It’s the dreaded “M” word that every computer user cringes about.  Upgrading hardware and software, and moving assets to other locations can make things painful.  Dedicated in-house services and home grown web applications and scripts are no more for DKO.  The transition may have been a year ago but DoD network users are challenged with […]

AKO Email Exploit

Corporate espionage is increasing in the cyber world.  Although there are methods to deter and detect the transfer of protected information like classified documents and personal identification information (PII), by the time Information Assurance Officers catch on the the behavior the damage is already done. People can understand the transfer of trade secrets in big […]

Posted in AKO

AKO Virtualization

The Army Knowledge Online platform is evolving to support its current infrastructure with fewer resources.  This is accomplished with industry best practices and standards.  If big companies and big government does not evolve with the technology they are only posing a greater risk to vulnerabilities and threats, targeting the heart of our military.  It’s good […]

Posted in AKO