Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

Check The Scope July 28, 2020

by Steve Brady

Two Iowa men learned the hard way how important it is to always agree on a clear scope when conducting a…

read more
Blog
Provenance, Lineage, Pedigree: Are they the Same? April 13, 2020

by Diana Proud-Madruga

Healthcare information can come from many sources: multiple EHRs, patient provided, wearable medical devices, and any number of…

read more
Blog
Cloud Security Assessments - Identifying the Peskiest Risks! February 10, 2020

by Sarbari Gupta

Modern software applications and IT infrastructures are complex. Most are constructed using building blocks, components and layers that other vendors and service providers contribute. Thus, when conducting an assessment to determine whether the system…

read more
Blog
A Potential Replacement for Web-Based Passwords January 30, 2020

by Clay Calvert

How often do we hear in the news about yet another site being hacked and thousands, even millions, of passwords being compromised? A quick visit to https://haveibeenpwned.com shows over 8.5 billion compromised accounts in…

read more
Blog
No More Chewy Centers: The Zero Trust Model of Information Security January 13, 2020

by Diana Proud-Madruga

This blog is based on the 2010 Forrester report of the same name.

The old, perimeter-based approach to network security “hard on the outside and…

read more
Blog
Our Future is in the Clouds January 06, 2020

by Jay Larvick

Starting out in the computer science field many years ago, we used a central mainframe computer with computer terminals connected to it. That way, everyone could use the amazing power of the mainframe and share applications, utilities and…

read more
Blog
Top