Category: Security


author:

Security

Assessing the Navy’s New Cybersecurity Program

September 24, 2019

The Navy’s new Combat to Connect in 24 Hours (C2C24) is an ambitious program with the potential to change naval warfare as we know it. The program is designed to improve operational efficiency by automating the Navy’s risk management framework (RMF) efforts; providing sailors …



author:

Security

Maintaining a Secure Environment: Compliance Considerations

September 11, 2019

A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should be done involving the application of best practices and compliance mandates. Best practices are …






author:

Security

6 Risk Management Best Practices You Can Implement Today

August 29, 2019

Understanding risk management (and why it’s important) as I highlighted in my last post, Why Risk Management Is Critical to Your IT Infrastructure, is essential as you begin to plan a course of action. In this post, we’ll continue to explore risk management, and …


author:

Security

2 Key Assets in the Government’s Cybersecurity Battle (Part II)

August 27, 2019

Read part one here. Technology: Providing the Necessary Visibility Cybersecurity personnel can’t succeed without the proper tools, but many of them don’t have the technology necessary to protect their agencies. According to the Federal Cybersecurity Risk Determination Report and Action Plan, 38% of federal …