

A 20 Year Success Story

John B. Wood
February 23, 2012

Last week I reached a milestone: I marked my 20th anniversary with Telos. I often joke that Telos has been a “20 year overnight success.” Those first ten years were tough…

Continue Reading ...

Cybersecurity still key priority as federal IT does “more with less”

John B. Wood
February 15, 2012

It is encouraging that despite the proposed cutback in IT spending, the administration still views cybersecurity as a top priority.

Continue Reading ...

PON: Just-in-time remedy for federal IT budget cuts

Dennis Mooney
February 14, 2012

Passive optical networks (PONs) offer hope for cost savings and better performance in the face of pending federal IT budget cuts.

Continue Reading ...

Halftime

John B. Wood
February 6, 2012

The game isn’t over, and we have the ball. We, as individual Americans are the deciders of our own recovery—much like each individual player decides whether or not he is willing to put in the second-half effort.

Continue Reading ...

Fostering Innovation with R&D

John B. Wood
February 2, 2012

Encouraging research relationships between universities and corporations will foster innovation and economic growth in the Commonwealth.

Continue Reading ...

Pros and Cons of Agile Development

Hugh Barrett
February 1, 2012

It’s a common misconception that Agile development methodology is a no-documentation-little-planning-and-gung-ho-developers-on-the-loose style of project management compared to the traditional Waterfall methodology. With software development cycles getting shorter and shorter due to demand for faster time-to-market, Agile offers a project management style suited to the ever-changing software development environment.

Continue Reading ...

Enhancing TSA Security Practices (continued) – For Employees

Lisa Kimball
January 24, 2012

Lisa Kimball, Vice President of Telos Identity Management Solutions, continues the discussion about improving airport screening operations and transportation security, with a focus on the employee side of airport security.

Continue Reading ...

Spear Phishing: Dont Take the Bait!

John B. Wood
January 16, 2012

The internet is swarming with malicious hackers, looking for easy targets. Keep your eyes open for phishing and spear phishing attacks, and when in doubt… don’t click the link!

Continue Reading ...

Enhancing TSA Security Practices — For Passengers

Lisa Kimball

Lisa Kimball, Vice President of Telos Identity Management Solutions, discusses a recent House committee report calling for TSA reform, and offers development suggestions such as a biometrics-based registered traveler program.

Continue Reading ...

Balance

John B. Wood
January 5, 2012

A note for the New Year: A healthy work/life balance is essential.

Continue Reading ...

Securing Cyber Transactions – Chip and PIN

Robert Brandewie
December 13, 2011

Few are aware of the controversy surrounding the control of fraud in credit card use and the differences between the approaches taken in the US and much of the rest of world.

Continue Reading ...

CyberScope and Continuous Monitoring: Looking Ahead

David Wilson
November 28, 2011

Just two weeks ago, we passed a significant CyberScope milestone: the deadline for beginning monthly submissions. So I thought this would be a good time to take a look at three concerns I have about agencies’ security practices when compared with CyberScope reporting requirements.

Continue Reading ...

A Thanksgiving Note

John B. Wood
November 23, 2011

aRegardless of our individual situations, we all have plenty for which to be thankful. Reflecting on that sort of gratitude can be humbling—which is a good thing, especially this time of year.

Continue Reading ...

Social Engineering: Are You The Weakest Link?

Dan Sherman
November 16, 2011

Telos’ Director of Information Security, Dan Sherman, discusses how hackers use social engineering to target the weakest link in an organization.

Continue Reading ...

Veterans Day Message

John B. Wood
November 10, 2011

I believe that simplicity and sincerity prevails.

Continue Reading ...

Questions Raised, But Not Answered

David Wilson
November 3, 2011

Telos’ Director of Cybersecurity Strategy & Information Assurance, David Wilson, answers questions raised by the latest House Cybersecurity Task Force report.

Continue Reading ...

Congress Needs Specific Cybersecurity Recommendations

Robert DuPree
November 1, 2011

Telos’ Government Affairs Manager, Robert DuPree, discusses the recommendations found in the recent House Republican Cybersecurity Task Force report.

Continue Reading ...

The JASON Project and 21st Century Education

John B. Wood
October 27, 2011

With a strong STEM curriculum in our local schools, it is my hope that we will create a well educated population from which companies like Telos can hire in the coming years. In addition to a strong STEM curriculum, it is my hope that our children will receive a true 21st century education, through initiatives like The JASON Project.

