A Need for Better Cybersecurity Time Management
Some Suggestions for the Department of Defense A Hybrid-Risk Management Framework (RMF) Step 3 A challenge facing the Department of...
Some Suggestions for the Department of Defense A Hybrid-Risk Management Framework (RMF) Step 3 A challenge facing the Department of...
Cyber Surveillance, its implications, and China's embrace Are you aware of the potential for many of these new technologies? I...
A Disruptive Technology Solution for the 21st Century: "Voice of America 2.0" Is this the same attitude that blindsided us...
While not greatly different, there are some unique variations The history of Risk Management (RM) can be traced to the...
The mainstream analysis is seriously flawed A shortage of nearly three million: This number may seem abstract,but it’s having a...
A review of academic work addressing how to improve cybersecurity Larrimore, N. P. (2018). Risk management strategies to prevent and...
We consider the following mini-framework This is a discussion on an emerging cybersecurity tactical approach to inject an even lower...
EDITOR: We received this from the original complainant who died several months ago and am sharing this as a public...
What does this mean for federal contractors? The September 2018 "National Cyber Strategy" was released by President Trump with barely...
A Case Analysis SUPREME COURT OF THE UNITED STATES City of Ontario, California, Et. Al. v. QUON Et Al. Certiorari...
Excellent article just appeared (Oct 4, 2018) in Bloomberg Businessweek:Â Â https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies A must-read of the Chinese infiltration into the US...
It's All About the Insider Threat Personnel Security controls may seem cumbersome and involved, especially when talking about unclassified systems....
The Differences between the "Deep" and "Dark" Web Some people have heard of the Dark Web, many others have not....