
Cybersecurity is Configuration Management
Why Configuration Management? Read the title again. As a very impactful mentor of mine, Rampaul Hollington, once told me: “Cybersecurity starts, is sustained, and ends

Why Configuration Management? Read the title again. As a very impactful mentor of mine, Rampaul Hollington, once told me: “Cybersecurity starts, is sustained, and ends

Proacte vs. Reactive Cybersecurity The Totem approach to cyber defense is based on a philosophy of empowerment instead of fear. We view the threat from

My experience in SANS SEC560: Network Penetration Testing & Ethical Hacking From September 25-30 I attended the SANS Institute SEC560 Network Penetration Testing and Ethical

Why is Separation of Duties difficult to implement for small businesses? During a webinar I gave, in partnership with the Veterans In Business Network, on

What is “Cybersecurity Empowerment ℠” Totem provides “Cybersecurity Empowerment ℠” services to small- to medium-sized businesses, particularly US Defense contractors. This means we help organizations

Many of us in the DoD contracting world have been working over the past year from the DRAFT versions of the NIST 800-171 A, Assessing