Protect Data

Protecting Sensitive Data by Replacing Vulnerable Legacy Business Software

As a former Federal Facilities Security Officer (FSO), Program Security Manager (PSM), Counterintelligence agent, and executive responsible for Cyber Forensic programs, I have observed a recurring vulnerability to sensitive Federal data associated with legacy business software solutions. Despite increased budgets for Federal agency security Insider Threat and Counterintelligence (IT/CI) programs, exploitable vulnerabilities remain. That is […]