Continue Reading ...

TAPS Run and Remember

John B. Wood
October 7, 2011

Members of the TAPS Run and Remember Teams understand what a privilege it is to run in memory of our fallen heroes

Continue Reading ...

Personal Responsibility as a Digital Citizen

John B. Wood
September 29, 2011

October is National Cyber Security Awareness Month, and a good time to educate ourselves on how to become better digital citizens.

Continue Reading ...

Identity Technologies in Disaster Response

John B. Wood
September 26, 2011

I invite you to listen to LTC Richard Faulkner as he discusses the tracking and locating of refugees following the 2010 earthquake in Haiti, the lessons learned from that disaster response, and the future of identity technologies in disaster response and deployed operations.

Continue Reading ...

Intro to Cyber Identity: The Internet Dog Revisited

Robert Brandewie
September 19, 2011

Even though the Internet Dog was created nearly 20 years ago, it still provides applicable commentary about the basics of cyber identity in 2011.

Continue Reading ...

Security and DIY Tech Warriors

John B. Wood
September 16, 2011

Are the soldiers who moonlight as Do It Yourself (DIY) application developers also skilled security practitioners? Security must be baked into an application from the very beginning, rather than bolted on at the end–especially when mission critical information is at stake.

Continue Reading ...

Ten Years Later

John B. Wood
September 9, 2011

As the 10th anniversary of the terrorist attacks on September 11th nears, let’s reflect upon how we moved on from this unfathomable act of terror and how the strength of the American spirit endured.

Continue Reading ...

Information Security Is Like Football

Rick Tracy
September 6, 2011

When talking about football you often hear people stress the importance of blocking and tackling–or focusing on the fundamentals of football. That same notion of mastering the fundamentals also applies to information security.

Continue Reading ...

Defense-in-Depth Is an Outdated Concept

John Klemens
August 24, 2011

Perception, context, and historical perspective lead to the conclusion that Defense-in-Depth (D-I-D) is outdated as an effective term to characterize the security of your network.

Continue Reading ...

Project Rebirth

John B. Wood
August 19, 2011

As you may be aware, Project Rebirth is an effort that Telos has been involved with since the months immediately following the terrorist attacks on September 11th, 2001. I invite you to watch the feature length documentary film, Rebirth.

Continue Reading ...

Eating Our Identity Peas

Robert Brandewie
August 9, 2011

Against the backdrop of a very political debate on raising the debt limit for the United States, I would like to pose a similar dilemma regarding the United States’ position on cyber identity. We need to hold our nose, and seriously discuss the need for secure cyber identities with rigor and imagination.

Continue Reading ...

Understanding the Enemy through Social Media

John B. Wood

For those of you who thought social media was just a fad… think again. A strong understanding of the interwoven connections of social media is an effective and powerful way to understand our enemies, and prepare for future military conflicts.

Continue Reading ...

Too Close to the Economic Edge

John B. Wood
August 1, 2011

The high-stakes economic game that has played out in Washington in recent months brought us perilously close to a catastrophic political and economic breakdown. All for a deal that could have been reached months ago.

Continue Reading ...

Teaching STEM to our Children

John B. Wood
July 7, 2011

The importance of STEM education in our country has been a reoccurring theme in my blog—and it will continue to be. STEM education is just that important to me, our industry, and the health of our national security. And unfortunately, we are failing to teach our children a proper STEM curriculum.

Continue Reading ...

Thoughts on Next-Generation Risk Management

John B. Wood
July 5, 2011

Telos had the pleasure of discussing the future of cybersecurity with Dr. Ron Ross of the National Institute of Standards and Technology (NIST). In this discussion, Dr. Ross shared interesting cybersecurity insights. I’ll share, and expand upon a few of his points.

Continue Reading ...

Cyber Hygiene

John B. Wood
June 24, 2011

Though we tell our children to clip their finger nails and clean their ears, we often forget to tell them to sign out of their online accounts when they leave the computer, update their anti-virus software when prompted or avoid opening attachments from senders they don’t know. In other words, we forget to teach them about good cyber hygiene.

Continue Reading ...

Consumer-grade Solutions for Business Applications. Think twice.

