The night before my son was released from the hospital, I dropped by and signed-up for a three-day tryout. I was hooked after my first class.
Upon winning a government contract, many corporate executives breathe a sigh of relief. But these sighs may now be replaced by moans of frustration upon realizing what it takes to remain compliant with federal cybersecurity standards. The National Industrial Security Policy Operating Manual (NISPOM) is a perfect example of tightening cybersecurity requirements for federal contractors, … Continue reading Time Crunch: Federal Contractors Scramble to Clear NISPOM Change 2
Microsoft has a long tradition of spicing up relatively dull product announcements with compelling tech demos, and the Windows 10 announcement was no exception. The software giant used the opportunity to create a fair amount of buzz about the HoloLens, a futuristic headset that offers a glimpse into the future of Augmented Reality (AR). However, … Continue reading Microsoft HoloLens Review – Bridging The Gap Between AR And VR
Few technologies are more vital to the bottom line of a modern business than document automation. Document automation’s universal application, speed of accessibility and ease of use can make or break a company of any size. It can mean the difference in financial run rates within sales forecasts, and prove vital to a legal department’s … Continue reading Boosting Document Automation with Cloud and Platform Development
Imagine if you will, standing on the surface of the moon, overlooking a crater from your lunar rover, listening to mission control chatter. Or don’t. Instead of imagining it, just order a cheap Google Cardboard VR set instead; stick your phone in it, and start exploring the solar system, museums, tourist spots, coral reefs and … Continue reading Google Cardboard Overview: VR On The Cheap
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential goals that school systems should commit to over the long, hot summer.
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
Summer is the best time for infosec professionals in institutions of higher education to focus on cybersecurity projects: baselining and inventorying, planning regular scans, and implementing new procedures.
It’s natural to assume the most direct impact of a cyberattack within the financial payment system is the stolen data or funds. In reality, the true impact extends to the loss of consumer confidence and the subsequent increase of transactional costs. Most bankers subscribe to the notion that the payment system is the heart and … Continue reading Tenable Blog: Payment Paradox – The True Cost of Payment Data Breaches
The Tech Writers Bureau reaches out with a new Young Adult fantasy novel designed to support STEM education for young people. The novel is currently being considered for publication by the Amazon Kindle Scout program, and everyone who backs it now will receive a free copy once the book publishes.