IT and Business Insights for SMB Solution Providers

Tips and Advice

ASCII Forum: Trending Topics
August 8th, 2022 | ChannelPro
Hot topics trending on the members-only ASCII Group Forum. Come join the conversation... - read more
 
Article
August 4th, 2022 | Kathy Wagner
An acquisition can start an exciting new chapter for a managed service provider, but only if it’s done right. - read more
 
Article
July 26th, 2022 | Emily Glass
Four lessons learned that can help women rise to the C-suite and champion the channel. - read more
 
Article
July 21st, 2022 | Esther Shein
Having younger staff mentor senior executives to gain new perspective is gaining momentum as a way to develop more equitable leaders. - read more
 
Blog Entry
July 21st, 2022 | Jay Ferron
The National Cybersecurity Center of Excellence (NCCoE) has released a new draft project description, Software Supply Chain and DevOps Security Practices: Implementing a Risk-Based Approach to DevSecOps. Publication of this project description begins a process to solicit public comments for the project requirements, scope, and hardware and software components for use in a laboratory environment. - read more
 
Blog Entry
July 21st, 2022 | Jay Ferron
 The initial public draft of NIST Special Publication (SP) 800-66r2 (Revision 2), Implementin - read more
 
Blog Entry
July 20th, 2022 | Jay Ferron
 Comment Period Extended for NIST SP 1800-34, Validating the Integrity of Computing Devices - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 Today, NIST is seeking public comments on NIST IR 8409 ipd (initial public draft), - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 NIST is in the process of a periodic review and maintenance of its cryptography standards and guidelines.    - read more
 
Blog Entry
July 19th, 2022 | Jay Ferron
 Traditional business impact analyses (BIAs) have been successfully used for business continuity and disaster recovery (BC/DR) by triaging damaged infrastructure recovery actions that are primarily based on the duration and cost of system outages (i.e., availability compromise). However, BIA analyses can be easily expanded to consider other cyber-risk compromises and remedies. - read more
 

Pages

Subscribe to Tips and Advice