February 18, 2016
The Danger of Transparent Encryption
With all the renewed furor over the government attempting to force Apple to backdoor iOS devices so the FBI can inspect the phone of the San Bernardino …
Read ArticleIT Dojo blog — expert insights on cybersecurity, RMF, DoD compliance, certifications, networking, and federal IT. Updated regularly by our instructors.
February 18, 2016
With all the renewed furor over the government attempting to force Apple to backdoor iOS devices so the FBI can inspect the phone of the San Bernardino …
Read ArticleJanuary 25, 2016
In this post Colin discusses the slow migration to IPv6. Who will pay for the migration versus who will gain the biggest benefit? It's an altruistic problem.
Read ArticleJanuary 24, 2016
When is the last time you sat down at your desk and really went full-geek on something just because you found it fascinating? No, not because you needed to know …
Read ArticleJanuary 19, 2016
In this post Colin explores password entropy and what it means in terms of password strength.
Read ArticleDecember 13, 2015
In this post Colin tackles the self-imposed challenge of figuring out how to generate the Fibonacci Sequence using python (without using Google)
Read ArticleNovember 25, 2015
By Kathryn M. Farrish, CISSP Security Technical Implementation Guides (STIGs) are published periodically by the Defense Information Systems Agency (DISA). STIGs …
Read ArticleNovember 24, 2015
Article by Annette Leonard The Defense Information Systems Agency (DISA) is responsible for developing security guidance for configuring DoD information …
Read ArticleNovember 23, 2015
Article by Kathryn Farrish, CISSP Imagine this dialog between Edward, a System Owner, and Christine, his Information System Security Manager (ISSM): Edward …
Read ArticleNovember 18, 2015
In this post, Colin offers up his favorite CBK domain and explains why.
Read ArticleNovember 16, 2015
I just finished reading Bruce Schneier’s blog entry, titled "The Doxing Trend". Let me start by writing that I am usually a big fan of Mr. Schneier. I look …
Read ArticleNovember 12, 2015
In this post Colin focuses his attention on the CASP and CISSP certifications, weighing the pros and cons of both in order to determine which is the best path.
Read Article