- By September 20th, 2015Read More »
Insider threat represent a unique place in the cyber security threat matrix: High likelihood of occurrence coupled with high potential damage. Even more troubling, most organizations are overly optimistic about their ability to combat insider threat. How can you defend against those you trust? Cyber Security Principal Robert J. Michalsky, who recently published a white paper on the subject, answers in a Q&A.
- By September 1st, 2015Read More »
- By August 19th, 2015Read More »
Everything we needed to know about end-user experience we learned from hockey ... and built into Servicefront. Find out how Servicefront can help you drop the gloves and square off against end-user frustration.
- By August 17th, 2015Read More »
Who do you trust? For the best cyber security posture, the answer may be "No one." Cyber Security principal Robert J. Michalsky explains how the Zero Trust Model works and why it may significantly alter enterprise cyber defense..
- By July 30th, 2015Read More »
If cars were built like IT enterprises, you would, at this moment, probably be starting your exhaust system. Or you might be searching for the access point to your electrical system, logging into your cooling system or putting a request in to start the drive train. Perhaps you’d be on hold with customer support as you forgot your password to unlock your tires.
- By July 16th, 2015Read More »
The steps used to spark innovation and create efficiencies in traditional engineering could unleash a torrent of consequences if applied to cyber security. So how can you be innovative in a discipline built on checklists and compliance?
- By June 23rd, 2015Category:Read More »
When your mission is critical, IT is always at its center.
NJVC unveiled its “Mission CrITical” digital platform Tuesday for the opening of the GEOINT 2015 Symposium in Washington D.C., the nation’s largest yearly gathering of intelligence officials.
- By June 22nd, 2015Read More »
What will $216.42 buy you? A lot of cyber security feuding. Recently released reports by the Ponemon Institute, sponsored by IBM and Verizon, have two top cyber vendors at odds over the cost of a data breach. One says $217, the other starts at 58 cents. So who's right and why is it more than just a public relations feud?
- By May 26th, 2015Read More »
At NJVC, Memorial Day is never just a day off. Rather, as our corporate offices go dark Monday, it’s a day of remembrance for those who made the ultimate sacrifice in defense of our nation, and an eternal thank you to the brave men and women who are prepared to do so each day. At NJVC, we are proud to serve those who serve our country, and honored to remember those who served to the utmost level of commitment.