Archive

Blog search

Archive: January 2015
photo

At this point, everyone understands the risk that agencies face in terms of cyberattacks. There are simply so many different kinds of threats organizations face that preparing to take on all of them is a massive undertaking. Despite this, big data strategies for local government offices are necessary to improve the quality of civil services for citizens. What this means is that local entities need to be able to better protect the servers they have housing their important data. For citizens, officials and professionals alike, security has become even more serious. The issue now is not whether or not groups should develop their own ways to defend their servers, but how their troves of data should be defended. With serious consideration going toward both the use of older types of protection like an Antivirus program, and modern-day methods of detection like endpoint threat response software, it is likely that agencies will see their servers increasingly layered by barricades against attacks.  Read More

photo

Security reforms are necessary, supported and ready to go

Posted on January 20, 2015
Category: Cybersecurity

U.S. organizations are in a current state of security crisis. What has long simmered underneath the public’s radar has now emerged as major cybersecurity problems that people are beginning to realize are endemic to the way things are done. Information is connected to the point that everyone has the potential to have their data compromised, and this means that agencies must act to protect people’s security. Government agencies, specifically, need to pay attention to the rising standards that must be met in order to keep not only their own data safe, but the information that they process as well. The political will is currently there, across the board, for broader security standards for both the private and public sector, and it is likely that cybersecurity bills will pass during the upcoming House and Senate sessions.  Read More

Encryption is necessary, but political views are fraught with tension

Posted on January 19, 2015
Category: Cybersecurity

Many organizations have become well-acquainted with the disaster scenarios that present themselves when they are hacked. The series of high profile attacks made on companies, agencies and even individuals by hackers and those who seek to disclose private information have left everyone a little bit more aware of security. What this means for the average institution is that it is no longer enough to get by with outdated methods of security.  Read More

photo

Security breaches are inevitable: Plans need to be made to clean up

Posted on January 16, 2015
Category: Cybersecurity

While this is hard to hear for many agencies, data breaches are inevitable. Information kept on servers that are connected in any way to the Internet are inherently insecure, and there is little to nothing that can be done in order to prevent them from being broken into. Security at this point should not be measured in terms of “safe” versus “unsafe” but “likely to be hacked” and “unlikely to be hacked.”  Read More

photo

Secrets continue circling through firms’ use of cybersecurity

Posted on January 16, 2015
Category: Cybersecurity

Cybersecurity as a subject is always cloaked in mystery when it isn’t dry and technical. Two recent developments may let some organizations wish that they had a little bit more privacy with regard to their information, while others wish they had more insight into future growth. Understanding how to make use of modern advancement in safety on the technical side of things is difficult for many organizations, but essential. In order to protect themselves and their clients, organizations need to be able to develop the systems necessary to thwart, or at least detect, intrusions on their networks.  Read More

photo

Cybersecurity for federal offices continue to bloom in face of new foes

Posted on January 16, 2015
Category: Cybersecurity

Cybersecurity is comparable more to an arms race than traditional security, due to the way that hackers and IT professionals must continually test their methods of attacking and defending against the latest strategies used by their opponents. Virtual machines and partitioned sandbox servers let those working on defense hire white hat hackers to crack their networks on purpose in order to expose weaknesses. Faked servers are used by hackers in the same way to test ways of getting information without being detected. In order to stay ahead of attackers, those who are focused on defense need to continue to push ahead.  Read More

photo

Cybersecurity is difficult for everyone, but hiring experts is harder

Posted on January 07, 2015
Category: Data Center

Finding security experts for companies is becoming increasingly difficult in a world desperate for professionals who can keep networks safe. Due to the financial losses that can be inflicted upon companies by hackers, it is important for organizations to spend more on security. Federal agencies are frequently in the market for new security experts, but the salaries paid to those who work for the government frequently have a hard time matching those paid by private groups. According to a recent survey by Piper Jaffray, 75 percent of Chief Information Officers polled said they would increase spending on security in 2015. This can be very difficult for agencies working on fixed budgets, which must balance the cost of security with the need to update and maintain existing infrastructure.  Read More

Defending against cyberattacks continues to be uphill battle for agencies

Posted on January 16, 2015
Category: Cybersecurity

Cybersecurity continues to be a major topic for all federal agencies. Although many agencies have been working on their defensive systems for avoiding the threat of potential criminal or terrorist attacks on their servers, there is still much work to be done. A recent study by the Obama administration has found that most agencies have fallen short of guidelines put in place over recent years, even though these agencies have grown more eco-friendly. For instance, the cybersecurity Coss-agency priority goal was 95 percent for continuous monitoring, and agencies only managed to achieve 92 percent. Government cloud services could specifically use strong monitoring software in order to make sure that they are not hit by the various types of attacks that frequently can damage or take information from government-run offices.  Read More

photo

Staying Secure in an Always Connected World

Posted on March 20, 2017 0 comments
Category: Internet of Things

Feds bring the constantly connected mindset from their personal lives, to work, along with new expectations. For example, the ability to take and share a photo instantly. Instant messaging. Social collaboration. And access to information – all needed/desired information – anywhere, anytime.  Read More

photo

The DCOI Journey: Simplifying Your Data Center

Posted on February 07, 2017 0 comments
Category: Data Center

Last week, the House of Representatives passed the “Energy Efficient Government Technology Act,” which will place energy efficiency standards on Federal data centers and require OMB to collaborate with agencies on plans to purchase and use energy efficient data center technologies.  Read More

photo

Investment in quality technology is aiding governments improve transparency

Posted on September 01, 2016 0 comments
Category: Technology

This past week, the town of Gallipolis, Ohio, made its financial records available to the public, the Gallipolis Daily Tribune reported. While this probably wasn't the biggest news story of 2016, it is reflective of an exciting state, and nationwide, trend.  Read More

photo

How vulnerable are US voting machines to foreign hackers?

Posted on August 10, 2016 0 comments
Category: Cybersecurity

The recent hack of Democratic National Committee computers, attributed by authorities to Russia, has many Americans worried about foreign influence swaying the upcoming presidential election.  Read More

photo

Data mapping is changing government

Posted on June 29, 2016 0 comments
Category: Data Center

Geographical information systems are evolving and so are the governments that are using them.  Read More

photo

What can artificial intelligence do for the government?

Posted on June 08, 2016 0 comments

Artificial Intelligence programs are completely changing how people view computers. Once lifeless machines, AI systems are allowing for computers to analyze information in ways once thought impossible. Such a revolutionary trend has many implications, especially within government. With that in mind, what can the modern agency get out of AI deployment?  Read More

« Previous1234567...29Next »