Technically Speaking - 8/5
This week in Technically News: Striking The Right Balance Between BYOD & Security; Q&A: HHS CTO Bryan Sivak On Disrupting Government Culture; Big Data – Big Exposure. What Can You Do About It; NIST Cybersecurity Center Moves Into High Gear; Do We Need a US Department of Technology; Virtualization Has Changed Disaster Recovery: 15 Data Points.
Technically News - 7/8
This week in Technically News: Google Adds BYOD Management Tools for Android; 4 Government Programs that Drive Innovation; CIA, NSA See Benefits in Double-Barreled Approach to the Cloud; Top 10 Virtualization Killers; Can State & Local Govs Benefit From the US Commerce Department’s Cybersecurity Program; Oracle Launches Database 12c for Clouds.
Technically Speaking - 4/8
In this week's Technically News: Federal Data Center Consolidation Changes Approach; BYOD: An Issue for the Army; Government CIOs Need Line-of-Sight Authority; Everyone Has a Role in Cybersecurity; Phone-DOS Attacks Target Government Offices.
Technically News - 4/1
In this week's Technically News: Veterans Affairs Tables BYOD Plans; U.S. CIO Wants IT-as-a-Service; How to Succeed Under LPTA; Congress Wants to Ban Government IT Purchases from China; The Seven Responsibilities of Agency CISOs. And in DLT Monthly News Roundup: DLT Increases Revenue by 16% in 2012; DLT Solutions Wins Air Force Contract Worth up to $23.2M.
Technically News – 3/11
In this edition: Symantec CTO: Enterprise Security Still Needs Humans; As Data Centers Consolidate, Those Remaining Need to be More Efficient; Complexity is Cybersecurity’s Real Enemy; Cybersecurity Challenges in 2013; GitHub Hires First Government Liaison.
Technically News – 2/18
In this edition: Cloud Superstars Have Their Heads in the Cloud; Why You Should Pay for Open Source Software; Identity Management Is Complicated; Converged Infrastructure is the Future of Data Centers; Red Hat’s Jim Whitehurst Looks 20 Years Into the Future; 12 IT Predictions from the Federal Government.
Technically News – 2/11
In this edition: DLT Solutions Adds AWS GovCloud To Its Cloud Services; NIST Wants Your Advice on Cybersecurity Document; Red Hat Embraces BYOD; Steps for Protecting Your Data Center After Virtualization; State of the Union to Discuss Cybersecurity.
Mobile Malware is the New PC Malware
In 2004, Cabir became the first mobile-based worm, infecting Symbian-based devices including old Samsung and Nokia models. Although it was developed as a proof-of-concept, within a year Cabir helped spawn mobile malware including the first mobile Trojan (Qdial) and mobile application hack (Skulls). Today, explosion of smartphones and tablets has spawned an entirely new hacking industry – one that has the potential to bypass your current cybersecurity strategies if you have not included mobile protection.
GovDefenders Wednesdays: Cybersecurity Starts at the Bottom of the Totem Pole
One of the most frequently misused quotes references the bottom of the totem pole. Many people associate it with negativity - “I’m stuck at the bottom of the totem pole.” However, the bottom is one of the places you wanted to be because it was one of the most honorable positions. It was those at the bottom who everyone relied on to hold society up. Cybersecurity is no different. Those at the bottom now must help hold those at the top.
Why Can’t Enterprise IT Be More Like Consumer IT?
Much of the technology pundi-sphere has been burbling about the creation of shadow IT, cloud democratizing IT, the rise of bring-your-own-device (BYOD), and all sorts of anti-enterprise IT buzz to the point that I've even blogged about it before.