Find additional Electroblogs using the search box below.
by Seth Berger
Perhaps no concept has been more influential since the invention of computing technology than artificial intelligence (AI). AI has had a significant impact on every industry, as it can automate many tasks that were previously performed by humans.
It…
by Retired Air Force Lt. Gen. William Bender
Federal Chief Information Security Officers (CISOs) operate in an increasingly complex threat landscape. To be effective, they cannot rely on a single cybersecurity approach.
To strengthen cyber resilience, CISOs require…
by Francisco Jauregui
As contractors, we work to meet or exceed our customers’ expectations. We focus on requirements, metrics, schedules, and, of course, budgets. We work hard to always provide exceptional customer service. It’s what I’ve been doing for years as a…
by Cecil Dildine
The principle of least privilege (POLP) is a base concept of the Zero Trust (ZT) security model. It operates on the premise of "never trust, always verify."
Did you know that "trust but verify" is an old Russian proverb that President Ronald Reagan…
by Cecil Dildine
Experts in the Zero Trust field have been on the path toward full implementation for some time. They have experienced both successes and failures – and learned from both. They have transitioned from the form, storm, and norm stage and implemented many of…
by Eric Wesley
In the ever-evolving landscape of government operations, data is the lifeblood driving efficiency, security, and decision-making. Splunk, a leading data analytics platform, is spearheading a revolution in how government agencies manage and leverage data to…