Rick Tracy
June 22, 2011

Whether you are talking about social media, cloud services or smart phones, the focus of consumer-grade solutions may not always be well suited for business applications, especially when sensitive information is involved.

Continue Reading ...

Common Experiences

John B. Wood
June 6, 2011

At our Security Solutions conference in May, we were honored to have General Michael Hayden as our keynote speaker. Hayden made a fascinating point about shared experiences. Our shared experiences help us to define and communicate through socially-constructed frameworks, such as language.

Continue Reading ...

Why insourcing doesnt make sense

John B. Wood
June 2, 2011

I’ve noticed another wave of government insourcing stories in the news recently. As the CEO of a defense contractor with a high-caliber employee population, I am concerned, but not for the reasons you may think.

Continue Reading ...

Shall Not Perish

John B. Wood
May 28, 2011

This Memorial Day weekend, TAPS is hosting the 17th Annual TAPS National Military Survivor Seminar and Good Grief Camp for Young Survivors. TAPS brings together survivors and leading professionals in the grief and trauma field to share a weekend of understanding, hope, courage and love.

Continue Reading ...

Why politicize federal contract awards?

John B. Wood
May 20, 2011

The Obama Administration has drafted an executive order to require federal contractors to submit information about their federal political contributions as part of their bid proposals. I’m all for transparency, but this should not go forward.

Continue Reading ...

Security Solutions

John B. Wood
May 16, 2011

We just concluded our 2011 Security Solutions conference last week in Tampa. It was a great week with wonderful speakers, new technology demonstrations and conversations among government cybersecurity professionals.

Continue Reading ...

Closure

John B. Wood
May 2, 2011

As we celebrate the elimination of the Al-Qaeda mastermind Osama bin Laden, we all remember where we were on 9-11-01. Hopefully, the families of the victims get an element of closure and continued healing from their very painful losses on that tragic day.

Continue Reading ...

Cyber Warfare Leadership Training

John B. Wood
April 29, 2011

To move organizational development into 21st century, the most significant shift that must occur is to rid hierarchy from the exchange of ideas. Leaders must cease to think in terms of how many people report to them, with the flow of ideas streaming from the top-down.

Continue Reading ...

Educating Loudoun

John B. Wood
April 26, 2011

I recently joined forces with other members of the Loudoun County education and business communities to form a new political action committee called Educate Loudoun. Put simply, our goal is to make Loudoun’s education system the best it can be. If we make the education system in Loudoun even better than it is, families will want to move here and stay here—making it a catalyst of economic growth.

Continue Reading ...

In Defense of Compliance: Security through Measuring Minimum Practices

David Wilson
April 13, 2011

Information security luminaries, trade publications, and process critics continually and correctly point out that being compliant is not the same as being secure. Compliance does not equal security, but I will defend the importance of security activities based on compliance initiatives.

Continue Reading ...

Honoring Our Military’s Children

John B. Wood
April 4, 2011

This month is the Month of the Military Child. Each April, we reflect on the unique sacrifices made by the youngest 1.8 million members of the military community.

Continue Reading ...

Persevering Through Crisis

John B. Wood
March 28, 2011

My father taught me that the key to persevering through a crisis is constant and honest communication. I was reminded of his advice as I read an article regarding the recent RSA SecurID security breach.

Continue Reading ...

The Immovable Object and the Irresistible Force

Frank Whitehead
March 23, 2011

The balance of getting information to people that need it versus ensuring sensitive information is not exposed will remain a major concern for businesses and governments. A rational approach that automates essential information access policies and ensures compliance is essential to meet this critical balance.

Continue Reading ...

Windy Hill Foundation

John B. Wood
March 22, 2011

I’d like to put the spotlight on an organization in Loudoun County that is doing great work to improve our community through infrastructure. The Windy Hill Foundation provides affordable housing to low income families in Loudoun County.

Continue Reading ...

House Speaker Gets It; Democrats and Tea Party Republicans Need To Get It

John B. Wood
March 11, 2011

All the political rhetoric about cutting discretionary spending now is missing the point – cuts only on the discretionary spending side, no matter how huge the reductions are, won’t do the job.

Continue Reading ...

Supporting Our Nation’s Wounded Warriors

John B. Wood
March 9, 2011

Telos is proud to be the lead sponsor of the Trout Unlimited (TU) Veterans’ Service Program. For those wounded in service to our nation, the river may not take away the physical scars, but it can definitely start the mental and spiritual healing.

