Jim has 18 years of experience building and delivering simple and easy-to-use software solutions in the security market. He is passionate about customers, understanding their needs, and delivering solutions that make their jobs easier and their infrastructures and data more secure.

author:

Security

Worried About Protecting Your Data? CDM Is Here to Help


The Continuous Diagnostics and Mitigation (CDM) Program, issued by the Department of Homeland Security (DHS), goes a long way toward helping agencies identify and prioritize risks and secure vulnerable endpoints. How can a federal IT pro more effectively improve an agency’s endpoint and data …


author:

Security

How Security Leaders Might Minimize Human Error


A recent federal cybersecurity survey by SolarWinds found federal IT professionals feel threats posed by careless or malicious insiders or foreign governments are at an all-time high. Worse, hackers aren’t necessarily doing technical gymnastics to navigate through firewalls or network defenses. Instead, they’re favoring …


author:

Security

Assessing the Navy’s New Cybersecurity Program


The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors …




author:

Security

Making Every Agency Employee a Security Advocate


The rising numbers of data breaches should come as no surprise to federal IT security pros who work every day to ensure agency information is secure. However, these breaches may not be something a federal IT team can prevent on its own. According to …


author:

Security

Giving SIEM Tools a Role in Your IT Security Operations


While there is no one single solution to guard agencies against all cyberthreats, there are tools that can certainly go a long way toward managing and understanding the cyberthreat landscape. One such tool is Security Information and Event Management (SIEM) software. SIEM tools combine …


author:

Security

Neglect These Cybersecurity Fundamentals at Your Peril


“Shiny object syndrome” exists within both the IT and cybersecurity fields. The press loves to focus on the sleekest new security toys or the latest threat-hunting technique. After all, red-team/blue-team simulations and advanced threat hunting sound cool and impress at networking events. However, for …



author:

Security

A Frank Discussion of Multifactor Authentication


Someone steals credentials from one of your client’s executives. They guess the username and password to their email account. From there, the cybercriminal can send out targeted phishing emails to compromise even more accounts or trick employees into handing over sensitive data. To combat …


1

2