Find additional Electroblogs using the search box below.
by Ade Makanjuola
In today’s digital landscape, traditional network security perimeters are insufficient to protect against sophisticated cyber threats. Zero Trust (ZT) security models, which assume no user, device, or system should be trusted whether inside or outside the…
by Sean McGinnis
The National Institute of Standards and Technology (NIST) released the Second Public Draft of Special Publication 800-63, Revision 4 (SP 800-63 Rev 4),…
by Peter Martini
“We failed him,” said our Command Sergeant Major when our organization’s commander was not selected for promotion. In an instant, I moved from empathy to introspection and began a journey of asking, “Am I responsible for my boss’s success, and, if so, how…
by Seth Berger
Perhaps no concept has been more influential since the invention of computing technology than artificial intelligence (AI). AI has had a significant impact on every industry, as it can automate many tasks that were previously performed by humans.
It…
by Retired Air Force Lt. Gen. William Bender
Federal Chief Information Security Officers (CISOs) operate in an increasingly complex threat landscape. To be effective, they cannot rely on a single cybersecurity approach.
To strengthen cyber resilience, CISOs require…
by Francisco Jauregui
As contractors, we work to meet or exceed our customers’ expectations. We focus on requirements, metrics, schedules, and, of course, budgets. We work hard to always provide exceptional customer service. It’s what I’ve been doing for years as a…