Please fill out the form below to sign up for the DoubleHorn's mailing list
Latest From The Blog
Cloud computing has been around for more than a decade. Most of the arguments for and against a move to the cloud have been rehearsed hundreds of times.
In the previous blog we discussed at length about the identification and authentication to be followed in the process of accessing Criminal Justice Information (CJI). In this blog, we will focus on CJIS Compliance Configuration Management. The configuration of the information system is of paramount importance given the fact that any breach into the system may lead to catastrophic loss.