Critical Infrastructure: Principles & Activities to Achieve a Strong Cybersecurity Posture
We’ve posted the GovDefenders panel on YouTube. Moderated by DLT Solutions’ Chief Technology Officer Van Ristau, the panel featured Ken Durbin, Continuous Monitoring Practice Manager, Symantec; Paul Christman, Vice President, Dell Software Public Sector; and Wallace Sann, Regional Vice President – Systems Engineering & Federal Chief Technology Officer, ForeScout.
The Next Chapter in Federal Cybersecurity
I recently appeared on a panel for Federal Times at their “The Next Chapter in Federal Cybersecurity: Continuous Monitoring & Identity Access for Secure Networks” breakfast event. I was joined by Deborah Gallagher, Director, Identity Assurance & Trusted Access Division, Office of Governmentwide Policy, GSA and Paul Grant, Strategy Advisor for Cybersecurity, Defense Department, Office of the CIO. We didn’t get through all the questions so I thought I’d continue the conversation here.
If “Fire and Forget” is Part of your FOIA or Legal Hold Playbook, Don’t Aim at your Feet
From time to time, the “fire and forget” strategy applies to managing Freedom of Information Act (FOIA) search requests and litigation holds. When this familiar tactic rears its ugly head, collateral damage can happen to an agency or organization in legal proceedings because FOIA searches can’t be adequately justified or data isn’t properly preserved due to a breakdown in the legal hold process.
A Recap of the World's Largest Health IT Conference
Two weeks ago, I attended the Healthcare Information and Management Systems Society (HIMSS) 2014 Conference and Exhibition at the Orange County Convention Center in Orlando. DLT partners exhibiting were Oracle, Symantec, SolarWinds, Informatica, and NetApp. I visited each of them to find out what they had to say about health IT.
Technically News - 2/21
This week in Technically News: Cybersecurity Framework: What's Next?; How Big Data is Remaking the Government Data Center; Survey Shows Government Pipelines Not Ready for Data-Heavy Projects; Red Hat CEO Addresses Big Data's Chicken-and-Egg Question; Kiss Passwords Goodbye: A Single Sign-On Future Is Within Reach.
How Well Do You Secure Your Virtual Infrastructure?
Virtualization is the fancy, not-so-new-ish technology that everyone wants to deploy right now. But how do we protect such a technology?
The Internet of Hackable Things
The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.
Technically News - 12/9
This week in Technically News: Battling Malware and Madware; Is PaaS the Savior of the Federal Datacenter Consolidation Initiative; Symantec Gets FISMA Certification for Shared Service Products; 7 IT Strategies for 2014; Less Malware Predicted for 2014 But New Tactics Emerge.
Technically News – 10/7
This week in Technically News: Shutdown Heightens Cybersecurity Risks, Feds Warn; Symantec Knocks Half a Million Computers Out of the ZeroAccess Botnet; Budget Worries Grow for Government IT Leaders; Why IT's Economics Revolution Is More Than OpEx and CapEx; Your Fragile Supply Chain: Fatal to Business.
October is Cybersecurity Awareness Month
It’s that time of the year again. The leaves are changing color, the wind is chillier, and Christmas decorations are already out at Target. Today is October 1, and for a decade now that means it’s also the first day of Cybersecurity Awareness Month.