Find additional Electroblogs using the search box below.
by Jeanne Zepp
Moving federal agencies to a zero trust model is a complex effort comprising many moving parts. A simple read of Executive Order (EO) 14028 and Office of Management and Budget (OMB) Memorandum 22-09 highlights the vast array of challenges the proposition poses –…
by Peter Martini
Office of Management and Budget Circular A-123 requires that federal agencies conduct risk assessments of their operational…
by Allan Watkins
The National Institute of Standards and Technology (NIST) estimates there are nearly 5 million Personal Identity Verification (PIV) cards in existence today. This credential serves as a form of multifactor authentication for federal employees and contractors to…
by Jeanne Zepp
The Gartner Glossary defines information technology (IT) governance as “the processes that ensure the effective and efficient use of IT in enabling an…
by Sutapa Ghadial
With the passage of time and advancements in technology, phishing attempts that lure unsuspecting victims into disclosing their login credentials are getting more sophisticated and realistic.
In a phishing attack, the perpetrator sends an email or a…