Blog

Evaluating the Health and Status of Products and Threads

Background This paper is one in a sequence defining Evaluated Product Maturity (EPM).  EPM is designed to assist in assessing the risk of breaking or diminishing the functionality of a system-of-systems functional thread by modifying, changing, or replacing one or more systems that make up that thread.  The sequence of this paper provides the basis…

What Is AIOps

Today’s business world is increasingly turning toward digitization. Many essential tasks have shifted to digital processes, including cloud-based and automated systems, and even more tasks are expected to make the shift in the future. With this movement toward increasing digitization, information technology (IT) capability development and operations have become increasingly business-critical, with responsibility for managing…

Understanding the Role of DFARS vs. CMMC

Data security is an enormous point of interest for the United States government. With the ever-changing landscape of cyber threats, data protection is a necessity at the federal level. Security expectations also extend to the Defense Industrial Base (DIB) sector. With this in mind, the federal government has established internal legislation and mandates to protect their…

ISACA Fundamentals Cybersecurity Exam

By: Mark Ferwerda The Cybersecurity (CSX) Fundamentals certificate through ISACA (Information Systems Audit and Control Association) helps build competency in cybersecurity concepts, principles and language. During the COVID lockdown, I decided this was one of the BTI focus areas I would like to learn more about, and this article relates to my experiences preparing for…

Cybersecurity Maturity Model Certification Now Required

The CMMC Framework and the NIST SP 800-171 are the two cybersecurity assessment methodologies addressed in DFARS Case 2019-D041 Assessing Contractor Implementation of Cybersecurity Requirements, published in the Federal Register, 85 Fed. Reg. 61505 (Sept. 29, 2020), and effective Nov 30, 2020. This implements the DoD-issued interim rule, Assessing Contractor Implementation of Cybersecurity Requirements, on…

Cybersecurity Maturity Model Certification

CMMC v1.0 The Cybersecurity Maturity Model Certification (CMMC) v1.0 was released on the last day of January 2020.  Many organizations are familiarizing themselves with the requirements of CMMC in anticipation that draft RFPs requiring some level of CMMC compliance will begin appearing in June 2020.  What is still being developed by the CMMC Advisory Board…

ITIL 4 Best Practices and Guiding Principles

ITIL 4 is here, and with it comes many questions from software developers, IT providers, and project managers alike. You may be wondering what ITIL 4 is, what to expect in the ITIL 4 update, what the difference is between ITIL 3 and 4, or how to put ITIL 4 principles into practice. For those…

Cybersecurity Maturity Model Certification (CMMC) V0.6

With the release of DoD’s Cybersecurity Maturity Model Certification (CMMC) v0.6 draft version on November 7, 2019, it has become apparent that a strong DevSecOps implementation will aid in achieving a CMMC Maturity Level rating. V0.6 contains the practices required for the Maturity level’s one through three (Maturity levels four and five will be published…

Guide to Choosing the Right DevOps Tools

Constructing your DevOps toolchain is one of the major tasks in implementing DevOps. While it is not as difficult as potentially changing the culture of the organization to allow DevOps to work, it can be a contentious activity since your organization will want to consolidate the implementation/maintenance of your DevOps toolchain under a single infrastructure…

Agile Management Tips | BTI

In today’s highly competitive marketplace, it’s critical for businesses to streamline their processes as much as possible. Moreover, companies — especially those that develop software — need to be responsive and quickly adapt their products to their customers’ needs. In this pressure-filled environment, traditional project management methodologies don’t offer sufficient speed and flexibility. That’s why…

Partners with

Supporter of