Pages

Categories

Search

 

Posts Tagged: Strategy

An unavoidable fact of life is that data breaches can and will occur. The jury is still out on when and to what extent we will be able to reverse this situation. However, in the meantime, to avoid appearing on the “wall of shame” of major breaches that expose confidential information, you had be...

By John Scott For Want of a Patch For want of a patch the component was lost. For want of a component the stack was lost. For want of a stack the system was lost. For want of a system the message was lost. For want of a message the cyberbattle was lost. For want of a battle […]...

The United States and Japan just released their Interim Report on the Revision of the Guidelines for U.S. – Japan Defense Cooperation. (Available here: http://www.defense.gov/pubs/20141003_INTERIM_REPORT.pdf) Anyone who works U.S.-Japan interoperability issues (from policy to technology) will be i...

Benjamin Franklin once said, “If you fail to plan, you plan to fail.” This quote summarizes the importance of online encryption policy and hands-on implementation within an organization. Though you may have the best IT department in the world and advanced computing resources, if there are no wri...

Last week, DoD’s CYBER leaders met in Baltimore for AFCEA International’s newest event: Cyber Symposium. It was a very good mix of senior DoD and Industry. It’s great to see the government folks getting out again. The Cyber Symposium replaced the old Joint Warfighter Conference that has been h...