By Bruce Matthews, Associate Director, Federal Services
In last month’s article, “ Advanced Cyber Threat Intelligence: A First Principles Approach to Risk Mitigation ,” I outlined a method of enhancing cyberthreat intelligence efforts by leveraging foundational security practices. To help protect your department, agency, and/or organization and those it services, we encourage you to map known tactics, techniques, and procedures (TTPs) to frameworks...
By Jennetta George, AI/ML Specialist Leader
Graph Databases are the (not-so-) new must-have in your tech stack. Over the past few decades, more and more tech giants ( Facebook , Twitter, and Google leading the way) have started migrating data into graph databases to not only store and retrieve data in a highly scalable way, but also incorporate models on graph structures to produce highly effective recommendations. What makes graph...
By Bruce Matthews, Associate Director, Federal Services
As the field of cyber threat intelligence (CTI) evolves and coalesces around standard practices, invoking the threat intelligence cycle and attack frameworks/models, it is useful to think outside of the proverbial box to leverage foundational security principles to help protect your department, agency, and/or organization and those it serves. In this post, I provide an overview of the concept and...
By Ahmed Aboulnaga, Senior Principal at Attain
Attain sat down with Oracle expert and Senior Principal Ahmed Aboulnaga to learn more about the innovative work that he is delivering to federal clients, get his take on industry and technology trends, discuss his recognition as an Oracle ACE, as well as learn more about him personally. Read on below! What is your role at Attain? I joined Attain in 2017 and am currently a Senior Principal. My...
By Laura Smith, Marketing and Alliances Manager
Attain uses leading-edge technologies and software development practices to improve customer experience and increase cost efficiencies for our clients. A government client was challenged with a lack of efficiency, minimal documentation of processes, high costs, and an urgent need to find a new identity proofing vendor. Attain leveraged a holistic, agile, secure, and customer-centered approach to...

Pages

Sort by Year