Nov 16, 2020 | Articles, Cloud Security, Compliance, Cybersecurity, Uncategorized
The cybersecurity threat environment develops every year, and so does the race to develop protections against new and unseen threats. Cybersecurity is more crucial than ever in public infrastructure. Our public infrastructure provides essential services to the people,...
Oct 14, 2020 | Articles, Cloud Security, Compliance, Cybersecurity, Uncategorized
NIST’s flagship security and privacy guidance document Special Publication (SP) 800-53, Security and Privacy Controls for Information Systems and Organizations makes major changes to the Security and Privacy Controls Catalog NIST SP 800-53, Revision 5 provides...
Oct 13, 2020 | Articles, Cloud Security, Compliance, Cybersecurity, Uncategorized
Offensive cybersecurity has grown to become a serious threat to public and private sectors. Data breaches have compromised organizations and critical data from small businesses to the federal government. Attackers are sophisticated, and they target every layer of...
Jul 23, 2020 | Business Transformation, Cybersecurity, Uncategorized
End to End Computing, like many other organizations, is actively engaged in the effort to support our community as we work together to combat the COVID-19 pandemic. Like many small businesses, we have decided to lend our skills and expertise to assist where needed....
Jul 22, 2020 | Advanced Tech, Business Transformation, Cybersecurity, Project Management, Uncategorized
Governments and government agencies are racing to modernize by adopting digital and cloud-based technologies through initiatives like the Modernizing Government Technology (MGT) Act. This has spurred the contract procurement process for project leadership partners....
Jul 22, 2020 | Articles, Business Transformation, Uncategorized
As a government agency technology leader, you understand that new technologies pave the way for government innovation in operation, efficiency and costs reductions. But getting from concept to reality requires finding innovative ways to overcome constrained budgets...