Continue Reading ...

With Apple iPad, Perhaps Less is More…

Rick Tracy

Like roughly 15 million other people, I bought an Apple® iPad in 2010. After spending some time with the device, I quickly became a fan as I found that it filled a gap between my smartphone and my laptop that I didn’t realize even existed. It may also be able to enhance security within the corporate environment.

Continue Reading ...

TAPS

John B. Wood
March 1, 2011

The 2011 TAPS Honor Guard Gala, is coming up on Tuesday April 5th. For those who are able, I would personally appreciate any support you can give to the event.

Continue Reading ...

Managing sensitive data: You have to know what you’re trying to protect before you can protect it

Rick Tracy
February 22, 2011

Don’t underestimate how difficult it is to protect sensitive data. There are many variables that come in to play, making data protection a complex function. That said, data is the life blood of every company. Protecting sensitive data is not just a good idea, it’s essential to achieve competitive advantage, and in many cases to comply

Continue Reading ...

Cybersecurity: Threat and Response

John B. Wood
February 17, 2011

Many mainline technology companies around the country are finally acknowledging the importance of including security measures into their offerings; which is why there has been so much M&A activity surrounding IT security vendors over the last year.

Continue Reading ...

Wanted: Forward-Looking Leadership on a New Cybersecurity Strategy (Not a Horse and Buggy Mentality)

Rick Tracy
February 16, 2011

The CSIS Commission on Cybersecurity for the 44th Presidency has just issued an update on the progress made since it issued its initial cybersecurity report two years ago. What is most striking is just how little improvement has been made in the critical areas they identified.

Continue Reading ...

Vivek Kundra’s 25 Points and Cloud Security

John B. Wood
February 8, 2011

Late in 2010, Vivek Kundra, the first Federal Chief Information Officer (CIO) released a plan to improve the efficiency of federal IT systems, including a ‘Cloud First’ policy. There has been recent push-back to his initial 18 month deadline, including concerns over security in the cloud.

Continue Reading ...

State of the Union

John B. Wood
January 28, 2011

Earlier this week, President Barack Obama gave his second State of the Union address and touched on an issue significant to Telos and the technology industry—the need for an increased emphasis on science and math education at home and in our school systems.

Continue Reading ...

Will cybersecurity legislation finally reach the finish line in 2011?

Robert DuPree
January 5, 2011

America’s enemies are constantly probing to find new ways to penetrate our defenses and wage cyber warfare against our military, intelligence community and infrastructure. For this reason, cybersecurity legislation should be viewed as a national security matter – one that rises above day-to-day congressional politics.

Continue Reading ...

Is your organization a likely target of a Wikileaks-like attack?

Dan Sherman
December 21, 2010

The insider threat has been largely ignored and misunderstood, even by some of the top security professionals in the industry. And although this industry has made great strides in the past few years, a technology solution alone will not stop a malicious insider.

Continue Reading ...

Happy Holidays

John B. Wood

As I sat to write my holiday message, I planned to remind everyone of the true holiday spirit—to selflessly give to our families, friends, and those less fortunate than ourselves. But as I thought a moment longer, I realized that our Telos community doesn’t need a reminder about the meaning of the holiday spirit, because they live it, each and every day.

Continue Reading ...

Michele Nakazawa Named CFO of the Year by Washington Business Journal

John B. Wood
December 7, 2010

Congratulations to Telos’ Michele Nakazawa for winning the Washington Business Journal’s CFO of the Year Award!

Continue Reading ...

Happy Thanksgiving

John B. Wood
November 24, 2010

Thanksgiving is not about wishing, or pining for what we don’t have. It is simply about being thankful for what we do have. In the spirit of the holiday, here is what I’m thankful for.

Continue Reading ...

Network Intrusion Attempts and the Bigger Picture of Cyberwar

John B. Wood
November 17, 2010

In a recent Wired Danger Room blog post, Noah Shachtman accused Pentagon brass of crying “wolf!” on the issue of the cyber threat. While leaders have gone on the record citing an exponential rise in the frequency and sophistication of attempts to hack military networks over the past ten years, the blog offers a recent draft federal report as evidence to the contrary.

Continue Reading ...

