Aug 30, 2022
Magicians work by misdirection. The same is true in managing federal in federal information technology.
Let’s say you have done your work with compliance on your Infrastructure as a Service Platform and your Platform as a Service. Malicious actors know this all too well. As a result, they look at the weak spot –...
Aug 26, 2022
They stopped building castles with moats and walls when technology made them useless. Today, our notions of perimeter defense are being negated by technology as well. This time, the network has expanded the number of threat vectors to the point where it is almost impossible to even catalog the endpoints.
Because...
Aug 9, 2022
The federal government is subjected to thousands of cyberattacks a day. When you combine that statistic with the tremendous gap in people that need to be hired for cyber defense, you can see the problem that is developing.
One way is to gain a better understanding of malicious actors move from network to cloud and then...