Improving Your Security Operations Dashboard

By Nancy Peaslee

We’ve all seen the headlines: Heightened monitoring of malicious cybersecurity activity in response to global events. Increased ransomware attacks and security breaches. Data leaks of sensitive information.

Your agency’s security operations center has been set up to monitor cybersecurity threats – but is it optimized to predict and prevent cyber vulnerabilities? Is it automated with real-time alerts? Is it synthesizing data so that you can make critical decisions quickly?

May 18th, 2022|

Implement Your Risk Management Framework Cost Effectively

By Nancy Peaslee and Rodney Morris

Looking for cost effective execution of the Risk Management Framework (RMF)? Need to prioritize protection of your most critical systems and assets? Want to reduce complexity and automate monitoring and controls?

A well-thought-out RMF framework will ensure your government agency takes the right steps to align your risk tolerance with the layers of security needed to adequately protect your network systems and data. Government leaders understand the importance of safeguarding classified and privacy data and documenting compliance with cybersecurity and privacy requirements. However, we often see organizations overlooking ways to implement RMF more cost effectively.

September 14th, 2021|

Improve Your Agile Development Process Using DevSecOps

By Rodney Morris

Looking for a shorter time to value and faster iterations to field your new software features and capabilities with an approach that takes security seriously? Adopting the DevSecOps framework into your development process may be your answer.

DevSecOps and agile software development go hand in hand. DevSecOps simply integrates security earlier into your agile software development process – enabling security checks from the very beginning. DevSecOps is how you truly achieve agile development.

July 1st, 2021|

10 Strategies for Implementing AI in Your Organization

By Nancy Peaslee

Artificial intelligence (AI) and machine learning (ML) are essential concepts to understand as part of a growth model for business. As defined by John McCarthy in 1956, AI involves machines that can perform tasks that are characteristic of human intelligence. AI is a much broader concept than machine learning, which is a way of achieving certain types of intelligence. 

April 27th, 2021|

IT Asset Management – A Critical Function

by Nancy Peaslee

A fundamental Cybersecurity premise is to be aware of all assets on the network. An accurate and robust hardware list will allow for better protection of the information technology environment. When we discuss network assets, we are referring to workstations (laptops and desktops), servers (physical and virtual), printers, as well as switches and routers. We may also consider VOIP and mobile phones. By understanding and tracking attributes such as device type, location, rack, rack location, user, hostname, IP address, MAC address, serial number, vendor make and model, acquisition date, warranty information, level of data sensitivity, operating system type and version, and/or firmware version we can identify and locate our assets, which also allows us the ability to utilize the equipment more fully.

February 22nd, 2021|

your next project.

Go to Top