Veterans Day Message

John B. Wood
November 10, 2010

Our appreciation for the brave men and women who answered the call to military service cannot be condensed to a single calendar day. Rather, November 11th should serve as a reminder of the indebtedness we have to our veterans, year round.

Continue Reading ...

CFO of the Year

John B. Wood
November 5, 2010

Earlier this week, I received word that the Washington Business Journal has selected our Chief Financial Officer, Michele Nakazawa, as a finalist in its Fourth Annual CFO of the Year awards program.

Continue Reading ...

Four Key Benefits of NIAP Common Criteria Testing

David Wilson
November 4, 2010

Telos recently completed our second common criteria evaluation for Xacta IA Manager. In this blog we’re sharing some of our feedback to NIAP while highlighting the four best reasons why organizations should go through with this effort.

Continue Reading ...

SmartPhones Extend the Perimeter of Your Network and Increase Risk

Rick Tracy
October 20, 2010

SmartPhones aren’t just fancy phones. They are mini computers that have the ability to store sensitive personal and business data such as contacts, notes, photos, videos and documents. And because of this, SmartPhones must be protected at least as well as other corporate IT assets.

Continue Reading ...

Run and Remember

John B. Wood

On October 31st,Telos will take our commitment to support our military men and women one step further… actually 52,000 steps further, as we tackle the 2010 Marine Corps Marathon in support of the Tragedy Assistance Program for Survivors (TAPS) Run and Remember team.

Continue Reading ...

National Cyber Security Awareness Month

John B. Wood
October 13, 2010

October was declared National Cyber Security Awareness Month by President Obama, hinged on the tagline: Stop. Think. Connect. Cyber Security Awareness Month is a great reminder for citizens to take responsibility for their online safety.

Continue Reading ...

GOTS or COTS? – Getting the Best IT Value for the Customer and the Taxpayer

Robert DuPree
October 8, 2010

The government should always seek the best possible value for both the government end user and the taxpayer — and experience has shown that this best possible value can often be achieved through greater utilization of COTS products.

Continue Reading ...

Military Appreciation Day

John B. Wood

Saturday October 9th is Military Appreciation Day at the 2010 Constellation Energy Senior Players Championship. With deep gratitude for the commitment and daily sacrifices of our military and their families, Telos has sponsored free general admission to the tournament that day.

Continue Reading ...

Working Hard Together

John B. Wood
October 4, 2010

Over the last weekend in September, four Telos employees ran in the Ragnar Relay, a 201 mile relay race completed by teams of twelve. As members of Team Caffeinated, they ran from Cumberland, MD to Washington, DC in 30 hours and 55 minutes.

Continue Reading ...

The Fifth Warfighting Domain

John B. Wood
September 29, 2010

Cyber is the fifth warfighting domain, will be a part of all future conflict, and beyond that, a successful attack on the cyber domain could dramatically affect our quality of life and economic well-being.

Continue Reading ...

Continuous Monitoring and the Case of NASA

David Wilson
September 23, 2010

It’s not a binary decision to do either (A) implement NIST controls or (B) perform continuous monitoring. A good security management program has established mechanisms to perform both functions.

Continue Reading ...

Chief of Staff Team Excellence Awards

John B. Wood
September 13, 2010

The Application Software Assurance Center of Excellence (ASACoE), including the team’s employees from Telos Corporation, has been selected to represent Air Force Materiel Command in the 2010 Air Force Chief of Staff Team Excellence Awards competition.

Continue Reading ...

Rebirth: Nine Years After 9/11

John B. Wood
September 8, 2010

It gives me great hope that signs of new life can be found at Ground Zero. A single tree is a symbol of rebirth, not only for that plot of land, but for our country. We endure. We rebuild. We overcome and prosper.

Continue Reading ...

Securing the Application Layer

Dan Sherman
September 3, 2010

Application security has been a steadily growing focus area of enterprise information security programs. Following many security breaches, affecting small and large corporations alike, businesses are finally giving application security the attention it has always deserved.

Continue Reading ...

The Help Desk: A Strategic Risk Management Tool

Rick Tracy
August 26, 2010

How do you manage configuration change within your organization? Absent a well defined and auditable process, configuration change may introduce significant risk to your organization.

Continue Reading ...

