-
By December 16th, 2016Read More »
An NFL draft-styled cloud selection strategy. First-person accounts from interns and veterans alike. Hybrid IT transformation throughout the Intelligence Community, in cooperation with Amazon Web Services and many other technology partners. In our last post of 2016, check out some of our favorite blog posts from the year that was and find out why we learned to turn apples into IT excellence and turn software capability into mission achievement.
-
By October 24th, 2016Read More »
The Internet-of-Things (IoT) botnet-fueled attack against a major DNS provider last week is a reminder that in a connected world, everyone has enterprise IT. Here's how you defend it and help everyone keep their binge-watching up and going.
-
By October 7th, 2016Category:Read More »
The Nigerian email scam may have long since passed to the meme wing of the IT humor museum, but phishing attacks remain a serious threat to cyber security. Not only have they not gone away, they've gotten better. How? Find out why you need to be mindful of phishing, vishing and many other attack vectors.
-
By August 16th, 2016Read More »
When everything is connected, can anything be secure? How should federal agencies, which require security but depend on the ease of access cloud-based technology provides, act in an era of great promise and great risk?
-
By April 28th, 2016Category:Read More »
Cloud computing and the NFL draft are a lot alike. Lots of hype. Lots of buzzwords. Lots of intricate architecture, whether it's multi-cloud solutions of a certain draft analyst's unique coiffure. But both, if done right, can transform your organization. So at NJVC, we played cloud GM and drafted a seven-round strategy to cloud success. With the first pick, we select ....
-
By February 12th, 2016Category:Read More »
This February 14, we hope to help you fall for cyber security best practices, in the timeless -- and possibly indestructible -- language of Valentine's Day: candy conversation hearts.
-
By December 28th, 2015Read More »
Charitable hearts. Pernicious insiders. A veteran IT professional camped out under a mountain of Red Bull at a three-day hackathon. It was a year for giving, for new techniques, and for innovation in NJVCommentary. In our last post of 2015, check out some of our most popular stories from the year that was and find out why we learned to trust no one in cyber security, and cherish everyone through our work with TAPS.
-
By September 20th, 2015Category:Read More »
Insider threat represent a unique place in the cyber security threat matrix: High likelihood of occurrence coupled with high potential damage. Even more troubling, most organizations are overly optimistic about their ability to combat insider threat. How can you defend against those you trust? Cyber Security Principal Robert J. Michalsky, who recently published a white paper on the subject, answers in a Q&A.
-
By August 17th, 2015Category:Read More »
Who do you trust? For the best cyber security posture, the answer may be "No one." Cyber Security principal Robert J. Michalsky explains how the Zero Trust Model works and why it may significantly alter enterprise cyber defense..
-
By August 13th, 2015Category:Read More »
The ongoing debate over allowing backdoor access to encrypted data for law enforcement agencies often overlooks one very important point: Such access is currently impractical. Why? It's just math.
Pages
