These high-security facilities look the same and can serve the same function, but the difference between a SCIF and SAPF lies in who utilizes the facility. SCIFs, Sensitive Compartmented Information Facilities, and SAPFs, Special Access Program Facilities, are two types…
Read More
How to Prevent and Detect Insider Threat
Insider threat is the most persistent and prevalent type of security threat in the country. This type of threat occurs when an insider (an employee or contractor with authorized access) wittingly or unwittingly misuses their authorized access to negatively harm…
Read More
What is Security in Depth?
Security in Depth (SID) refers to the multiple layers of security used to safeguard an asset. These security measures function in concentric layers, much like an onion, utilizing a combination of different technologies and security operations to protect against physical…
Read More
Tech Spec V1.5: Three Important Updates You Need to Know
Last week, the Office of the Director of National Intelligence released the long-awaited Version 1.5 of the “Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities,” commonly referred to as the “Tech Spec.” The document dictates how SCIFs/SAPFs…
Read More
How To Be An Effective Security Leader in Uncertain Times
A Message from Adamo’s CEO, Josh Godknecht Hello, security leaders. When I’m talking to security leaders, I’m talking to all of us. Whether your job is professional, vocational security enforcement of some sort, or you’re just a parent, friend or…
Read More
Keep Your Information Secure When Working From Home
Working from home with sensitive information can create a number of security risks, many of which are done unknowingly. Double-check that you are taking these precautions to keep your information secure. Secure your home WiFi network. Besides connecting to your own…
Read More