top of page

Informative insights and thought leadership to help you stay a step ahead of the industry.

Search


Ramzy Megally
Jul 9, 20232 min read
TekMasters gets exclusive advanced behavioral biometrics for MFA.
TekMasters gets exclusive advanced behavioral biometrics for MFA. Collaborates with BSI to provide advanced cyber security to the IC.
1260


Ramzy Megally
Mar 26, 20232 min read
Procurement’s “easy” button.
In measuring and qualifying the success of a task order or Project (TO/P), results and their quality matters. Other critical factors...
250

Jason Hudak
Jan 25, 20235 min read
US DOS - Bureau of Consular Affairs
CASE STUDY Customer TekMasters provides global IT support services to the U.S. Department of State, Bureau of Consular Affairs. Services...
700

Nelson Santini
Jan 3, 20232 min read
Cadre Capabilities vs. BIS
If you are wondering; "Butts In Seats" Found in an industry day suggestion box: “Never tell people how to do things. Tell them what to...
190

Nelson Santini
Dec 22, 20222 min read
Protect your PAM!
We live in the real world but transact online. Our critical infrastructure, utilities, and services have heavily migrated from...
70

Nelson Santini
Dec 22, 20223 min read
Living out our Critical Infrastructure’s Cyber-Siege
Living out our Critical Infrastructure’s Cyber-Siege. Are we ready for the next attack to our networks?
40

Nelson Santini
Dec 22, 20223 min read
Resiliency & recovery after a cyber-attack
Being ready goes far beyond having a plan. It involves rehearsal, preparation and a trusted network of expert partners ready to collaborate
20

Nelson Santini
Dec 22, 20223 min read
Restoring Comms: It Is About More Than Bandwidth—Securing Comms Can No Longer Be an Afterthought
We need to better factor communications and cybersecurity into emergency preparedness.
300

Nelson Santini
Dec 22, 20222 min read
Betting Against Downtime
It’s not a question of “if”, but a certain “when”. Your network will be attacked. Be prepared!
40

Nelson Santini
Dec 22, 20222 min read
The Art of War: A cybersecurity take
How would Sun Tzu apply his theory in today's world of cybersecurity?
40


Nelson Santini
Dec 22, 20222 min read
Mind The Gap!
How do we eliminate the gap between body cam footage, and where it resides?
30

Nelson Santini
Dec 22, 20222 min read
The Path to BI Runs through a Lake or Warehouse
We consume BI via our smartphone, tablet, computer and even printed handouts (how is that still a thing?). From your basic bar chart to...
10
bottom of page