Quantcast
Channel: information security – Telos Corporation
Browsing latest articles
Browse All 30 View Live

Protected: SmartPhones Extend the Perimeter of Your Network and Increase Risk

This content is password protected. To view it please enter your password below: Password: Enter The post Protected: SmartPhones Extend the Perimeter of Your Network and Increase Risk appeared first on...

View Article



Image may be NSFW.
Clik here to view.

Cybersecurity isn’t the same thing as information assurance.

Last March the DoD announced the retirement of DIACAP in favor of an information-assurance approach based on NIST’s risk management framework (RMF). This transition had been anticipated for quite...

View Article

Cyber Rope-A-Dope

A look back in boxing history provides a useful analogy in appraising our fight in the world of cyberspace.  For instance, take the premiere boxing event of the last century, the “Rumble in the...

View Article

How to Protect Your Business from Reverse Engineering & Code Modification

Reverse engineering and code modification present significant security and business risks. They allow for malicious hackers (or competitors) to easily gain access to your proprietary source code,...

View Article

Image may be NSFW.
Clik here to view.

Are there really only “two kinds of enterprises”?

Has every company really been hacked?  Is every company really going to be? A popular meme in the information security industry is, “There are only two types of companies: those that know they’ve been...

View Article

Browsing latest articles
Browse All 30 View Live




Latest Images