Making the Case: Insider Threat Program Development & Implementation; Part I: Overview

  |  February 22, 2017

For years, organizations have focused on building impregnable network perimeters to keep outsiders out. The rise of virtual technology, outsourcing, and globalization[1] have all seriously undermined this perimeter and exposed our vulnerability to Insider Threats. An Insider Threat is a current or former employee, contractor, or other business partner who 1) has or had authorized... Read More

Open Source Solutions and Other Strategies for Successful Interface Aggregation

  |  January 25, 2017

Many federal agencies rely on a diverse set of data sources to accomplish their mission. This spotlights data sharing initiatives as critical to government effectiveness. A key challenge in their execution is the heterogeneity of platforms, protocols, languages, and message exchange patterns used across information sources, making for a complex environment and a potential obstacle... Read More

Information Assurance Best Practices for In-Flight and At-Rest Data

  |  January 4, 2017

It should not surprise anyone that the days of lax IT security practices are over. Information assurance has evolved out of the governance realm and into the world of implementation.  Almost every development work stream in a modern transformation project includes planning, building, and validating solutions to ensure the protection of critical and sensitive data,... Read More