There’s an absence of cybersecurity solutions with Common Criteria certification for network access control (NAC) tools.
Shrimping Out of Life is a blog by Carlos A. Soto as he attempts to survive Brazilian Jiu-Jitsu while attending the Lepri BJJ premiere Brazilian Jiu-Jitsu training center in the Charlotte metro area- a member of one of the most dominant teams…
If Brazilian Jiu-Jitsu (BJJ) teaches you anything, it’s how out-of-shape you are. After every class, I feel like a tub of butter poured on a bed of uncooked cookie dough. It’s supposedly part of the transformation efforts that takes place as you…
The night before my son was released from the hospital, I dropped by and signed-up for a three-day tryout. I was hooked after my first class.
Unmanned aerial systems remain largely in their infancy, and yet they already threaten defense and intelligence operations: advanced surveillance capabilities of these systems enable adversaries to collect data and information to shape military tactics, and swarming techniques increasingly serve as a means…
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions.
The…
If you are making decisions on how to spend the last of your FY 2016 IT budget, there are low-cost, high-impact products and services available that can improve your security status and make your life easier in the coming year.
This week the Tenable blog is focused on higher education, and why summer break is a good time for schools to focus on cybersecurity projects for the coming year. Threat hunting, vulnerability management and the core value of continuous visibility are essential…
This week in NextGov, TWB author John Breeden II answers some of his fan mail, and the most asked question of the day: What the heck is a quantum computer? This week he attempts to explain the weird, quirky and physics-defying world…
Organizations must secure their SCADA networks while enabling access to those who need it. Here are some tips for meeting security requirements for your critical infrastructure.
