Shifting emphasis from the user to a job to be done
Read More
No matter which compliance framework your organization follows (e.g., NIST, ISO SOC, HIPPA, PCI DSS, HITRUST CSF, COBIT), cybersecurity compliance seems more like a child learning to clean their room
Read More
Inspire Conversations About Application Features and Functionality
Read More
Treat technology as the enabler, not a dictator of process
Read More
Process is the crucial DevSecOps enabler Please don’t say the word “process” too loud..
Read More
Part 1: The Application and Workload Pillar If you work in the IT space, you’ve undoubtedly seen the federal government modernizing..
Read More
VMD Corp, Solution Architect/Agile Practice Lead People make all the difference A recent McKinsey Digital report identified that talent and..
Read More
It’s a new year, and you know what happens in January? The number of gym memberships increases, diets are defined, and bad habits..
Read More
Cybersecurity awareness month this year is coming to an end, but the need to secure everyone online doesn’t stop..
Read More
CISA has introduced a website where they list its top cybersecurity bad practices, https://www.cisa.gov/BadPractices. With these bad practices..
Read More
The supply chain evaluation needs to be a shared responsibility across an agency and not just the focus of the information security team..
Read More
Who hasn’t uttered the phrase “let’s crawl, walk, and run…” when starting a new initiative? A slow then fast approach makes sense..
Read More
Why explore microservices for a modern enterprise? Are they really a value-add? Is it worth the cost and effort? The simple answer is yes..
Read More