Accountability
GAO Finds Gaps in DoD Cyberdefenses, Highlights Importance of Breach and Attack Simulation Tools
AttackIQ’s Security Optimization Platform gives an agency a proactive—rather than a reactive—security posture. It enables continuous validation of security controls to definitively establish the effectiveness of key initiatives, to include zero-trust controls ...
What is Policy Compliance? Four Tips to Help You Succeed
Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy document, publishing it to staff and then staying hands-on to ensure it ...
The DoD Isn’t Fixing Its Security Problems
It has produced several reports outlining what's wrong and what needs to be fixed. It's not fixing them: GAO looked at three DoD-designed initiatives to see whether the Pentagon is following through ...
The Facebook Like Button Is Not as Innocent as It Seems.
The ubiquitous Facebook Like button you encounter on almost every website is not as innocent as it appears to be. It has far-reaching privacy effects that are not immediately visible to your ...
Cough Up The Bandwidth
Great Seal of the State of Texas House of Representatives via Kieren McCarthy, writing at El Reg, reports of a contemplated bill (H.B. 1426) before the State of Texas' House of Representatives ...
5 Common DevOps Transition Mistakes to Avoid
When transitioning to a DevOps model, organizations must remember that people are essential to a successful switchover. It’s people who must learn new workflows, collaboration techniques, and tools during the move. This ...