Sorry, you need to enable JavaScript to visit this website.

BROWSE OUR ELECTROBLOG

Find additional Electroblogs using the search box below.

What is the NIST Information Security and Privacy Advisory Board? March 16, 2023

by Diana Proud-Madruga

Three to four times a year, the 13 security and privacy experts from public and private organizations who comprise the Information Security and Privacy Advisory Board (ISPAB) hold two days of public meetings. Their purpose? Identify emerging information…

read more
Blog
Insights on “Digital Identity Guidelines” Sought March 07, 2023

by Sarbari Gupta

Between 2017 and 2023 the world changed dramatically. Technology altered the digital landscape and cybersecurity concerns heightened.

In keeping with its responsibility for developing information security standards and guidelines, the National Institute…

read more
Blog
Delivering Audit Support Services as a Team February 21, 2023

by Tony Myers-Burton

The Department of Defense (DoD) has been undergoing a major financial audit for approximately the last seven years in response to a congressional mandate that the department be financially compliant. Electrosoft is assisting one DoD component in achieving…

read more
Blog
How is the DoD Using Data to Further the National Defense Strategy? February 15, 2023

by Nicole Sokolowski

The Department of Defense (DoD) Data Strategy, which focuses on transforming DoD into a data-driven organization, supports the National Defense…

read more
Blog
A Look at Ransomware Attacks (Hint! They're Expected to Keep Rising) January 18, 2023

by Eric Wesley

The costs and demand requests associated with ransomware are skyrocketing as the number of attacks rise. Infosecurity Magazine projects that…

read more
Blog
Recruiting High-Tech Employees in a Competitive Market January 03, 2023

by Howard Kaplan

The list of sometimes hard-to-fill high-tech roles is lengthy and includes cloud, systems and telecommunications network engineers; SharePoint developers and administrators; software developers; and, of course, cybersecurity specialists including analysts,…

read more
Blog
Top