Sourcing your tech perspective
TechRoots Blog
Training and Certification
Transitioning from DIACAP to RMF August 5, 2013
Department of Defense (DoD) information systems must be protected with adequate, or acceptable, security controls. Controls can be anything from high level policies to user level access permissions. Obviously, if too few controls are implemented, a system is left highly vulnerable to attack. But if too many controls are put in place, valuable resources are […]
Keep ReadingWhat's new
The Latest Blog
Articles
subscribe by email
Stay Ahead
-
Cyber Security
What is a Denial of Service (DoS) Attack?
July 26, 2013
-
Project Management
What is a PMP Certification?
July 18, 2013
-
Hardware & Software
Mood Rings to Mood Ringtones: Microsoft’s New Smartphone Technology
July 17, 2013
-
Cyber Security
DARPA’s Plan X – The Cyber Warfare App
July 9, 2013
-
Training and Certification
How to Become a Licensed Penetration Tester (LPT)
July 1, 2013
-
News
EC-Council’s Jay Bavisi Receives the NSA 2013 Colloquium Industry Leadership Award
June 27, 2013
-
Cyber Security
Car Hacking Just Got Deathly Serious
June 27, 2013
-
News
Phoenix TS Becomes USO Proud Patriots Club Member
June 27, 2013
-
Training and Certification
What is ITIL® Training?
June 26, 2013