Home » 2015 » February

Monthly Archives: February 2015

DoD CIO Clearing Red Tape


For most of our Department of Defense (DoD) clients, the challenge in obtaining an authority to operate (ATO) boils down to money. Pure and simple, cyber security costs are expanding every day…well beyond what most program managers (PMs) have accounted for in budget forecasts. Vulnerabilities can hit in many ways — with the most expensive being an end of life ...

Read More »

A Time Machine for Advanced Persistent Treats


Scan the headlines of just about any business or technology publication, and you’re likely to see something about a data breach or hack. Cyber security is a growing concern, and many companies are finally confronting their risks head-on, with coordinated, cross-departmental initiatives and advanced solutions. In many respects, this surge in activity is a case of industries playing catch-up. Historically, ...

Read More »

Ohio: The Next Government Contracting Hotspot


The smoke-filled room fell silent. “You’re moving where!?”   My colleagues in the government contracting community stared in horror, as if I’d said something dreadful like advocating adherence to standards of ethical contracting or something. “Ohio!?” Oh, yes. It does seem at little odd, at first. Why would the Director of Federal Sales for one of the nation’s fastest-growing cyber security ...

Read More »

Cloud Service Providers: Don’t let Your Response become Your Incident

incident response plan

More often than cloud service providers (CSPs) would like to admit, they find themselves creating a new incident with their incident response. The person in charge doesn’t have the proper authority. The incident handling process has insurmountable gaps or overlaps. The organization’s tools are outdated. Or its staff is stretched too thin or not trained properly. These issues lead to ...

Read More »