Military Training Simulation Software: Artificial Intelligence for Armed Servicemembers

You may be aware that the military uses “war games” to train its soldiers, but what exactly is military training simulation software? Broadly speaking, military simulations can refer to a wide range of training methods. Militaries have used everything from mathematical models to comprehensive rehearsals of strategies and weapons in a non-combative environment to prepare… Read more »

Cybersecurity Maturity Model Certification (CMMC) for Defense Contractors

If you want to work with the Department of Defense, you may be asking, “What is Cybersecurity Maturity Model Certification (CMMC) for defense contractors?” Cybersecurity Maturity Model Certification is a new requirement for defense contractors to ensure they maintain an adequate level of cybersecurity to prevent criminals from accessing Controlled Unclassified Information (CUI). Share our… Read more »

Proactive vs Reactive Cyber Security for Your Business

“Proactive vs reactive cyber security” is a phrase you’ve likely encountered while looking into ways to secure your business’ sensitive data. Proactive cyber security involves identifying and addressing security risks before an attack occurs, whereas reactive cyber security involves defending against attacks that have already happened. From company finances to business intelligence, customer information, and… Read more »

How Does Information Technology Support Artificial Intelligence?

At Entrust Solutions, we firmly believe that IT can support AI effectively. How does information technology support artificial intelligence? Automatic reminders Personalized recommendations Chatbots Proactive monitoring Fraud detection Despite these (and many other) increasingly common business practices that utilize AI, there are some who believe that, with the rise of artificial intelligence, information technology will… Read more »

How Is Entrust Innovating in R&D? Meet Our AI Research Scientist

Most people think of large companies, like Google and Apple, as the primary technology innovators in the U.S. But there are plenty of small businesses, like Entrust Solutions, leading the way and finding inventive methods of addressing technological challenges. So how do we compete and push innovation? Many technology breakthroughs past and present originated from… Read more »

Louisiana Vulnerability Management Best Practices

In the Information Age, personal information is at a premium. Companies use it as the basis of their business intelligence, giving them valuable insight into what they should produce, how they should market it, and much more. In many cases, we give our information away for free on social media or when using apps. Other… Read more »

New Orleans Technology Research and Development Opportunities

Technological innovation can come from almost anywhere. The next big idea could begin in a basement or a Fortune 500 company. When it comes to systematically producing new and innovative technology, however, research and development is critical. In addition to R&D from private companies, the U.S. government funds a significant amount of technology research and… Read more »

Security Clearance Backlog 2019: Why You Need to Keep Your Clearance Active

A comprehensive study from the U.S. Government Accountability Office (GAO) published in 2017 shows that for over half a decade, there has been a nearly insurmountable backlog of security clearance applicants. The security clearance backlog in 2019 is still an obstruction for those seeking clearance, which is why it is critical that professionals who have… Read more »

How to Reduce Cyber Security Risks

Today’s technology makes it easy for businesses to digitize, store, and use data, from customer information to business intelligence. Even the smallest businesses are likely to keep some information online, in the cloud, or on computers. Unfortunately, this comes with cyber security risks. As cyber crimes continue to advance in both quantity and quality, organizations… Read more »

3 Cloud Security Challenges and Risks to Protect Against

Cloud services are the foundation of modern business practices’ digital-first approach, and they are here to stay. According to Forrester, an analyst firm, cloud computing will more than double its global market value within a five-year time frame. It is expected to grow from $91 billion in 2015 to $191 billion by 2020. Despite this… Read more »