IT Security

National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM). It was created as a collaborative effort between government and industry by the…
Read More >
IT Security

AI & ML Predictions for 2019
As predicted, Artificial Intelligence and Machine Learning remain as hot topics in 2019. We share this Forbes article, “Three AI…
Read More >
IT Security

Insider Threat Detection – Personam
Threats evolve constantly and globally. Chasing rule or signature updates is endless. False positives drain resources. Bridges’ new Internal Threat…
Read More >
Community

Maryland & Georgia Cyber Collaboration
Bridges enjoyed hosting Anne Arundel Economic Development Corporation (AAEDC), Cybersecurity Association of Maryland, Inc. (CAMI), and a distinguished cybersecurity delegation…
Read More >
Community

Bridges Welcomes Georgia Cyber Delegation
The Anne Arundel Economic Development Corp. with the Cyber Association of Maryland, Inc. will hold a panel discussion and networking…
Read More >
Community

AJ Cooke Featured in Upcoming Cyber Security Panel Discussion

Bridges’ own AJ Cooke will be one of the panelists leading the discussion on “Cyber Security and Information Privacy” hosted…
Read More >
Health IT

HIPAA, HITECH, …and ARRA. How do they relate?
The terms HIPAA, HITECH, and ARRA are thrown around so often today that many people just read the HIPAA policy…
Read More >
IT Security

How to Perform a Vulnerability Assessment on Windows
How to Perform a Vulnerability Assessment on Windows No. I’m not talking about Microsoft’s ubiquitous operating system, but an actual…
Read More >
IT Security

Penetration Tests and Vulnerability Assessments: What’s the Difference?
Many articles discuss the differences between penetration tests and vulnerability assessments (just Google it), but I still run into questions…
Read More >