Archive

Blog search

Category: Cybersecurity
photo

Cybersecurity has been front of mind for the government for as long there have been hackable systems, but the Office of Personnel Management breach that took place in early 2015 was a wakeup call unlike any other. The data of some 21 million government workers was stolen as a result of the breach, including biometric information of an estimated 5 million people. It was a ground-breaking incident, and it left a bad taste in the mouths of the victims and government IT leaders alike.  Read More

photo

Federal IT infrastructure is due for an overhaul, and by most measures, it would appear that U.S. IT leaders are doing what they can to make this happen. A bevy of policies such as the cloud-first initiative and the Federal Information Technology Acquisitions Reform Act have been implemented over the last five years in an effort to enhance federal IT services. Furthermore, the Government Accountability Office has continued to prod federal agencies to implement more efficient IT infrastructure. A recent example comes in the form the November 2015 FITARA scorecard. By and large, the scores were below average among agencies, but the fact that GAO continues to monitor the progress of these agencies is a sign that government technology services are becoming a priority.  Read More

photo

In today's technology-dependent world, it's important to be aware of cybersecurity measures and incidents so that systems have less chance of being compromised. Following the massive data breach experienced by the Office of Personnel Management and the Russian attack on the Pentagon's email system, it's more crucial than ever to ensure that government organizations are taking measures to protect themselves against these types of events. It's also integral that they remain educated about their roles and responsibilities when it comes to keeping the public's data safe.  Read More

photo

Cybersecurity continues to be a concern for businesses in the public and private sectors. Universities across the nation are reporting more cyberattacks have breached their technological defenses, sometimes resulting in stolen data and fraudulent access to student emails, along with disruptions in Internet service or capabilities.  Read More

photo

These days, it seems like data breaches are the norm. For government organizations, there have been several major events, including a hack last month at the Office of Personnel Management that compromised personal data for more than 22 million Americans. There have also been recent reports that the email accounts of top U.S. officials have been intercepted for the past five years by Chinese cyber spies. In the wake of these attacks, new legislation has been offered to boost government cybersecurity.  Read More

photo

Recent hacks against retail giants like Target and government organizations like the U.S. Office of Personnel Management have thrown a stark light on the effects of not protecting vital citizen and government data. Hackers are getting smarter, and government agencies especially have a duty to the public they serve to make sure confidential data stays out of the hands of malicious actors. To this end, big data analytics play an important role in how government organizations can learn how to address these issues.  Read More

photo

For federal, state and local government organizations, cybersecurity is a growing concern. High-profile hacks and breaches of government data are on the rise, indicating a need for stronger defenses and better education when it comes to keeping their data safe. For instance, at the beginning of June, the Social Security numbers and other confidential information was stolen from the Office of Personnel Management. According to The New York Times, 21.5 million federal employees were affected by the hack, making it the largest cyberattack into internal federal systems.  Read More

photo

Government organizations of all levels are making the shift to virtualized desktop environments, with federal agencies leading the way. The Joint Staff at the Pentagon made the effort to convert to a virtualized desktop model in 2014, and the U.S. Army is now making that switch, according to Federal Times. There are distinct advantages of government virtualization. Here is a quick guide.  Read More

photo

In the last few weeks, whenever someone mentions the government, it has probably been in relation to cybersecurity. While things haven’t been looking very good in the wake of a data breach affecting millions of employee records stored by the Office of Personnel Management, federal CIOs are trying to change the tune. Many agencies have been trying to improve their cybersecurity efforts for some time now, but outdated requirements and insufficient funding have hampered their attempts. Now, however, change is coming as the deadline to implement the Federal IT Acquisition Reform Act draws near.  Read More

photo

A new report released by application security firm Veracode revealed this week that practically every industry failed to meetsector-specific standard security testing of Web and mobile applications being used for business processes. However, government agencies did the worst on the tests by far, with less than one-quarter of applications passing. The next worst performing industry was retail and hospitality, with 30 percent of applications in compliance with regulatory standards.  Read More

