What Ryan Lochte Can Teach Us About Selling Cybersecurity Tools
Do cybersecurity vendors consider user experience? We need to start designing solutions based on both network protection AND network performance.
The DoD CIO Terry Halvorsen made a bold call for the replacement of the CAC within the next two years. If there is no more CAC how can the DoD maintain its PKI?
Every day there are new headlines about stolen passwords. Multi-Factor Authentication is the only true prevention but how do we MFA-enable applications and devices that are not MFA-capable today.
I recently returned from the AFCEA Defensive Cyber Operations Symposium where one of the main topics was Assured Identity, particularly as it pertains to Mobility. The DoD’s Public Key Infrastructure (PKI) is well established as is the use of two-factor authentication via a Common Access Card (CAC). However, with the proliferation of mobile devices, CAC […]
TELEGRID was pleased to host a Town Hall meeting by the Chairman of the House Appropriations Defense Subcommittee Rodney P. Frelinghuysen at TELEGRID’s Florham Park offices on April 6th.
Recent advancements in quantum computers have the potential to break modern cryptography.
Authentication is the next battleground of cyberwarfare but as opposed to encryption this one will include managing the Human Element.
There is an interesting story in the Bible about Moses and his father-in-law Yitro. Yitro visits Moses and sees him sitting in his tent day and night as thousands of people ask for his advice. Yitro advises his son-in-law to set up a court system where he would delegate the easy problems to lower level […]
What can Cam Newton teach us about embedded software cybersecurity? His answer to a reporter’s question following Carolina’s win over the Arizona Cardinals tells us everything we need to know.