Home

Previous Image
Next Image

info heading

info content

Recent Publications
pandadoc
Boosting Document Automation with Cloud and Platform Development - September 26, 2016

Few technologies are more vital to the bottom line of a modern business than document automation. Document automation’s universal application, speed of accessibility and ease of use can make or break a company of any size. It can mean the difference in financial run rates within sales forecasts, and prove vital to a legal department’s … Continue reading Boosting Document Automation with Cloud and Platform Development

DR-logo
Cybersecurity In The Obama Era - September 19, 2016

On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration.  The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions. The plan also directs the federal government to take new action and pave … Continue reading Cybersecurity In The Obama Era

house-divided
The same old story: Security vs. Functionality - September 16, 2016

Despite years of rising concern over cybersecurity risk, the old conflict between operations and security remains the number one challenge for federal agency CISOs. Agencies must do a better job of building risk management into operational decisions.

nw-data-leaks
Network World Review: Data Leak Prevention - September 13, 2016

You may have a missing component in your defenses if you are not protecting your proprietary data. Either by malicious effort or accidental incompetence, users can send customer, financial, secret or sensitive information out of your network via almost unlimited channels. Network World takes a look at three products designed to stop that dangerous flow.

eu-us
A European Wind - September 9, 2016

The new U.S.-E.U. Privacy Shield, new European data privacy rules, Brexit, and globalization are combining to create interesting times for U.S. companies doing business across borders.

yearend
Tenable Blog - September 8, 2016

If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.

toptal-blog-image-1453451371221-ee23fa3dfe00b92e831e2b265767920d
Google Cardboard Overview: VR On The Cheap - September 6, 2016

Imagine if you will, standing on the surface of the moon, overlooking a crater from your lunar rover, listening to mission control chatter. Or don’t. Instead of imagining it, just order a cheap Google Cardboard VR set instead; stick your phone in it, and start exploring the solar system, museums, tourist spots, coral reefs and … Continue reading Google Cardboard Overview: VR On The Cheap

Cyber Securing Schools
Tenable Blog: Cyber Hygiene Education: Cybersecurity Summer Projects - August 30, 2016

This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential goals that school systems should commit to over the long, hot summer.