Experts as a Servicehttp://220.127.116.11/~twb/wp-content/uploads/2015/08/columns_01.jpg
Every member of the Tech Writers Bureau has at least 15 years of experience consulting, writing about and studying technology in over a dozen industries: Cybersecurity and Info Sec, Federal, State and Local Agencies, Banking and Finance, Energy Sector and Oil and Gas, Telecommunications and High-Tech. With TWB, you always get the best expert for the job.
Content Creation Leadershttp://18.104.22.168/~twb/wp-content/uploads/2015/08/Content_01.jpg
While all of our members are skilled writers and technical subject matter experts, many also bring a variety of skills to the table that can help get your message out. From helping to spearhead social media campaigns with activities like ghost blogging, to providing content matter experts at speaking events or moderating panels - no project is too large.
You may have seen our work in The Washington Post, Government Computer News, or various other national and global publications. Bureau members have all worked as journalists and published business executives. We understand the pressures of working under tight deadlines whether as part of your marketing group, public relations team or leading your writing team.
Tenable Blog - August 24, 2016
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
NextGov: How long can government encryption hold against quantum computers? - August 16, 2016
If you think that quantum computers are the stuff of science fiction, you might be surprised to learn that there are several powerful ones operating right now, and if they realize their full potential, current government encryption levels might not be enough. NIST is even trying to preemptively develop quantum-resistant encryption. Tune into NextGov for the opening shots of the quantum versus encryption war.
The final push to the HTTPS-only standard for federal websites - August 12, 2016
With less than six months to the deadline for agencies to implement HTTPS on all public-facing websites, nearly half of .gov sites remain unprotected. Deploying the secure protocol should be one of the easier security mandates for agencies to meet.
Tenable Blog - August 11, 2016
Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.
SMS is safe for now - August 4, 2016
A suggested phase-out by NIST of SMS for sending one-time passwords has been widely misinterpreted as a threat to two-factor authentication. No need to worry—2FA is not going away and you can still use your mobile phone as a token.
Not if you have a good apps policy in place - July 22, 2016
Commentators are warning of the dangers of the wildly popular game when used on mobile devices for business. But instead of worrying about Pokémon Go, you should have an enforceable policy in place for all apps.
Tenable Blog - July 19, 2016
Summer is the best time for infosec professionals in institutions of higher education to focus on cybersecurity projects: baselining and inventorying, planning regular scans, and implementing new procedures.
Audio-hacking your smart phone - July 8, 2016
Researchers have demonstrated a way to hide voice commands to smart phones so that humans cannot understand them. Who’s talking to your phone?