Archive

Blog search

Archive: April 2016
photo

The landscape of war has dramatically changed over the years. Putting boots on the ground is no longer the only option countries have in terms of subduing enemies, and this fact could make all the difference in the near future. Cyberwar is increasingly becoming a convenient and powerful tool, as it has the potential for disrupting communications, gaining intel and generally ruining a group's day. It should be no surprise that the U.S. as well as other nations are gearing up to use this method as a long-term strategy in accomplishing their goals.  Read More

photo

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

In order to help both private and public sector entities better protect themselves from hackers, malware and other threats, the Obama Administration recently created a new commission to help draft protection guidelines for organizations to follow. Officially dubbed the Commission on Enhancing National Cybersecurity, the non-partisan group features 12 veteran leaders from large enterprises, leading Silicon Valley firms and government agencies. This group is tasked with presenting Congress in December 2016 with tangible steps both public and private organizations can take to bolster cybersecurity and ensure more robust data protection.  Read More

photo

Cloud computing has effectively taken over businesses in virtually every sector over the past few years. For government, the road to virtual platforms has been paved with roadblocks in the forms of security, budget and overall hesitance to change from tried-and-true solutions. Despite these challenges, many federal and local government organizations have adopted the cloud for their operations, and it's making a significant difference. Other agencies that aren't using the cloud are likely to start their journey to these platforms in the near future, and will begin reaping all the benefits the cloud can offer.  Read More

photo

Chatbots may be the next big thing in tech, and the technology could prove enormously beneficial in the public arena. Chatbots, although just known as bots for short, are a form of artificial intelligence, noted Hannah Francis, a Technology Reporter with the Sydney Morning Herald. A bot works by executing a command and formulating a particular response depending on what is typed in as the input.  Read More

photo

In order to help both private companies and public agencies better make sense of publicly-available data, a team of academics and consultants have teamed up to create a tool that visualizes and more effectively displays this information. The tool is called Data USA, and it provides a search engine-like interface to help interested parties learn more about locations, occupations, industries and more. The site also includes pre-made breakdowns to make it easy to determine everything from the highest earning jobs in real estate to the racial breakdown of poverty levels in Flint, Michigan. Data USA is still fairly new, so additional data and pre-made filters will likely continue to be added to it in the coming months and years.  Read More

photo

To help ensure mobile app developers don't run afoul of the law, a consortium of federal agencies recently created a tool that provides helpful guidance on health-related laws and compliance. The Mobile Health Apps Interactive Tool was created as a joint effort between the Federal Trade Commission, the Department of Health and Human Services, the Food and Drug Administration and the Office for Civil Rights. It is a simple, interactive checklist for those developing health-related apps to make sure their program is following various laws like the Health Insurance Portability and Accountability Act.  Read More

photo

The state of government security is drastically shifting to have a larger focus on cyberspace than ever before. Federal organizations deflect threats from malware, ransomware and viruses on a daily basis, but the risks are becoming more dire as time passes. Malicious parties are advancing their tactics as quickly as security firms are upgrading their solutions to fend off threats. This volatile environment is leading to numerous breaches and more determination to protect sensitive information under federal domain.  Read More

photo

As part of a broader effort to boost innovation and reduce costs across the board, the White House recently announced a new initiative that will make the code for all federal government software open sourced and available to everyone. In a late March blog post announcing the initiative, federal CIO Tony Scott said that going forward, all software that is designed or used only by federal agencies must have its source code be freely available. This will enable innovation, he said, by allowing a wider variety of parties to tinker and improve on government software. It also aligns federal government IT efforts more closely with private sector best practices. Plus, it hopefully eliminates the need to have to purchase multiple software licenses for different agencies, helping to streamline costs across the board.  Read More


photo

Staying Secure in an Always Connected World

Posted on January 29, 2021 0 comments
Category: Cyber Security

According to a recent Cisco report, the number of connected devices per person worldwide will rise 50% from 2.4 in 2018 to 3.6 by 2023. And, at the same time – as we all well know - the days of a government employee logging on just during traditional business hours, in one building, on one or two devices, is over. People bring the “constantly connected” mindset from their personal lives, to work. This mindset forms the expectations that they will have the ability to access all the information they require – anywhere, anytime. For government security teams, it’s a love-hate relationship. On the upside, there are huge productivity benefits. And new opportunities for insights with the data collected and shared. But, as the volume and the variety of connected devices increases, so do potential cyber vulnerabilities.  Read More

M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

photo

What Are The Implications of 5G Technology?

Posted on August 26, 2020 0 comments
Category: Cloud Computing

The term 5G simply implies the 5th generation of mobile network technology. And it’s fast, with a theoretical upper limit 10 Gigabits per second. The potential uses for this new technology are just beginning to be understood, possibilities are endless!  Read More

photo

Data Protection Services

Posted on January 15, 2019 0 comments
Category: Cybersecurity

It is more important than ever for organizations to protect their data and address compliance, without disrupting employee and company productivity. With GDPR, the California Privacy Act, and the Data Protection Act of 2018, organizations now have regulations that mandate how their data is secured. Every organization must take a serious look at how they are protecting their data and align their data protection and compliance strategy with government mandates.  Read More

photo

RSA Conference 2019

Posted on January 08, 2019 0 comments
Category: Cybersecurity

As cyber attacks have become an ever present occurrence many agencies are still not prepared to prevent all threats. UNICOM Government together with Dell EMC will be showcasing our joint security solution at RSA 2019 that encompasses network and data center security solutions protect high value data and data center resources with threat defense, highly secure virtualization, segmentation and policy control.  Read More

photo

IT Modernization in the Trump Age

Posted on April 18, 2017 0 comments
Category: Cybersecurity

The Federal government is losing billions of dollars each year funding legacy systems. A report from IDC Government Insights shows that some agencies allocate upwards of 90 percent of their IT budgets to operations and maintenance. And, in a recent MeriTalk article, the Government Accountability Office’s Head Gene Dodaro noted legacy IT systems pose a serious obstacle to cybersecurity best practices. The answer is clear: Modernization.  Read More

« Previous123456...30Next »