A Message from Adamo’s CEO, Josh Godknecht Hello, security leaders. When I’m talking to security leaders, I’m talking to all of us. Whether your job is professional, vocational security enforcement of some sort, or you’re just a parent, friend or…
Read More
How to Obtain a Facility Clearance (FCL)
A guide to navigating the facility security clearance process The facility clearance (FCL) process can be intimidating, as can all the acronyms you encounter along the way. But it’s relatively straightforward if you’re prepared. Follow the steps outlined below, and…
Read More
Keep Your Information Secure When Working From Home
Working from home with sensitive information can create a number of security risks, many of which are done unknowingly. Double-check that you are taking these precautions to keep your information secure. Secure your home WiFi network. Besides connecting to your own…
Read More
What is Security in Depth?
Security in Depth (SID) refers to the multiple layers of security used to safeguard an asset. These security measures function in concentric layers, much like an onion, utilizing a combination of different technologies and security operations to protect against physical…
Read More
How to Prevent and Detect Insider Threat
Insider threat is the most persistent and prevalent type of security threat in the country. This type of threat occurs when an insider (an employee or contractor with authorized access) wittingly or unwittingly misuses their authorized access to negatively harm…
Read More
Awareness Tech Spec V1.5: Three Important Updates You Need to Know
Last week, the Office of the Director of National Intelligence released the long-awaited Version 1.5 of the “Technical Specifications for Construction and Management of Sensitive Compartmented Information Facilities,” commonly referred to as the “Tech Spec.” The document dictates how SCIFs/SAPFs…
Read More