My “Double Bottom Line”

John B. Wood
August 25, 2010

Recently, someone asked me when economic development and community enrichment began to influence my business perspective. It was a good question, so I thought I’d share…

Continue Reading ...

Shout Out

John B. Wood
August 19, 2010

Just want to give a shout out to one of our employees….His name is Jim Morehouse, and he happens to be a retired Air Force general officer. BUT, you wouldn’t know that from speaking with Jim.

Continue Reading ...

Teachers in Industry

John B. Wood
August 18, 2010

A few weeks ago, Telos hosted a group of Loudoun County teachers as part of George Washington University’s “Teachers in Industry” program. During the summer, teachers from across the county visit various businesses to learn more about the skills their students will need in order to succeed once they graduate.

Continue Reading ...

Next-Generation Computing: Natural User Interface

Jeff Schneider
August 4, 2010

The NUI environment changes the social dynamic. It’s gestural, multi-touch, multi-user, has a 360-degree canvas and environment, and it can directly interact with objects. All of these concepts provide new challenges for us as developers.

Continue Reading ...

Controls Inheritance — A Moral Dilemma

Justin Furniss
July 22, 2010

Throughout the course of an accreditation it is becoming commonplace that a single system inherits controls from another system, or many systems for that matter. Assuming this trend continues, as I believe it will, I detect a moral dilemma in our future. First stop: Controls Inheritance 101…

Continue Reading ...

The Mother of All Cyber Bills

John B. Wood
July 13, 2010

Less than two months ago, I said the Rockefeller/Snowe bill would enhance our nation’s cybersecurity. I still believe that but am amazed that its fate may be determined based on its ability to be enacted as part of a grand assemblage with other cyber proposals, all to be somehow lumped together into a final Mother of All Cyber Bills before adjournment.

Continue Reading ...

Hiding Data in Documents – The Insider Threat Revisited

Dan Sherman
July 8, 2010

A malicious insider can use zipped up “.docx” files to hide text inside the document and have it go undetected by the Microsoft Document Inspector. How do you monitor and/or prevent this type of attack from happening? Read Dan Sherman’s blog post to find out more.

Continue Reading ...

Vigilance in Cyber Defense

John B. Wood

The cyber threat is real and it has been clearly stated by our nation’s top defense leaders. The questions now is what are we going to do about it? What are our civilian, military and intelligence leaders going to do about it? What are we in the private sector going to do about it?

Continue Reading ...

Could an electronic Pearl Harbor really happen?

Rick Tracy
June 30, 2010

Just because there hasn’t yet been an electronic Pearl Harbor doesn’t mean it’s not possible. What evidence is necessary to prove cyber warfare is possible or probable or even underway? Will we even have the benefit of warning signs? How much warning was there on that quiet Sunday morning of December 7, 1941? Not much.

Continue Reading ...

Thinking About Digital Identity

Robert Brandewie
June 25, 2010

The concept of identity is critical to all of our interactions in the digital world – both at work and in our personal lives. When you think about identity, you have to broaden your view as you think about the Internet and its many nooks and crannies. The key to understanding identity in the digital world is to understand the strength of the identity, and therefore the amount of trust you can place in it.

Continue Reading ...

Continuous Monitoring and FISMA

David Wilson
June 21, 2010

There has been a lot of recent discussion about anticipated changes to FISMA. Here are a few things worth keeping in mind in an effort to avoid the mental traps of the current media hype.

Continue Reading ...

The Importance of STEM Education

John B. Wood

When I founded the Loudoun CEO Cabinet several years ago, the first question I asked of my fellow CEOs was, “What do we have to do to make Loudoun County the best place to live and work in America?”

Continue Reading ...

Cybersecurity in 2010

Dan Sherman
May 18, 2010

It’s hard to believe that in 2010, we are still a nation ill prepared to deal with cyber attacks. The old belief that if you have a firewall you are safe no longer holds true. Application layer attacks may be the current drug of choice, but they are certainly nothing new… (more)

Continue Reading ...

Rockefeller / Snowe Bill Fosters Cybersecurity Innovation

John B. Wood
May 16, 2010

Administration officials, congressional committees and industry experts all agree that our country’s military and economic well-being depends upon being able to deter or thwart cyber attacks. Government and industry are continuously collaborating to enhance our nation’s cybersecurity… (more)

Continue Reading ...