The Government Cloud Set to Expand Beyond Storage and Email in 2015
What can government agencies expect from cloud computing in 2015? IDC Government Insights recently released its worldwide predictions for 2015 and predicts that governments will increasingly draw on...
View ArticleWhat the Feds Can Learn from the Sony Hack
With Edward Snowden and Sony hacking scandal still fresh in our minds, it probably comes as no great surprise to learn that malicious outsider threats are the number one cybersecurity hazard faced by...
View ArticleWhat Should Government Agencies Do When they Discover a Data Breach?
Data breaches are an unfortunate fact of life for government agencies – Edward Snowden being the most infamous case. And although agencies have taken steps to protect themselves, the growing number of...
View Article5 Ways Procuring the Government Cloud is Different
5 Things Every Agency Should Know About Procuring Cloud Services If your agency is making the move to cloud services, it can expect cost-savings, improved service delivery, and all the great things...
View ArticleFeds are Ignoring Insider Threats to Cybersecurity, New Survey Reveals
One of the biggest threats to the security of government data and systems doesn’t come from rogue hackers or nations, it comes from within. As we revealed in The 4 Biggest Cybersecurity Threats of...
View Article4 Ways Government Agencies Can Overcome Big Data Privacy Concerns
Driven by potentially compelling outcomes, big government data is growing. A 2013 study of federal IT officials by the TechAmerica Foundation, for example, found that big data delivers many benefits,...
View ArticleAs DoD Eyes Internet of Things for New Uses Cases, Security Concerns Remain
The “Internet of Things” isn’t exactly a new concept, Kevin Ashton coined the term the Internet of Things as far back as 1999. Now, 15 years later, the Department of Defense (DoD) is eager to exploit...
View ArticleWhy You Shouldn’t Just Rely on the Open Source Community to Harden Code
“Responsibility for secure open software is, well, complicated,” writes Government Computer News. It’s not just complicated; it’s also perhaps one of the most misunderstood aspects of open source...
View ArticleThe Challenges and Opportunities of Agency Application Modernization
Cloud, enhanced service delivery, improved collaboration, all common goals and challenges for governments of all types. Yet one common thread runs through most agencies, regardless of their strategic...
View ArticleWeeding Out Tax and Benefits Fraud with the Help of Big Data
Weeding out fraud is a big priority for the public sector. From unpaid and fraudulent taxes to benefit fraud, governments are turning to data to hit back. In Indiana, for example, the state has begun...
View ArticleWhat’s This Data Masking All About Anyway?
So you’ve got all sorts of endpoint controls and continuous monitoring solutions in place across your agency’s IT environment. Great! Sounds like you’ve got a good security posture going on. But is...
View ArticleGovernment Cloud Adoption Reaching A Tipping Point
There’s lots of talk these days about how government technology innovation is being held back by legacy environments, so it’s refreshing to hear that cloud adoption by government agencies is set to...
View Article8 Facts That Have Emerged About The Federal Data Breach At OPM
On June 4, the Office of Personnel Management (OPM) announced that hackers working for the Chinese state had breached about four million records of current and former federal employees – the largest...
View Article6 Clues Left By Hackers That Can Help Agencies Defend Against Attacks
In the wake of the recent announcement of a massive data breach at the federal government’s Office of Personnel Management (OPM), blame was quickly laid at the door of state-sponsored Chinese hackers...
View ArticleHow Agencies Can Implement Agile/DevOps Without Leaving Legacy Behind
From DevOps to the cloud there’s a seismic shift in how government organizations work with IT, yet, that shift is perennially thwarted by a lack of operational agility. In fact a staggering 87% of...
View ArticleFederal CIO Says Cybersecurity Is Our Most Important Mission Today
Data breach after data breach – attacks on federal IT systems are becoming a regular occurrence. And, as the true scope and impact of the recent cyberattack on OPM’s systems continues to unravel (read...
View ArticleThe Anatomy of a Cyber Attack on Government Systems
With fewer resources than the private sector, yet faced with the same threats, the U.S. government is dealing with a complex dilemma. Both the public and government employees demand accountability for...
View ArticleWhy and How to Shed Light on your Agency’s Dark Data
“Dark data” – by that we mean data that’s been stored away in some IT system and untouched for years, is about to come out of the shadows. Thanks to big data technologies it’s become easier than ever...
View ArticlePublic, Private, Hybrid? Which Cloud is Right for your Agency?
Should your agency move data or applications to the private or public cloud or a hybrid combination of the two? But those aren’t the only options. Other choices include a community cloud, a...
View ArticleThe Key to a Successful Government Security Training Program: Make it Personal
Back in May, I wrote about the 6 Elements of a Government Insider Threat Program as recommended by a panel of government and industry experts at this year’s Symantec Government Symposium in Washington,...
View Article5 Top Data Privacy Challenges for State and Local Agencies
With the recent data breach at OPM, the spotlight has firmly been on federal data breaches and the vulnerabilities that expose sensitive employee and citizen information to would-be hackers. But the...
View Article5 Reasons Why Conventional IT Security Is Failing And CDM Is Your Best Defense
Security breaches are on the rise and government systems are goldmines for would-be intruders. If 2015 has taught us anything it’s that it’s no longer a case of if or when a significant security...
View Article
More Pages to Explore .....