All Things IPv6

  • CISSP Question 20
  • Cissp Question 19
  • CISSP Question of the Day #15
  • Ask Dr. RMF

    Ask Dr. RMF

    By P.Devon Schall Ph.D., RDRP Do you have an RMF dilemma that you could use advice on how to handle? If so, Ask Dr. RMF! BAI’s Dr. RMF is a Ph.D. researcher with a primary research focus of RMF. Dear Doctor RMF, We just received our report from Alex, our independent assessor team lead, and […]

  • RMF Training Resources

    A Quantitative Study on the Receipt of Formalized RMF Training and Perceptions of RMF Effectiveness, Sustainability, and Commitment in RMF Practitioners.

    By P. Devon Schall, Ph.D., CISSP, RDRP Over the past year, I have conducted research on the relationship between the receipt of formalized RMF training and perceptions of RMF effectiveness, sustainability, and commitment in RMF practitioners. I am very pleased to announce, I have completed the study and have some interesting results to report. This […]

  • STIG Course

    STIG 101 Training Dates ADDED!

    We’ve had a huge response to our STIG 101 training!  New dates have been added.  If you are interested, please reach out to us soon! August 24, 2018  Live Remote Online August 31, 2018  Live Remote Online September 28, 2018  Live Remote Online October 19, 2018  Live Remote Online October 26, 2018  Live Remote Online November 14, 2018  Live […]

  • RMF applied to Modern Vehicles Article

    RMF Applied to Modern Vehicles

    By P. Devon Schall, CISSP, RDRP During a recent RMF literature search, I came across an interesting article titled “RMF Applied to Modern Vehicles”. The article was published by Charlie McCarthy and Kevin Harnett in 2014 and sponsored by the National Highway Traffic Safety Administration (NHTSA). The overall goal of the research was to collect […]

  • Is RMF Effective?

    RMF: Is It Effective?

    By Kathryn Daily, CISSP, RDRP In July 2017, SolarWinds conducted an online survey via Market Connections aimed at approximately 200 federal government IT decision makers and influencers in order to determine challenges faced by IT professionals to prevent security threats, quantify sources and types of IT threats, determine elements that aid successful management of risk, […]

  • Risk Management Framework Training

    Understanding the Authorization Decision

    By Lon Berman, CISSP of BAI Information Security If you ask most system owners about the desired outcome of their RMF efforts, they will readily tell you “we are expecting the Authorizing Official (AO) to sign an Authorization to Operate (ATO) for our system.” But how much do they really know about what goes into […]

  • The Altruism of IPv6

    The Altruism of IPv6

    Disclosure:  I am one of the world’s biggest fans of, and greatest advocates for, IPv6.  In the words of rapper 50 Cent, “I love it like a fat kid loves cake.”  Anyone I have ever been able to corner in a room knows this to be true.  That being said… I just finished reading [yet […]

  • Brennan, AOL and Bruce Schneier Driving Hard Left

    John Brennan, AOL, and Bruce Schneier Driving Hard Left

    I just finished reading Bruce Schneier’s blog entry, titled “The Doxing Trend”. Let me start by writing that I am usually a big fan of Mr. Schneier. I look forward to his newsletter and I have tremendous respect for his technical intelligence. But as I read his doxing article I couldn’t help but wonder what […]