photo

In recent years the general public has seen many things that were once considered far-fetched or within the realm of fiction become reality, especially where cybersecurity is concerned. One such case is that of the increasing use of facial recognition software. Once thought to exist purely within the world of James Bond or other super spies, facial recognition software is becoming a widely used tool to help fight against fraud and cybercrime. Now the government is making facial recognition a main component in its efforts to reduce identity theft, illegal immigration and terrorism.  Read More

photo

Recent talks concerning the Iranian nuclear program appear to have hit a snag, but this time it wasn’t due to politics. Negotiations regarding the program were held in three European hotels in late May, all of which have now been identified as victims of a new cyber espionage tool known as Duqu 2.0.  Read More

photo

Technology has been responsible for a variety of innovations in health care, but one of the most impactful has been electronic health records. With EHR, patients don’t have to continuously fill out medical information forms when they’re at the doctor because their health data is available through hospital databases to any doctor that needs it.  Read More

photo

As people enjoyed the warmth of summer weather this week, it was revealed that cybercriminals were also turning up the heat by successfully infiltrating federal networks and compromising government employee data. The Obama administration announced in early June that one of the largest breaches of federal employee information had been carried out, with at least 4 million current and former workers impacted. Officials investigating the breach believe the attack originated with malicious actors in China.  Read More

photo

Nearly 15 months ago, the National Institute of Standards and Technology released the Cybersecurity Framework. The framework was a collaboration between the federal government and industries to establish guidelines, standards and practices to ensure the protection of critical infrastructure. The collaboration was to help find a cost-effective, yet strong, cybersecurity solution for government agencies.  Read More

photo

Support for Microsoft’s Windows XP officially ended April 8, 2014, though security updates for Windows Server 2003 will still be provided until July 2015. These updates will help IT departments keep systems secure while migrating towards new servers and a new operating system.  Read More

photo

The world’s leading operating system and a popular software program were recently found to have serious security flaws, enabling foreign hackers to breach U.S. State Department and White House computers and spy on foreign diplomats. Unclassified, but sensitive data was stolen from White House computers in particular.  Read More

photo

In recent years, the use of big data in government has increased despite growing concerns about cybersecurity. According to Josh Helms, a fellow with the IBM Center for The Business of Government, a growing number of agencies have had success in adopting big data to perform tasks and better serve the populace. For example, the Food and Drug Administration is using big data to analyze and study patterns in foodborne illness; this database helps the FDA respond more quickly when issuing recalls for contaminated foods. With the uptick in government use of big data, now more than ever it is important to ensure interoperability across data sources, organizations and domains.  Read More


photo

An organization’s ability to adapt to change is key to ensuring they stay focused on achieving mission success. With an ever-changing technology landscape, having a strategy that can quickly adjust, and grow with your organization’s needs, is essential. The government has many options when it comes to acquiring technologies and services required to satisfy mission goals. Avoid costly upfront purchase costs and clearly understand our total cost of ownership from the beginning.  Read More

photo

In a World of Ever Growing Servers; What Is Serverless?

Posted on June 24, 2021 0 comments
Category: Data Center

Serverless computing is the logical conclusion of virtualization, separating where code is run from what the code is running on. Using conventional architecture increasing scalability requires ever increasing complexity and capacity, often driving costs at an exponential rate. Serverless allows scaling to the limit that you set, with costs growing at a linear rate. A system that supports a million users requires the same level of effort as an application intended only for a dozen.  Read More

Why Federal IT Modernization is a Big Deal

Posted on April 08, 2021 0 comments
Category: Technology

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

Staying Secure in an Always Connected World

Posted on January 29, 2021 0 comments
Category: Cyber Security

According to a recent Cisco report, the number of connected devices per person worldwide will rise 50% from 2.4 in 2018 to 3.6 by 2023. And, at the same time – as we all well know - the days of a government employee logging on just during traditional business hours, in one building, on one or two devices, is over. People bring the “constantly connected” mindset from their personal lives, to work. This mindset forms the expectations that they will have the ability to access all the information they require – anywhere, anytime. For government security teams, it’s a love-hate relationship. On the upside, there are huge productivity benefits. And new opportunities for insights with the data collected and shared. But, as the volume and the variety of connected devices increases, so do potential cyber vulnerabilities.  Read More

M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

« Previous123456...31Next »