If Brazilian Jiu-Jitsu (BJJ) teaches you anything, it’s how out-of-shape you are. After every class, I feel like a tub of butter poured on a bed of uncooked cookie dough. It’s supposedly part of the transformation efforts that takes place as you gain the endurance and prerequisite muscle needed to complete classes. After class, I … Continue reading Shrimping Out in Life: Tips for Approaching Brazilian Jiu-Jitsu
The night before my son was released from the hospital, I dropped by and signed-up for a three-day tryout. I was hooked after my first class.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means for adversaries to distract, to disorient, and disrupt. Such threats, combined with others … Continue reading Countering the counter-UAS Shortcomings
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions. The plan also directs the federal government to take new action and pave … Continue reading Cybersecurity In The Obama Era
If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential goals that school systems should commit to over the long, hot summer.
This week in NextGov, TWB author John Breeden II answers some of his fan mail, and the most asked question of the day: What the heck is a quantum computer? This week he attempts to explain the weird, quirky and physics-defying world that makes up this fascinating new science, and shows why it has got the government so worried.
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
If you think that quantum computers are the stuff of science fiction, you might be surprised to learn that there are several powerful ones operating right now, and if they realize their full potential, current government encryption levels might not be enough. NIST is even trying to preemptively develop quantum-resistant encryption. Tune into NextGov for the opening shots of the quantum versus encryption war.
Moving beyond periodic certification of information systems to the Risk Management Framework requires standardizing and automating the assessment process.