Find additional Electroblogs using the search box below.
by Dr. Sarbari Gupta
For many years, cybersecurity initiatives focused on protecting the IT systems of organizations and the data they held. User security was an afterthought, if considered at all. In my December 2020…
by Scott Brooks
Test automation is one of those practices that many people have heard of, but few really understand when and why it makes sense to adopt. What is test automation? What tools are available to enable the process? Read on to find out – and to learn about the…
by Uche Nwagwu
What is digital engineering?
Digital engineering is an approach to system design that uses data and models to support lifecycle activities, from the analysis phase through disposition. Commonly referred to as a “digital thread,”…
by Vince Johnson
In 2019, the Department of Defense (DoD) announced efforts to develop a program that moved away from a “self-attestation” model of security. Named Cybersecurity Maturity Model Certification (CMMC), the program sought to provide requirements…
by Annie Sokol
The term “cloud” is short for “cloud computing,” but it has been cleverly promoted as something more personal like our go-to-friend, Alexa, who exists in the cloud. Alexa can answer nearly every question posed, providing the internet is available to transmit…
by Allan Watkins
Today, it is critical to protect the security of personal identity data as well as to ensure secure access to government computers, information systems, and facilities. Thus, new federal employees and contractors typically obtain a Personal Identity…