§ Author
Author

Robert Weber

NewTech

Apple Smart Glasses

Technical Deep Dive: Apple’s AI-Infused Smart Glasses Targeting a 2026 Launch Reports from multiple sources indicate that Apple is advancing plans to release consumer-grade smart glasses, with a target launch timeframe positioned towards the end of 2026. This initiative appears to be a significant component of Apple’s broader strategy to integrate more deeply into the …

·
Artificial Intelligence

Multimodal AI

Beyond the Buzzwords: Unpacking the Multimodal AI Revolution of Early 2025 The relentless march of artificial intelligence continued its accelerated pace through late 2024 and into the dawn of 2025. While large language models (LLMs) had dominated headlines for the preceding years, the most significant recent developments lie in the realm of true, native multimodality. …

·
SR

SR-9: Tamper Resistance and Detection

RMF Control SR-9: Tamper Resistance and Detection requires organizations to implement anti-tamper technologies and techniques to protect systems and system components from unauthorized modification or disruption. This is important for protecting information systems from unauthorized access and ensuring that systems are performing as expected. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework …

·
SI

SI-15: Information Output Filtering

RMF Control SI-15: Information Output Filtering requires organizations to validate information before it is output to users or systems. This is important for protecting information systems from unauthorized access and disclosure. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity framework that provides a process for managing cybersecurity risk to systems and organizations. RMF …

·
SC

SC-40: Wireless Link Protection

RMF Control SC-40: Wireless Link Protection requires organizations to protect external and internal wireless communication links that may be visible to individuals who are not authorized information system users. Adversaries can exploit the signal parameters of wireless links if such links are not adequately protected. There are many ways to exploit the signal parameters of …

·
SA

SA-10: Developer Configuration Management

RMF Control SA-10: Developer Configuration Management requires organizations to ensure that software and firmware components distributed to the organization are exactly as specified by the master copies. This is important for protecting information systems from unauthorized changes and ensuring that systems are performing as expected. Supplemental Guidance The Risk Management Framework (RMF) is a cybersecurity …

·
RA

RA-4: Risk Assessment Update

RMF Control RA-4: Risk Assessment Update requires organizations to update their risk assessments on a regular basis to ensure that they are accurate and up-to-date. This is important because cybersecurity risks are constantly changing, and organizations need to be aware of the latest threats and vulnerabilities in order to protect their systems and data. Supplemental …

·
PT

PT-3: Personally Identifiable Information Processing Purposes

RMF Control PT-3: Personally Identifiable Information Processing Purposes requires organizations to identify and document the purpose(s) for processing personally identifiable information (PII), describe the purpose(s) in the public privacy notices and policies of the organization, restrict the processing of PII to only that which is compatible with the identified purpose(s), and monitor changes in processing …

·
PS

PS-6: Access Agreements

RMF Control PS-6: Access Agreements requires organizations to establish and implement access agreements for all individuals with access to information systems. Access agreements should specify the types of access that are authorized, the purposes for which access is granted, and the conditions that must be met in order to maintain access. Supplemental Guidance The Risk …

·