Looking Ahead to 2014: Preview and Predictions
What are the most important cybersecurity or IT challenges facing civilian and intel agencies, the DoD, and commercial enterprises going into 2014? The Internet of Things (IoT) will have a profound...
View ArticleTelos Investing in Cybersecurity, Virginia, and Nation’s Future
Investing in Telos, Virginia, and our Nation’s Future In the first economic development announcement of his administration, Virginia Governor Terry McAuliffe announced that Telos Corporation will...
View ArticleCybersecurity is like a snowstorm, or not.
When the forecast for a snowstorm — or a cyber event — ranges between nothing and a disaster, it isn’t really a forecast at all. It is a bad guess. This has been an interesting winter. There have...
View ArticleCybersecurity: Cutting the Gordian Knot
Cyberspace is fast becoming a Gordian Knot, an ongoing problem that makes it difficult or impossible to protect. Whether fighting in the air, sea, land, or space domains, American power has...
View ArticleCyber Sirens: Enchanting But Deadly
We must always be on our guard when it comes to Internet security. According to Greek mythology, the Sirens were enchanting, captivating, and seductive – known as the Muses of the lower world....
View ArticleKick Off the Summer with Three Cybersecurity, Innovation, and Emerging...
Kick Off the Summer with Three Cybersecurity, Innovation, and Emerging Technology Events The first week of summer is upon us, and while many are hitting the beach or the golf course, we are busy...
View ArticleCybersecurity isn’t the same thing as information assurance.
Cybersecurity isn’t the same thing as information assurance. Last March the DoD announced the retirement of DIACAP in favor of an information-assurance approach based on NIST’s risk management...
View ArticleComing Up: A New and Exciting Alamo AFCEA Gathering
Coming Up: A New and Exciting Alamo AFCEA Gathering We’ll see you next week, October 27-30, at the Telos Booth – #30/31 The Alamo AFCEA chapter is dedicated to the ethical sharing of ideas and...
View ArticleEffective cyber defense is more about mindset than budget
“Today’s cybersecurity environment is like playing 1,000 simultaneous chess matches against different opponents of varying skill levels.” I was recently asked whether small to medium-sized...
View ArticleCyber Security … More than Just a Bad Hair Cut
“A complacent satisfaction with present knowledge is the chief bar to the pursuit of knowledge.” B.H. Liddell Hart Have you ever made a decision that you later regretted? That Mohawk haircut that was...
View ArticleStatement on the Cybersecurity Executive Order
Earlier today, President Trump signed the long awaited “Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.” Even the most rigorous...
View ArticleAddressing the Cyber Workforce Shortage and Supporting FIRST Tech Challenge
One solution to the cyber workforce shortage that I stress often is starting STEM education earlier, as it generates interest, introduces students to a career opportunity they may not have known...
View ArticleEstablish a Cyber Risk Management Program with Cybersecurity Stepping Stones
Want to establish a cyber risk management program, but don’t know where to start? Here are 18 security controls most organizations should consider implementing right now. The post Establish a Cyber...
View ArticleDigital Disguises for Cyber Operations
There are various types of cyber operations that need to disguise the identities of their personnel and avoid detection to protect networks and information: red teams, penetration testers, security...
View ArticleEnsuring Privacy and Security in the Wake of the Iranian Cyber Threat
DHS' practical advice contains good housekeeping measures for normal organizational operation over the internet. However, we can no longer afford to pursue our organizational missions as if these are...
View ArticleReevaluating Your Security Posture in Today’s Cyber Landscape
With recent events triggering a nationwide alert to the Iranian cyber threat, organizations and individuals are feeling the pressure to increase their cybersecurity. The post Reevaluating Your Security...
View Article“Now You See Me, Now You Don’t”: A Boxer’s Strategy for Cybersecurity
Muhammad Ali provides us insight into how we can go the distance in combatting cyber threats. The post “Now You See Me, Now You Don’t”: A Boxer’s Strategy for Cybersecurity appeared first on TelosVision.
View ArticleA Hitchhiker’s Guide to the Lawless Internet
What you can do to protect your information when it leaves the enterprise network. The post A Hitchhiker’s Guide to the Lawless Internet appeared first on TelosVision.
View ArticleWeakness Invites Attack: Cybersecurity Vigilance in the Time of Coronavirus
It’s a difficult job to be a cybersecurity professional, especially if you’ve been one for a while. It skews your sensibilities, and at least for me, has turned me into a fairly risk-averse person....
View ArticleNew GAO Report Questions Adoption and Effectiveness of NIST CSF across...
A recent GAO report indicates there is not enough information about the level or effectiveness of NIST Cybersecurity Framework (CSF) adoption across the 16 critical infrastructure sectors. The post New...
View Article
More Pages to Explore .....