Blogs

31
"Extra, extra; read all about it - the federal government is moving to the cloud.”  OK, so this is not a new headline, but just over a year...

[Read the rest of this article...]

29
The days of stickups and getaway cars in bank robberies are quickly waning.  With money existing in zeros and ones, criminals are finding new way...

[Read the rest of this article...]

18
It's very rare to be able to discuss Kim Kardashian and IT security in the same blog – today is the day.  Articles in the Los Angeles Times...

[Read the rest of this article...]

20
Critical infrastructure is a major target for cyber attacks. From oil and gas production to power and water utilities, these systems form the backbone...

[Read the rest of this article...]

11
When it comes to the federal cloud, things are moving quickly. It wasn’t so long ago that an agency needing cloud services would approach a Clou...

[Read the rest of this article...]

11
In the past, we have blogged about the Federal Risk Authorization and Management Program’s (FedRAMP) push to save time and money by verifying th...

[Read the rest of this article...]

10
The recent bounty of spring weather reminds all of us that summer is fast approaching -- and with it comes the June deadline for federal agencies to c...

[Read the rest of this article...]

16
Ever go online to pay a parking ticket? Submit a tax return? Find your voting location?  If you have you’ve probably done it through a Web ...

[Read the rest of this article...]

12
In this blog, I wanted to look back at the evolution of security from the early 90’s to today and address the changes that have occurred wi...

[Read the rest of this article...]

21
Cybersecurity controls abound in the federal government. With a changing threat landscape and rapidly evolving IT environment, Chief Information Secur...

[Read the rest of this article...]

05
This month, the Department of Veterans Affairs will begin allowing iPhones and iPads on their networks. The move underscores CIO Roger Baker&rsqu...

[Read the rest of this article...]

05
Social networking can be a great platform for companies to communicate with employees, customers, and shareholders, but it can become an unexpected so...

[Read the rest of this article...]

22
On June 1, 2011, the federal government issued new requirements for agencies to report their compliance with the Federal Information Security Manageme...

[Read the rest of this article...]

13
To have an accurate understanding of the current risk posture of your enterprise, the right security metrics must be identified and collected. The rec...

[Read the rest of this article...]

06
Securing federal information and assets in cyberspace is the primary driver behind cybersecurity.  Even so, other factors help define risk, inclu...

[Read the rest of this article...]

04
Rapid developments in Information Technology (IT), the Internet, and networks have created previously unimaginable capabilities and tools for federal ...

[Read the rest of this article...]