Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

How to Improve Risk Assessments? Start by Untangling Cause, Risk and Impact October 26, 2022

by Peter Martini

Office of Management and Budget Circular A-123 requires that federal agencies conduct risk assessments of their operational…

read more
Blog
The PIV Card: One Key to Keeping Our World Safe From Malicious Attacks September 28, 2022

by Allan Watkins

The National Institute of Standards and Technology (NIST) estimates there are nearly 5 million Personal Identity Verification (PIV) cards in existence today. This credential serves as a form of multifactor authentication for federal employees and contractors to…

read more
Blog
Recognizing the Human Factor in IT Governance September 20, 2022

by Jeanne Zepp

The Gartner Glossary defines information technology (IT) governance as “the processes that ensure the effective and efficient use of IT in enabling an…

read more
Blog
Why Use Multi-Factor Authentication to Foil Phishing Attacks August 18, 2022

by Sutapa Ghadial

With the passage of time and advancements in technology, phishing attempts that lure unsuspecting victims into disclosing their login credentials are getting more sophisticated and realistic.

In a phishing attack, the perpetrator sends an email or a…

read more
Blog
Appreciating Artificial Intelligence August 03, 2022

by Jeanne Zepp

July 16th marked the second celebration of Artificial Intelligence (AI) Appreciation Day. Created in 2021, the day recognizes ways in which AI is…

read more
Blog
Why Are Federal Agencies Adopting RPA Now? What Are the Benefits? July 27, 2022

by Kirubeal Mandefro

According to a federal Robotic Process Automation (RPA) Community of Practice publication, RPA is “a low- to no-code Commercial Off the Shelf (COTS) technology that can automate repetitive,…

read more
Blog
Top