Archive

Blog search

Category: Cybersecurity
photo

A new $1.1 trillion spending package for cybersecurity for federal agencies was passed recently, hopefully giving government groups the tools they need to properly defend their servers from incoming attacks. This spending is going to agencies including the FBI, the Department of Energy and the Department of Defense, according to The Hill. These types of increases in spending are necessary in today’s struggle to keep criminals out of servers. Recent hacking attempts on various retailers have brought the insecurity of typical digital infrastructure to the forefront of the public consciousness, which has lead to a widespread outcry for more safety on the Internet.  Read More

photo

Ashton Carter, Obama’s new lead, has an eye for cybersecurity​, according to the Washington Post. This is good news for all federal agencies, as the threat of cyberterrorism is real and should be recognized as such. With constant attacks upon banks, online retailers and other institutions, it seems like only a matter of time before a major hit happens where it can affect the lives of citizens directly. In order to deal with this problem, cloud computing for government and big data strategies are needed to understand how attacks are getting to various agencies and how to​ stop them. Part of the fundamental difference between how normal attacks work and cyberattacks work is that digital threats are inherently secretive. It may be difficult for a company to know they are under siege unless they are actually damaged, or if an attacker chooses to reveal him or herself.  Read More

This month the Department of Veterans Affairs underwent its annual cybersecurity audit, and for the 16th time in a row, it failed. The audits are conducted in order to ensure that agencies are meeting the standards set forth in the Federal Information Security Management Act.  Read More

photo

It was announced this week that the U.S. State Department was forced to shut down its unclassified email system in order to evaluate damage created by a potential data breach. According to the Associated Press, the email system was shut down in order to make repairs and upgrade security after suspicious activity was detected on the system recently.  Read More

photo

The Department of Homeland Security announced in early November that a Trojan horse malware program has been installed within the system that operates the majority of the country’s critical infrastructure. Were such a program to succeed in shutting down the system, it could cause economic chaos. Officials with DHS believe the malicious software was installed by hackers sponsored by the Russian government, ABC News reported.  Read More

photo

In late October, the Food and Drug Administration released guidelines for medical device manufacturers to follow in regards to cybersecurity. According to agency spokeswoman Jennifer Rodriguez, the information was provided in an effort to specify what exactly is expected of device manufacturers when it comes to security.  Read More

No one is denying that the U.S. is currently facing major cyberthreats, but according to the head of the National Security Agency, many don’t realize the obstacles in the country’s way to protect against cybercrime. In a speech at Stanford University in early November, NSA director and commander of U.S. Cyber Command Admiral Mike Rogers noted that the intelligence community has been tasked with overcoming multiple hurdles, including responding the concerns of data privacy and the inability to lure skilled security professionals to work for the government with high salaries.  Read More

photo

Researchers at Google recently uncovered a major flaw in the SSLv3 encryption protocol. The vulnerability is nicknamed Poodle – an acronym for Padding Oracle on Downgraded Legacy Encryption – and attacks exploiting it rely in large part on the ability to force target browsers to fall back to the legacy protocol. The browsers inherently include weaknesses that hackers can take advantage of to access encrypted information.  Read More

« Previous 1234 Next »

photo

An organization’s ability to adapt to change is key to ensuring they stay focused on achieving mission success. With an ever-changing technology landscape, having a strategy that can quickly adjust, and grow with your organization’s needs, is essential. The government has many options when it comes to acquiring technologies and services required to satisfy mission goals. Avoid costly upfront purchase costs and clearly understand our total cost of ownership from the beginning.  Read More

photo

In a World of Ever Growing Servers; What Is Serverless?

Posted on June 24, 2021 0 comments
Category: Data Center

Serverless computing is the logical conclusion of virtualization, separating where code is run from what the code is running on. Using conventional architecture increasing scalability requires ever increasing complexity and capacity, often driving costs at an exponential rate. Serverless allows scaling to the limit that you set, with costs growing at a linear rate. A system that supports a million users requires the same level of effort as an application intended only for a dozen.  Read More

Why Federal IT Modernization is a Big Deal

Posted on April 08, 2021 0 comments
Category: Technology

Businesses across all industries have been traditionally reluctant to migrate to new technologies and processes while leaving behind their tried-and-true practices. Sectors that are heavily regulated are even harder to sell on modernizing their hardware and software infrastructures due to the amount of considerations and challenges that can be introduced. It's no surprise, then, that the federal government has been slow to upgrade and is still gradually making changes to its IT portfolio.  Read More

photo

Staying Secure in an Always Connected World

Posted on January 29, 2021 0 comments
Category: Cyber Security

According to a recent Cisco report, the number of connected devices per person worldwide will rise 50% from 2.4 in 2018 to 3.6 by 2023. And, at the same time – as we all well know - the days of a government employee logging on just during traditional business hours, in one building, on one or two devices, is over. People bring the “constantly connected” mindset from their personal lives, to work. This mindset forms the expectations that they will have the ability to access all the information they require – anywhere, anytime. For government security teams, it’s a love-hate relationship. On the upside, there are huge productivity benefits. And new opportunities for insights with the data collected and shared. But, as the volume and the variety of connected devices increases, so do potential cyber vulnerabilities.  Read More

M-19-21 Memorandum and What It Is

Posted on December 09, 2020 0 comments

The M-19-21 memorandum mandates that all records are created, converted and transferred to the National Archives and Records Administration (NARA) in electronic format by end of 2022. The need, however, does not make the reality any easier to embrace.  Agencies must both find a way to convert legacy records from paper to digital, and put in place processes that ensure all records going forward are created digitally.  Working with constrained budgets, needing to educate personnel, having to develop new processes and choosing the appropriate technology, all contribute to the complexity of achieving this goal by the established deadline.   Read More

It is said that data runs today's world, and we could argue that it is not an exaggerated statement. From important business decisions to process optimization, everything today is data driven. Data has become a necessity of life. Everyone is pursuing increasing volumes of data, but very few understand that this quest for more data must be closely tied to effective, state-of-the-art datacenters. With the growing demand for data, there needs to be an underlying infrastructure that can host queries, process inputs, and feed relevant information, on pace with modern needs. Prevalent IT infrastructures are insufficient; therefore, to make sure that super-fast data communication is done with negligible latency, the establishment of hyper-converged infrastructure is inevitable.  Read More

photo

How Secure Is Your Server Hardware?

Posted on October 13, 2020 0 comments
Category: Cloud Computing

Security is always evolving and what worked yesterday will not necessarily work today. Security goes far beyond protecting software and networks. Securing your hardware is often overlooked and can have some costly implications, if it becomes compromised. Relying solely on firewalls to secure the infrastructure is bound to end in disaster.  Read More

« Previous123456...31Next »