Base2 Solutions
  • Services
    • Custom Software
    • Systems Engineering
    • DevOps
    • Systems Integration
    • Information Security
    • AI & ML
  • Industries
    • Avionics
    • Space
    • Medical Devices
  • About Us
    • The Base2 Difference
    • Our People
    • Affiliations
  • Resources
    • Blog
    • Content Library
  • Careers
  • START A CONVERSATION
Select Page
Machine Learning: a Network Analytics Game-Changer

Machine Learning: a Network Analytics Game-Changer

by John Fogarty | Aug 14, 2018 | Information Security, Tech Trends

Machine learning (ML) is a hot buzzword. Every business and network analytical tool is looking for ways to differentiate its offering, usually by claiming that more intelligence has been embedded in it. A great deal of this is just hype. Decades of traditional log...
Keeping up with the Pace of Digital Innovation

Keeping up with the Pace of Digital Innovation

by Neil Halpern | Aug 8, 2018 | DevOps, Information Security, Project Management, Software Engineering, Systems Engineering

The rules of business are being redefined daily. In fact, change is happening more quickly than companies can adapt. While many organizations have their digital transformations well underway, even those with vast resources are struggling to keep up with the rapid pace...
5 phases to get NIST compliant fast

5 phases to get NIST compliant fast

by Jenifer Rees | Dec 21, 2017 | Information Security, Project Management

This article was published on washingtontechnology.com While your calendar is flurried with holiday dates, you should already be aware of one deadline – Dec. 31, 2017. It’s the date by which anyone holding U.S. government data must comply with the security directives...
Do you have questions about NIST 800-171 compliance? Ask yourself the following questions:

Do you have questions about NIST 800-171 compliance? Ask yourself the following questions:

by Andrew Hosch | Jul 10, 2017 | Information Security

Deemed the “Cyberattack that Shocked the U.S. Government,” the 2015 attack on the Office of Personnel Management—where more than 21.5 million records were stolen— highlighted the need for more stringent cyber security requirements when doing business with the U.S....
How to Conquer Compliance Challenges

How to Conquer Compliance Challenges

by Jenifer Reese & Andrew Hosch | May 18, 2017 | Information Security

This is a snippet of an article published on fortherecordmag.com Those in the health care industry regularly face challenges such as budgeting, patient privacy, and compliance. IT and security budget priority is difficult to quantify for return on investment—so how do...

If Your Company Works with the Federal Government, You Should Know This

by Jenifer Rees | May 2, 2017 | Information Security

This is a snippet of an article published on washingtontechnology.org Customers hire us to help them address their physical IT security infrastructure needs, and in the course of the conversation, we raise the specter of compliance with a Federal Government mandate...
« Older Entries

Categories

  • DevOps
  • Information Security
  • Project Management
  • Software Engineering
  • Systems Engineering
  • Tech Trends
  • Uncategorized

Recent Posts

  • Base2 Solutions Receives the Boeing Performance Excellence Award for the Seventh Consecutive Year
  • Stay at Home Orders Could Accelerate UAV and Autonomous Vehicles Adoption
  • Getting Started with Systems Engineering and Requirements Management (Part 1)

Recent Comments

  • order garden flowers online on 3 Top Takeaways for SE Success: A Report from the 5th Annual INCOSE Systems Engineering in Healthcare Conference
  • contemporary flower arrangements on 3 Top Takeaways for SE Success: A Report from the 5th Annual INCOSE Systems Engineering in Healthcare Conference
  • Bill Barnes on Model Rocketry and the Newest Generation of System Engineers
  • Facebook
  • Twitter
  • RSS
Copyright Base2 Solutions 2020 | All Rights Reserved | Privacy Policy & Retention Policy