Find additional Electroblogs using the search box below.
by Peter Martini
Office of Management and Budget Circular A-123 requires that federal agencies conduct risk assessments of their operational…
by Allan Watkins
The National Institute of Standards and Technology (NIST) estimates there are nearly 5 million Personal Identity Verification (PIV) cards in existence today. This credential serves as a form of multifactor authentication for federal employees and contractors to…
by Jeanne Zepp
The Gartner Glossary defines information technology (IT) governance as “the processes that ensure the effective and efficient use of IT in enabling an…
by Sutapa Ghadial
With the passage of time and advancements in technology, phishing attempts that lure unsuspecting victims into disclosing their login credentials are getting more sophisticated and realistic.
In a phishing attack, the perpetrator sends an email or a…
by Jeanne Zepp
July 16th marked the second celebration of Artificial Intelligence (AI) Appreciation Day. Created in 2021, the day recognizes ways in which AI is…
by Kirubeal Mandefro
According to a federal Robotic Process Automation (RPA) Community of Practice publication, RPA is “a low- to no-code Commercial Off the Shelf (COTS) technology that can automate repetitive,…