Continuous Monitoring

June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
December 15, 2016
A+: AMI’s, Automation & AWS

A few weeks ago, I attended AWS re:Invent 2016 with nine of my colleagues. If you have never been, re:Invent is...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
October 5, 2015
The AWS Shared Responsibility Model: Part 1 – Security in the Cloud

Cloud Service Providers (CSP) offer a range of infrastructure, platforms, and software for customers to consume. Whether you are looking...

Read More
June 23, 2015
Choosing a 3PAO: FedRAMP, Cybersecurity & Cloud Expertise are Vital

As a direct result of the Cloud First policy, the Federal Government is spending more time, money, and effort on...

Read More
March 26, 2015
Secure Configuration Management through Automation

Overview Automation is a beautiful thing. It can reduce the overall workload for performing a task by allowing us to...

Read More
July 1, 2011
Implementing Security Monitoring in Small and Mid-sized Organizations

I recently had the pleasure of leading a project implementing a security monitoring solution in a small organization. Based on...

Read More
October 11, 2010
Current State of FISMA Part 3: What Is the Target?

So, I’ve rambled a bit in the past several weeks on the current state of FISMA.  You’d think that somewhere...

Read More