Blog search

Archive: December 2020

M-19-21 Memorandum and What It Is

Posted on December 09, 2020

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More


A new report released by application security firm Veracode revealed this week that practically every industry failed to meetsector-specific standard security testing of Web and mobile applications being used for business processes. However, government agencies did the worst on the tests by far, with less than one-quarter of applications passing. The next worst performing industry was retail and hospitality, with 30 percent of applications in compliance with regulatory standards.  Read More


In recent years the general public has seen many things that were once considered far-fetched or within the realm of fiction become reality, especially where cybersecurity is concerned. One such case is that of the increasing use of facial recognition software. Once thought to exist purely within the world of James Bond or other super spies, facial recognition software is becoming a widely used tool to help fight against fraud and cybercrime. Now the government is making facial recognition a main component in its efforts to reduce identity theft, illegal immigration and terrorism.  Read More


Malware found in hotels holding Iranian nuclear talks

Posted on June 15, 2015 0 comments
Category: Cybersecurity

Recent talks concerning the Iranian nuclear program appear to have hit a snag, but this time it wasn’t due to politics. Negotiations regarding the program were held in three European hotels in late May, all of which have now been identified as victims of a new cyber espionage tool known as Duqu 2.0.  Read More


Technology has been responsible for a variety of innovations in health care, but one of the most impactful has been electronic health records. With EHR, patients don’t have to continuously fill out medical information forms when they’re at the doctor because their health data is available through hospital databases to any doctor that needs it.  Read More


As people enjoyed the warmth of summer weather this week, it was revealed that cybercriminals were also turning up the heat by successfully infiltrating federal networks and compromising government employee data. The Obama administration announced in early June that one of the largest breaches of federal employee information had been carried out, with at least 4 million current and former workers impacted. Officials investigating the breach believe the attack originated with malicious actors in China.  Read More

Mobile applications or responsive websites?

Posted on June 01, 2015 0 comments

Recent years have seen rapid changes in how everyday net users consume media and handle online matters. Increasingly, they are no longer confined to sitting in front of a computer with the use of just a keyboard and mouse. Smartphones and tablets have improved dramatically in terms usability since mainstream adoption began roughly eight years ago. Statistics from Statista have shown a downward trend for the global shipment of computers and numbers will continue to fall at least until 2017. Even an early 2015 article from Wired magazine predicted in less than two years, the smartphone will most likely be the only computer for a majority of users.  Read More


Recent years have seen a push by federal, state and local governments to become more transparent. This entails governments voluntarily releasing data and documents for the general public to see. Some materials released may be old email exchanges between government officials or data tables looking at residential neighborhoods, according to Government Technology. However, not all publicly released data is considered useful. Information considered helpful can be defined as open data.  Read More


Data center vulnerability a serious matter

Posted on May 26, 2015 0 comments
Category: Data Center

Data centers operated by state and local governments may be at risk due to the discovery of a new security vulnerability. According to ZDNet, the zero-day vulnerability known as Venom may allow attackers to manipulate older technology to get inside the servers located within data centers.  Read More


Cloud computing helps smaller government agencies

Posted on May 21, 2015 0 comments
Category: Cloud Computing

Cloud computing is changing the way government agencies are interacting with the public they serve. Smaller government agencies, especially those in less populated cities and regions, traditionally have smaller budgets and less resources, and that affects the way they are able to provide goods and services for their citizens. Cloud technology, combined with customer resource management software, may be the answer for these smaller governments.  Read More