Find additional Electroblogs using the search box below.
by Howard Kaplan
The list of sometimes hard-to-fill high-tech roles is lengthy and includes cloud, systems and telecommunications network engineers; SharePoint developers and administrators; software developers; and, of course, cybersecurity specialists including analysts,…
by Andrew Seymour
Antivirus software is a critical (but sometimes irritating) program. Luckily, it is less annoying than it once was. For the most part, people no longer think about antivirus programs when using their computer — unless, of course, they haven’t registered the…
by Mike Tillman
Certain designations set individuals apart. A Ph.D., a C-level title and a Nobel prize are a few examples. So it is with business organizations, too.
For government contractors, being certified as meeting all the requirements of relevant International…
by Jeanne Zepp
Moving federal agencies to a zero trust model is a complex effort comprising many moving parts. A simple read of Executive Order (EO) 14028 and Office of Management and Budget (OMB) Memorandum 22-09 highlights the vast array of challenges the proposition poses –…