July 13, 2017
Continuous Monitoring Today—And Tomorrow
This article was written by Lon Berman, CISSP, RDRP of BAI Information Security Step 6 of the Risk Management Framework (RMF) is entitled “Monitor Security …
Read ArticleIT Dojo blog — expert insights on cybersecurity, RMF, DoD compliance, certifications, networking, and federal IT. Updated regularly by our instructors.
July 13, 2017
This article was written by Lon Berman, CISSP, RDRP of BAI Information Security Step 6 of the Risk Management Framework (RMF) is entitled “Monitor Security …
Read ArticleJuly 13, 2017
This article was written by Kathryn M. Daily, CISSP, RDRP of BAI Information Security. In a previous article, security control inheritance from an external …
Read ArticleFebruary 24, 2017
We knew this day was coming. On a long enough timeline, the survival rate for every algorithm drops to zero. Yes, I'm paraphrasing Tyler Durden. It's slightly …
Read ArticleJanuary 24, 2017
My time in the IT world is closer to three decades than two. And anyone else who has been around half as long can testify to the amount of change that has …
Read ArticleJanuary 17, 2017
The pool of knowledge required to earn your CCNA continues to get larger. It has become so large that it is no longer coverable in a 1-week training course.
Read ArticleJanuary 13, 2017
Who benefits the most when you get certified? You? Or is it the vendor?
Read ArticleSeptember 16, 2016
By Kathryn M. Daily, CISSP of BAI Information Security In this issue we will shine the spotlight on the Contingency Planning (CP) family of security controls. …
Read ArticleSeptember 16, 2016
By Lon Berman, CISSP of BAI Information Security Like any complex process, RMF is not without its share of potential pitfalls. Now that we have the benefit of …
Read Article