Quantcast
Channel: Business 2 Community » Caron Beesley
Browsing latest articles
Browse All 22 View Live

The Government Cloud Set to Expand Beyond Storage and Email in 2015

What can government agencies expect from cloud computing in 2015? IDC Government Insights recently released its worldwide predictions for 2015 and predicts that governments will increasingly draw on...

View Article



Image may be NSFW.
Clik here to view.

What the Feds Can Learn from the Sony Hack

With Edward Snowden and Sony hacking scandal still fresh in our minds, it probably comes as no great surprise to learn that malicious outsider threats are the number one cybersecurity hazard faced by...

View Article

What Should Government Agencies Do When they Discover a Data Breach?

Data breaches are an unfortunate fact of life for government agencies – Edward Snowden being the most infamous case. And although agencies have taken steps to protect themselves, the growing number of...

View Article

Image may be NSFW.
Clik here to view.

5 Ways Procuring the Government Cloud is Different

5 Things Every Agency Should Know About Procuring Cloud Services If your agency is making the move to cloud services, it can expect cost-savings, improved service delivery, and all the great things...

View Article

Feds are Ignoring Insider Threats to Cybersecurity, New Survey Reveals

One of the biggest threats to the security of government data and systems doesn’t come from rogue hackers or nations, it comes from within. As we revealed in The 4 Biggest Cybersecurity Threats of...

View Article


4 Ways Government Agencies Can Overcome Big Data Privacy Concerns

Driven by potentially compelling outcomes, big government data is growing. A 2013 study of federal IT officials by the TechAmerica Foundation, for example, found that big data delivers many benefits,...

View Article

As DoD Eyes Internet of Things for New Uses Cases, Security Concerns Remain

The “Internet of Things” isn’t exactly a new concept, Kevin Ashton coined the term the Internet of Things as far back as 1999. Now, 15 years later, the Department of Defense (DoD) is eager to exploit...

View Article

Why You Shouldn’t Just Rely on the Open Source Community to Harden Code

“Responsibility for secure open software is, well, complicated,” writes Government Computer News. It’s not just complicated; it’s also perhaps one of the most misunderstood aspects of open source...

View Article


Image may be NSFW.
Clik here to view.

The Challenges and Opportunities of Agency Application Modernization

Cloud, enhanced service delivery, improved collaboration, all common goals and challenges for governments of all types. Yet one common thread runs through most agencies, regardless of their strategic...

View Article


Weeding Out Tax and Benefits Fraud with the Help of Big Data

Weeding out fraud is a big priority for the public sector. From unpaid and fraudulent taxes to benefit fraud, governments are turning to data to hit back. In Indiana, for example, the state has begun...

View Article

What’s This Data Masking All About Anyway?

So you’ve got all sorts of endpoint controls and continuous monitoring solutions in place across your agency’s IT environment. Great! Sounds like you’ve got a good security posture going on. But is...

View Article

Government Cloud Adoption Reaching A Tipping Point

There’s lots of talk these days about how government technology innovation is being held back by legacy environments, so it’s refreshing to hear that cloud adoption by government agencies is set to...

View Article

8 Facts That Have Emerged About The Federal Data Breach At OPM

On June 4, the Office of Personnel Management (OPM) announced that hackers working for the Chinese state had breached about four million records of current and former federal employees – the largest...

View Article


6 Clues Left By Hackers That Can Help Agencies Defend Against Attacks

In the wake of the recent announcement of a massive data breach at the federal government’s Office of Personnel Management (OPM), blame was quickly laid at the door of state-sponsored Chinese hackers...

View Article

Image may be NSFW.
Clik here to view.

How Agencies Can Implement Agile/DevOps Without Leaving Legacy Behind

From DevOps to the cloud there’s a seismic shift in how government organizations work with IT, yet, that shift is perennially thwarted by a lack of operational agility. In fact a staggering 87% of...

View Article


Federal CIO Says Cybersecurity Is Our Most Important Mission Today

Data breach after data breach – attacks on federal IT systems are becoming a regular occurrence. And, as the true scope and impact of the recent cyberattack on OPM’s systems continues to unravel (read...

View Article

The Anatomy of a Cyber Attack on Government Systems

With fewer resources than the private sector, yet faced with the same threats, the U.S. government is dealing with a complex dilemma. Both the public and government employees demand accountability for...

View Article


Why and How to Shed Light on your Agency’s Dark Data

“Dark data” – by that we mean data that’s been stored away in some IT system and untouched for years, is about to come out of the shadows. Thanks to big data technologies it’s become easier than ever...

View Article

Image may be NSFW.
Clik here to view.

Public, Private, Hybrid? Which Cloud is Right for your Agency?

Should your agency move data or applications to the private or public cloud or a hybrid combination of the two? But those aren’t the only options. Other choices include a community cloud, a...

View Article

The Key to a Successful Government Security Training Program: Make it Personal

Back in May, I wrote about the 6 Elements of a Government Insider Threat Program as recommended by a panel of government and industry experts at this year’s Symantec Government Symposium in Washington,...

View Article

5 Top Data Privacy Challenges for State and Local Agencies

With the recent data breach at OPM, the spotlight has firmly been on federal data breaches and the vulnerabilities that expose sensitive employee and citizen information to would-be hackers. But the...

View Article


Image may be NSFW.
Clik here to view.

5 Reasons Why Conventional IT Security Is Failing And CDM Is Your Best Defense

Security breaches are on the rise and government systems are goldmines for would-be intruders. If 2015 has taught us anything it’s that it’s no longer a case of if or when a significant security...

View Article

Browsing latest articles
Browse All 22 View Live




Latest Images