Latest Blog Entries

Four Cybersecurity Policies Transforming Government
May 8, 2018
By Seli Agbolosu-Amison

Federal agencies must develop strategies to anticipate risks and implement defensive measures to minimize cyber risks. The government now has the authority and flexibility to do that.

Are Defense Networks Up to the Near-Peer Challenge?
May 31, 2018
By Paul Parker

 Technology is cheaper, faster and more widely available to enterprising bad actors.

Savings, Security Need Not Be Mutually Exclusive
November 9, 2017
By Tom Jenkins

Many U.S. Defense Department networks are built on outdated legacy architecture never designed to address continually evolving threat vectors. 

Walking the Perimeter of the Home Station Tech Refresh
November 6, 2017
By Maj. Aleyzer Mora, USA

The Home Station Mission Command Center technology refresh is part of the Army’s Installation Information Infrastructure Modernization Program. 

Five Fundamental Strategies for Cybersecurity
November 6, 2017
By Joe Kim

Legacy technology is not equipped to adequately prevent attacks that are now becoming alarmingly commonplace. 

Additional Entries ...