Improving Your Security Operations Dashboard

By Nancy Peaslee

We’ve all seen the headlines: Heightened monitoring of malicious cybersecurity activity in response to global events. Increased ransomware attacks and security breaches. Data leaks of sensitive information.

Your agency’s security operations center has been set up to monitor cybersecurity threats – but is it optimized to predict and prevent cyber vulnerabilities? Is it automated with real-time alerts? Is it synthesizing data so that you can make critical decisions quickly?

Implement Your Risk Management Framework Cost Effectively

By Nancy Peaslee and Rodney Morris

Looking for cost effective execution of the Risk Management Framework (RMF)? Need to prioritize protection of your most critical systems and assets? Want to reduce complexity and automate monitoring and controls?

A well-thought-out RMF framework will ensure your government agency takes the right steps to align your risk tolerance with the layers of security needed to adequately protect your network systems and data. Government leaders understand the importance of safeguarding classified and privacy data and documenting compliance with cybersecurity and privacy requirements. However, we often see organizations overlooking ways to implement RMF more cost effectively.

Improve Your Agile Development Process Using DevSecOps

By Rodney Morris

Looking for a shorter time to value and faster iterations to field your new software features and capabilities with an approach that takes security seriously? Adopting the DevSecOps framework into your development process may be your answer.

DevSecOps and agile software development go hand in hand. DevSecOps simply integrates security earlier into your agile software development process – enabling security checks from the very beginning. DevSecOps is how you truly achieve agile development.

10 Strategies for Implementing AI in Your Organization

By Nancy Peaslee

Artificial intelligence (AI) and machine learning (ML) are essential concepts to understand as part of a growth model for business. As defined by John McCarthy in 1956, AI involves machines that can perform tasks that are characteristic of human intelligence. AI is a much broader concept than machine learning, which is a way of achieving certain types of intelligence. 

IT Asset Management – A Critical Function

by Nancy Peaslee

A fundamental Cybersecurity premise is to be aware of all assets on the network. An accurate and robust hardware list will allow for better protection of the information technology environment. When we discuss network assets, we are referring to workstations (laptops and desktops), servers (physical and virtual), printers, as well as switches and routers. We may also consider VOIP and mobile phones. By understanding and tracking attributes such as device type, location, rack, rack location, user, hostname, IP address, MAC address, serial number, vendor make and model, acquisition date, warranty information, level of data sensitivity, operating system type and version, and/or firmware version we can identify and locate our assets, which also allows us the ability to utilize the equipment more fully.

What is Information Privacy?

by Nancy Peaslee

Information Privacy Defined

Information privacy is “the right to have some control over how your personal information is collected and used,” according to the International Association of Privacy Professionals (IAPP), the largest global information privacy community.


Using Executive Information Systems to Accelerate Data-Driven Decisions

An enterprise information system (EIS) helps create situational awareness and a common operating picture in nearly any complex environment. Whether it’s dealing with a pandemic like COVID-19 or the challenges arriving from it – like increased cyberattacks, it is an effective framework for aiding decision makers in this and other complex, rapidly evolving situations.

Creating a Dashboard App for Health Epidemic Prevention

Much like the COVID-19 pandemic is taxing the healthcare system today, the opioid epidemic has been challenging the healthcare industry for the last decade with more than 130 people overdosing daily due to misuse of these drugs. Although you cannot completely resolve it, there are tools and technologies you can put in place that enable the right people, including the addicted, to monitor and manage it proactively for better outcomes.

Using Predictive Analytics to Combat the Opioid Epidemic

The opioid epidemic is a national crisis affecting individuals’ health, social, and economic welfare, as well as that of families, communities, and the country as a whole. Many addicts were first exposed to the drug for pain management.

What if we could leverage predictive analytics to help guide patients and the healthcare system before, during, and after an opioid prescription? Could it help reverse the crisis? We believe it can.

Go to Top