GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools

AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls ...

What is Policy Compliance? Four Tips to Help You Succeed

Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy document, publishing it to staff and then staying hands-on to ensure it ...

The DoD Isn’t Fixing Its Security Problems

It has produced several reports outlining what's wrong and what needs to be fixed. It's not fixing them: GAO looked at three DoD-designed initiatives to see whether the Pentagon is following through ...
The Facebook Like Button Is Not as Innocent as It Seems.

The Facebook Like Button Is Not as Innocent as It Seems.

The ubiquitous Facebook Like button you encounter on almost every website is not as innocent as it appears to be. It has far-reaching privacy effects that are not immediately visible to your ...
Great Seal of the State of Texas House of Representatives

Cough Up The Bandwidth

Great Seal of the State of Texas House of Representatives via Kieren McCarthy, writing at El Reg, reports of a contemplated bill (H.B. 1426) before the State of Texas' House of Representatives ...

5 Common DevOps Transition Mistakes to Avoid

When transitioning to a DevOps model, organizations must remember that people are essential to a successful switchover. It’s people who must learn new workflows, collaboration techniques, and tools during the move. This ...