SQUID-A-RAMA
This year’s surprise was our IBSS team cooking up squid two ways. You could have a plate of crispy fried squid with tartar sauce, or a scoop of jasmine rice layered with fragrant freshly made green curry and a sprinkling of fried squid to put it over the top!
In Search of the Perfect Bite – Green Curry with Crispy Squid
Some love to eat it raw, but other options include fried calamari or crispy squid with green curry.
Sustainable Gifting Ideas for the Holiday Season
The holiday season, while joyful, often generates significant waste. IBSS encourages embracing sustainable options for gifting and packaging to celebrate more responsibly.
Mastering NIST SP 800-171 Compliance: Insights from IBSS’ LinkedIn Live Series
At IBSS, we bring over 20 years of DoD cybersecurity experience to help organizations understand and achieve NIST SP 800-171 compliance.
In Search of the Perfect Bite – Manila Clams with Lap Xuong Sausage in a Spicy Black Bean and Chili Sauce
Manila clams, known for their hardiness and sweet flavor, are the perfect bivalve for ocean farming and the second most aquacultured bivalve worldwide.
“Bite of the Apprentice” Washington State Chefs Association
Through the eeBLUE program, IBSS’s Mark and Lisa Tagal collaborated with Bonney Lake High School’s Culinary Club to explore Merroir concepts, leading to a winning dish for the WSCA’s Bite of the Apprentice competition.
Cybersecurity Awareness Month: Recognizing and Reporting Phishing
Despite the best user training and rigorous best practices, users still make mistakes. Fortunately, several established and emerging endpoint and network security technologies can help security teams combat phishing.
Cybersecurity Awareness Month: Cyber Hygiene
IBSS emphasizes the critical role of cyber hygiene in protecting individuals and organizations online.
Cybersecurity Awareness Month: Cyber Hygiene and Updating Software
IBSS highlights the critical importance of cyber hygiene and software updates for online safety. It outlines essential practices like strong passwords, role-based access, and regular backups, while also warning against common mistakes and fake updates.










