Top 6 Reasons the Government is ready for DevSecOps
The U.S. federal government continues to modernize legacy applications and embrace a high-level approach to drive cloud adoption into...
New Contractor Cyber Security Requirements. A Summary of CMMC Version 1.0.
The first version of the long anticipated Cyber Security Maturity Model Certification (CMMC) was released on January 31, 2020. There were...
How DoD Contractors can Prepare for Cybersecurity Maturity Model Certification (CMMC)
The Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) recently released information regarding plans to reform and...
Developers Corner Episode 2: The Adventure Begins
The company I work full time for recently did their annual reviews, which means we had to set our sights on a new horizon of goals. This...
Using GitHub to keep your code impenetrable.
If you work in the programming field you are no stranger to version control systems and how crucial they are to successful projects. Git...
Developers Corner 1: Impostor Syndrome.
Before I get into the nitty-gritty of the blog post, I want to explain my intention behind this series. My plan here is to use this to...
Is Gmail HIPAA Compliant?
More and more health care providers are taking advantage of moving their email to the cloud for cost savings or better availability. ...
Meltdown, Spectre, and Jann Horn?
This past month the cyber security community has been buzzing about a major exploit just discovered in most processors. You might have...
Net Neutrality and You!
Net neutrality - the principle that internet service providers must treat all data on the internet the same, and not discriminate or...
Technology + Christmas Shopping: Debugging the Bah-Humbug:
George Bailey would've choked on his eggnog if he could see how we do Christmas shopping these days. My family and I went to a local,...