By P.Devon Schall Ph.D., RDRP Do you have an RMF dilemma that you could use advice on how to handle? If so, Ask Dr. RMF! BAI’s Dr. RMF is a Ph.D. researcher with a primary research focus of RMF. Dear Doctor RMF, We just received our report from Alex, our independent assessor team lead, and […]
By P. Devon Schall, Ph.D., CISSP, RDRP Over the past year, I have conducted research on the relationship between the receipt of formalized RMF training and perceptions of RMF effectiveness, sustainability, and commitment in RMF practitioners. I am very pleased to announce, I have completed the study and have some interesting results to report. This […]
We’ve had a huge response to our STIG 101 training! New dates have been added. If you are interested, please reach out to us soon! August 24, 2018 Live Remote Online August 31, 2018 Live Remote Online September 28, 2018 Live Remote Online October 19, 2018 Live Remote Online October 26, 2018 Live Remote Online November 14, 2018 Live […]
By P. Devon Schall, CISSP, RDRP During a recent RMF literature search, I came across an interesting article titled “RMF Applied to Modern Vehicles”. The article was published by Charlie McCarthy and Kevin Harnett in 2014 and sponsored by the National Highway Traffic Safety Administration (NHTSA). The overall goal of the research was to collect […]
By Kathryn Daily, CISSP, RDRP In July 2017, SolarWinds conducted an online survey via Market Connections aimed at approximately 200 federal government IT decision makers and influencers in order to determine challenges faced by IT professionals to prevent security threats, quantify sources and types of IT threats, determine elements that aid successful management of risk, […]
By Lon Berman, CISSP of BAI Information Security If you ask most system owners about the desired outcome of their RMF efforts, they will readily tell you “we are expecting the Authorizing Official (AO) to sign an Authorization to Operate (ATO) for our system.” But how much do they really know about what goes into […]
Disclosure: I am one of the world’s biggest fans of, and greatest advocates for, IPv6. In the words of rapper 50 Cent, “I love it like a fat kid loves cake.” Anyone I have ever been able to corner in a room knows this to be true. That being said… I just finished reading [yet […]
I just finished reading Bruce Schneier’s blog entry, titled “The Doxing Trend”. Let me start by writing that I am usually a big fan of Mr. Schneier. I look forward to his newsletter and I have tremendous respect for his technical intelligence. But as I read his doxing article I couldn’t help but wonder what […]
By Kathryn M. Farrish, CISSP One of the more recent information security innovations is the Control Correlation Identifier, or CCI. Each CCI provides a standard identifier and description for “singular, actionable statements” that comprise a security control or security best practice. The purpose of CCIs is to allow a high level statement made in a […]
By Lon J. Berman, CISSP It’s hard to believe it’s been a whole year since the publication of DoD Instruction (DoDI) 8510.01 in March of 2014, which officially began the transition from the DIACAP process and IA Controls to the Risk Management Framework (RMF) and NIST Security Controls. While there are isolated pockets of progress […]
v6 Vertex – A Brief Explanation of IPv6 Address Types
ITdojo’s v6 Vertex is an ever-expanding set of quick tips and useful advice for using IPv6 in your network.
People who have been using IPv4 for some time know that there are three basic address types that are commonly discussed: unicast, broadcast and multicast.
When it comes to address types IPv6 offers us some of what we already know and then takes things a step further. In this article I offer a quick, concise explanation of each IPv6 address type.