Archive

Blog search

Archive: February 2016
photo

The movement of large portions of life to a more digital space has spawned a huge influx in data collection. Government agencies and private businesses alike are gathering massive amounts of information in a trend that has been dubbed big data. And yet, many of these organizations are struggling under the weight of all this raw data.  Read More

photo

The state of cyberwar

Posted on February 26, 2016
Category: Cybersecurity

As the Internet and similar technologies began to creep further into government operations, hacking became the go-to method for collecting intelligence about foreign entities. It was a lot easier than sending in a spy to figure out what other countries were up to, and it didn't involve risking anyone's life to do so. However, recent developments into what a country can do with a cyberattack have shown warfare itself might see a major overhaul due to the digital revolution.  Read More

photo

For years, the only place to actually get work done was in the office. An employee could expect to be able to get a certain amount of their duties done at home, but this was a rare occurrence and certainly didn't pertain to a full-day's work. Advancements in technology have changed this, with more organizations beginning to allow employees to complete tasks outside the office.  Read More

photo

A cyberattack on a private institution that works with U.S. intelligence agencies has revealed yet another flaw in how many government officials view cybersecurity. The hack of Juniper Networks, which was announced Dec. 17, 2015, has resulted in a data breach that could contain encrypted correspondence of government agencies spanning more than three years.  Read More

photo

Government bloated by data storage needs

Posted on February 18, 2016
Category: Data Center

It's no secret the government has been having trouble with its data storage. Collecting information on a national scale is incredibly daunting, but putting that data to good use has proven to be quite the challenge. Sorting through big data has massive potential, but current data center administrators simply can't spend time analyzing this information.  Read More

photo

Yet another cyberattack has befallen the American government. This time, the Department of Justice was the main target of the hackers, who got away with the information of nearly 20,000 DoJ employees, according to The Guardian. What's more, the cybercriminals also gained access to data on roughly 9,000 employees of the Department of Homeland Security, posting the information on an encrypted website that The Guardian then investigated.  Read More

photo

The state of Massachusetts is taking an interesting step into the digital world with an announcement that legislators are considering making body cameras a required piece of equipment for all police officers. Local news organization WWLP reported that Massachusetts law makers within the Committee on Public Safety are looking into a bill that would make this technology mandatory.  Read More

photo

In the wake of the infamous Office of Personnel Management data breach, government cybersecurity has arguably trumped every other concern when it comes to government technology services. Cloud computing and data center consolidation have both had their fair share of time in the spotlight in the past few months, but securing the immense quantity of sensitive data the federal agencies possess is still a top priority for government IT leaders. As such, feds have taken several key steps recently that underscore the importance of government cybersecurity.  Read More


photo

Government organizations of all levels are making the shift to virtualized desktop environments, with federal agencies leading the way. The Joint Staff at the Pentagon made the effort to convert to a virtualized desktop model in 2014, and the U.S. Army is now making that switch, according to Federal Times. There are distinct advantages of government virtualization. Here is a quick guide.  Read More

photo

Interdepartmental data sharing is one way to improve relationships within government agencies and, as a result, positively impact community relations down the road. Proper government data management is crucial to maintaining many federal, state and local systems and to bolstering communities affected by these agencies. Big data and open data work together to strengthen communications between departments and thus give agencies the information they need to best serve the public.  Read More

photo

In the last few weeks, whenever someone mentions the government, it has probably been in relation to cybersecurity. While things haven’t been looking very good in the wake of a data breach affecting millions of employee records stored by the Office of Personnel Management, federal CIOs are trying to change the tune. Many agencies have been trying to improve their cybersecurity efforts for some time now, but outdated requirements and insufficient funding have hampered their attempts. Now, however, change is coming as the deadline to implement the Federal IT Acquisition Reform Act draws near.  Read More

photo

A new report released by application security firm Veracode revealed this week that practically every industry failed to meetsector-specific standard security testing of Web and mobile applications being used for business processes. However, government agencies did the worst on the tests by far, with less than one-quarter of applications passing. The next worst performing industry was retail and hospitality, with 30 percent of applications in compliance with regulatory standards.  Read More

photo

In recent years the general public has seen many things that were once considered far-fetched or within the realm of fiction become reality, especially where cybersecurity is concerned. One such case is that of the increasing use of facial recognition software. Once thought to exist purely within the world of James Bond or other super spies, facial recognition software is becoming a widely used tool to help fight against fraud and cybercrime. Now the government is making facial recognition a main component in its efforts to reduce identity theft, illegal immigration and terrorism.  Read More

photo

Recent talks concerning the Iranian nuclear program appear to have hit a snag, but this time it wasn’t due to politics. Negotiations regarding the program were held in three European hotels in late May, all of which have now been identified as victims of a new cyber espionage tool known as Duqu 2.0.  Read More

photo

Technology has been responsible for a variety of innovations in health care, but one of the most impactful has been electronic health records. With EHR, patients don’t have to continuously fill out medical information forms when they’re at the doctor because their health data is available through hospital databases to any doctor that needs it.  Read More

photo

As people enjoyed the warmth of summer weather this week, it was revealed that cybercriminals were also turning up the heat by successfully infiltrating federal networks and compromising government employee data. The Obama administration announced in early June that one of the largest breaches of federal employee information had been carried out, with at least 4 million current and former workers impacted. Officials investigating the breach believe the attack originated with malicious actors in China.  Read More

Recent years have seen rapid changes in how everyday net users consume media and handle online matters. Increasingly, they are no longer confined to sitting in front of a computer with the use of just a keyboard and mouse. Smartphones and tablets have improved dramatically in terms usability since mainstream adoption began roughly eight years ago. Statistics from Statista have shown a downward trend for the global shipment of computers and numbers will continue to fall at least until 2017. Even an early 2015 article from Wired magazine predicted in less than two years, the smartphone will most likely be the only computer for a majority of users.  Read More