Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

A User-Centric Zero Trust Architecture is One Step Closer October 14, 2024

by Dr. Sarbari Gupta

For many years, cybersecurity initiatives focused on protecting the IT systems of organizations and the data they held. User security was an afterthought, if considered at all. In my December 2020…

read more
Blog
Test Automation: Reducing Time, Effort, and Cost September 19, 2024

by Scott Brooks

Test automation is one of those practices that many people have heard of, but few really understand when and why it makes sense to adopt. What is test automation? What tools are available to enable the process? Read on to find out – and to learn about the…

read more
Blog
Digital Engineering: A Growing Strategy for Innovation August 22, 2024

by Uche Nwagwu

What is digital engineering?

Digital engineering is an approach to system design that uses data and models to support lifecycle activities, from the analysis phase through disposition. Commonly referred to as a “digital thread,”…

read more
Blog
CMMC 2.0 on the Horizon: Proposed Rule Published July 17, 2024

by Vince Johnson

In 2019, the Department of Defense (DoD) announced efforts to develop a program that moved away from a “self-attestation” model of security. Named Cybersecurity Maturity Model Certification (CMMC), the program sought to provide requirements…

read more
Blog
Can You Trust the Cloud? June 03, 2024

by Annie Sokol

The term “cloud” is short for “cloud computing,” but it has been cleverly promoted as something more personal like our go-to-friend, Alexa, who exists in the cloud. Alexa can answer nearly every question posed, providing the internet is available to transmit…

read more
Blog
How Does USAccess Manage PIV Cards for Government Employees and Contractors? April 22, 2024

by Allan Watkins

Today, it is critical to protect the security of personal identity data as well as to ensure secure access to government computers, information systems, and facilities. Thus, new federal employees and contractors typically obtain a Personal Identity…

read more
Blog
Top