So, you’re now a Security Control Assessor (SCA)
Elements of Good Audit Practices There are several activities that will help the security auditor prepare for a formal assessment. ...
Elements of Good Audit Practices There are several activities that will help the security auditor prepare for a formal assessment. ...
What is NIST SP 800-171? In 2014, DOD adopted the overall National Institute of Standards and Technology (NIST )Risk Management...
A Quick-Start Guide Use the Cyber Incident Life Cycle to guide the company’s operational incident-handling artifact/procedure. This should be an...
2 WEEKS LEFT The F-35 joint program office issued a one-year Authority to Operate (ATO) in March 5, 2018 for...
The PPT "Triangle" is at the root of this issue Origins The People-Process-Technology (PPT) Triangle has a less than defined...
Lessons Learned about ongoing hacking challenges in the real estate market I recently moved across the country. Being a good...
...and 6 months (or less) contracts to boot Is anyone else tired of getting these positions? I keep getting them,...
Was it really worth it? The Intelligence Community (IC) recently released its Cyber Threat Framework (CTF). They have been working...
With all the new network breaches to both the public and private sector, who is the NUMBER 1 culprit? For...
How the Chinese are beating us in the long game The games we play as children tell us many things....
Because we are not really trying So why is secure system development so hard? Too many of the major defense...