Archive

Blog search

There were no results found. Please try another keyword or phrase.

photo

Malware found in hotels holding Iranian nuclear talks

Posted on June 15, 2015 0 comments
Category: Cybersecurity

Recent talks concerning the Iranian nuclear program appear to have hit a snag, but this time it wasn’t due to politics. Negotiations regarding the program were held in three European hotels in late May, all of which have now been identified as victims of a new cyber espionage tool known as Duqu 2.0.  Read More

photo

Electronic health records improve health care but pose security risk

Posted on June 11, 2015 0 comments
Category: Cybersecurity

Technology has been responsible for a variety of innovations in health care, but one of the most impactful has been electronic health records. With EHR, patients don’t have to continuously fill out medical information forms when they’re at the doctor because their health data is available through hospital databases to any doctor that needs it.  Read More

photo

Largest breach of federal government files carried out by suspected Chinese hackers

Posted on June 09, 2015 0 comments
Category: Cybersecurity

As people enjoyed the warmth of summer weather this week, it was revealed that cybercriminals were also turning up the heat by successfully infiltrating federal networks and compromising government employee data. The Obama administration announced in early June that one of the largest breaches of federal employee information had been carried out, with at least 4 million current and former workers impacted. Officials investigating the breach believe the attack originated with malicious actors in China.  Read More

Mobile applications or responsive websites?

Posted on June 01, 2015 0 comments

Recent years have seen rapid changes in how everyday net users consume media and handle online matters. Increasingly, they are no longer confined to sitting in front of a computer with the use of just a keyboard and mouse. Smartphones and tablets have improved dramatically in terms usability since mainstream adoption began roughly eight years ago. Statistics from Statista have shown a downward trend for the global shipment of computers and numbers will continue to fall at least until 2017. Even an early 2015 article from Wired magazine predicted in less than two years, the smartphone will most likely be the only computer for a majority of users.  Read More

photo

Open data can help improve government services

Posted on May 27, 2015 0 comments

Recent years have seen a push by federal, state and local governments to become more transparent. This entails governments voluntarily releasing data and documents for the general public to see. Some materials released may be old email exchanges between government officials or data tables looking at residential neighborhoods, according to Government Technology. However, not all publicly released data is considered useful. Information considered helpful can be defined as open data.  Read More

photo

Data center vulnerability a serious matter

Posted on May 26, 2015 0 comments
Category: Data Center

Data centers operated by state and local governments may be at risk due to the discovery of a new security vulnerability. According to ZDNet, the zero-day vulnerability known as Venom may allow attackers to manipulate older technology to get inside the servers located within data centers.  Read More

photo

Cloud computing helps smaller government agencies

Posted on May 21, 2015 0 comments
Category: Cloud Computing

Cloud computing is changing the way government agencies are interacting with the public they serve. Smaller government agencies, especially those in less populated cities and regions, traditionally have smaller budgets and less resources, and that affects the way they are able to provide goods and services for their citizens. Cloud technology, combined with customer resource management software, may be the answer for these smaller governments.  Read More

photo

Big data analytics must be used

Posted on May 20, 2015 0 comments
Category: Cloud Computing

Government agencies and organizations across the land use data for a variety of functions. Data sets can give officials a better outlook of certain residential areas based on demographics and income levels. Likewise, businesses utilize big data to discover industry trends and to target consumers on a personalized basis.  Read More

photo

Federal guidelines worth following to strengthen cybersecurity

Posted on May 14, 2015 0 comments
Category: Cybersecurity

Nearly 15 months ago, the National Institute of Standards and Technology released the Cybersecurity Framework. The framework was a collaboration between the federal government and industries to establish guidelines, standards and practices to ensure the protection of critical infrastructure. The collaboration was to help find a cost-effective, yet strong, cybersecurity solution for government agencies.  Read More

photo

Governments should take advantage of hybrid cloud

Posted on May 08, 2015 0 comments
Category: Cloud Computing

Hybrid cloud technologies are becoming more popular as modes of storing and utilizing data in both the private and public sectors. As federal agencies move toward hosting more data in the cloud, many have implemented a hybrid cloud infrastructure that utilizes both private and public cloud environments for different kinds of data. IDC predicted in 2014 that in 2018, spending on public IT cloud services will reach $127 billion, forecasting that these services will account for more than half of the worldwide growth for software, server and storage spending. Federal, state and local government agencies not only need to understand the potential of hybrid cloud technology – they also need to realize benefits so that they can take proper advantage of what hybrid cloud tech has to offer.  Read More