IT Blog

  • pyrit-nvidia-osx-cuda

    Installing pyrit with GPU Support on OS X

    Overview In the 802.11 WLAN security world I frequently refer to pyrit as the ‘unsung hero’.  Pyrit is an awesome tool that can do so much but doesn’t tend to get the recognition as more well-known tools like the aircrack-ng suite and coWPAtty.  Comparing these different tools can’t really be done in an apples-to-apples fashion but […]

  • Spotlight: Information Security Continuous Monitoring

    No longer just a technical issue, instead a strategic program to manage cybersecurity risk. Targeted cyber attacks are a strategic organizational problem. Cyber attackers are more sophisticated than ever before, and it has become vitally important to understand how to manage risk and implement a continuous monitoring program.  More than just a technical exercise, Continuous […]

  • CISSP Training Coming Up In Virginia Beach!

    Just a quick announcement about our CISSP training course that is coming up at our facility in Virginia Beach the week of January 12 – 16, 2015.  This will be a small class (limited to 10 individuals) taught by our resident instructor, Colin Weaver, a CISSP of over 14 years.  Colin has a unique way […]

  • WireShark Training in Virginia Beach!

    Due to increased interest, IT Dojo has partnered up to bring authorized WireShark training to the Hampton Roads area. Learn to use Wireshark to troubleshoot TCP/IP networks while preparing for the Wireshark Certified Network Analyst exam. In this hands-on course, you will receive in-depth training on Wireshark® and TCP/IP communications analysis. You will learn to […]

  • net-neutrality

    Nothing Neutral About Net Neutrality

    The volume of discussion and debate surrounding so-called ‘net neutrality’ in recent days has increased dramatically.  And, as usual, it is a polarizing topic.  The President has weighed in on the issue, urging the FCC to explicitly deny service providers the right to rate-limit the Internet’s content.  His ‘request’ has been met with a venomous […]

  • secontrol

    Security Control Spotlight—By the Numbers

    By Lon J. Berman, CISSP of BAI, Inc. In this issue’s “Spotlight”, we’re not going to focus on any specific controls or families, but rather on a comparison of RMF controls and DIACAP controls. The majority of DoD information systems are currently categorized under DIACAP as “MAC II Sensitive” or “MAC III Sensitive”. These categorizations […]

  • top10rmf

    Top Ten—Sources of RMF Policy and Guidance

    By Annette Leonard of BAI, Inc. RMF-related policies and guidance come from a plethora of sources within the seemingly-convoluted federal landscape. We believe a good understanding of these sources will be helpful as you move forward in your RMF implementation. Here, then is our “Top Ten” list of RMF policy and guidance providers. 10. US […]

  • update

    Significant Update to NIST SP 800-53A

    By Kathryn M. Farrish, CISSP of BAI, Inc. At long last, NIST has finally released a draft copy of the updated version of SP 800-53A, entitled Assessing Security and Privacy Controls in Federal Information Systems and Organizations. This is an important document in the RMF “document library” because it contains the “how to” for assessing […]

  • coursedates

    RMF Training Course Dates Added

    Due to a recent surge in demand for Risk Management Framework (RMF) for DoD IT training, we have added several more classes to our calendar.  If you are not seeing a date that works for you and you have a group of people that need the training, let us know.  We can bring the training […]

  • timeline

    RMF Transition—What is the Real Timeline?

    By Lon Berman of BAI, Inc. Now that RMF is official DoD policy, every DoD system owner needs to begin planning their “transition” from DIACAP. In order to plan and execute the transition, system owners need the answers to three basic questions: What does the transition process entail? When do I need to begin the […]

  • transition

    Spotlight: Transitioning to the Risk Management Framework (RMF)

    With the publication of revised DoD Instruction 8510.01, adoption of the Risk Management Framework (RMF) by DoD has begun.  DoD programs are busy planning and implementing strategies for transitioning from DIACAP to “RMF for DoD IT”. What Efforts are Taking Place in Support of the RMF Transition? Tier 1: DoD Enterprise RMF Knowledge Service – […]

  • vspherecomparison

    VMware vSphere 5.X Training Comparison

    The information below was copied and pasted from VMware’s site. VMware vSphere: Install, Configure, Manage [V5.X] vs. VMware vSphere: Fast Track [V5.X] Which course is right for me? When choosing which VMware vSphere® 5.X training course is right for you, consider your learning objectives, level of familiarity with VMware technologies, the vSphere features you are […]