×

Sourcing your tech perspective

TechRoots Blog

thumb
Training and Certification

Transitioning from DIACAP to RMF August 5, 2013

Department of Defense (DoD) information systems must be protected with adequate, or acceptable, security controls.  Controls can be anything from high level policies to user level access permissions.  Obviously, if too few controls are implemented, a system is left highly vulnerable to attack.  But if too many controls are put in place, valuable resources are […]

Keep Reading
What's new

The Latest Blog
Articles

subscribe by email

Stay Ahead

Phoenix TS needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.