Posts Tagged: Information

The Anatomy of a “Sniper” Hack

In war, there is quite a difference between the crude methods of indiscriminate destruction of weapons of mass destruction and a well trained sniper on a well-funded, precisely planned mission. WMDs leave mess everywhere, make it clear to everyone something big happened and are more about fear than accomplishing specific goals. In cyber war, the… Read more »

The Weakest Link & What To Do About Them

A chain is no stronger than its weakest link, and life is after all a chain. William James To information security professionals, having a strong chain of policy, practice and architecture is indeed, life. The human factor is always the weakest link in any information security program. Why is that? People are our greatest asset!… Read more »

Opening Up the Fiscal Blinds – Data Act Mandates Transparency

Do you know where your money is being spent in the government? Now you will. Legislation mandating detailed reporting on federal spending passed the House Monday and is heading for President Obama’s signature. The Digital Accountability and Transparency Act —also called the DATA Act —would expand agency transparency requirements to include spending data for all… Read more »

Step-by-Step Guide to Getting Started With Security Governance

Article Posted on behalf of Vo Ballard of Cask, LLC. – If the word ‘governance’ sounds like a high level concept that is only applicable to high level managers, chances are you may be missing the cornerstone of a framework that guides and directs the why and how your organization conducts business. If you think… Read more »

Robert Greeves 2014 Recipient of IJIS Institute Robert P. Shumate Award

For Immediate Release Robert Greeves 2014 Recipient of IJIS Institute Robert P. Shumate Award Institute honors Greeves for contributions to information sharing Ashburn, VA (January 22, 2014). The IJIS Institute—a nonprofit organization that focuses on mission-critical information sharing and safeguarding for justice, public safety, and homeland security—is pleased to announce Robert Greeves, as the recipient… Read more »

The 4-1-1 to IPv6

Republished from Mary Davie’s blog, Great Government through Technology Internet Protocol Version 6 (IPv6) year-end FY14 deadlines are fast approaching for the federal government. If you haven’t started, now is a good time to consider how far we’ve come and what we have left to do to complete IPv6 transition. The CIO Council’s IPv6 guidance… Read more »

IJIS Institute Publishes Final Report from Procurement Innovation Task Force

Task force focused on the technology procurement process as it applies to the state and local government sector Ashburn, VA (January 7, 2014). The IJIS Institute—a nonprofit organization that focuses on mission-critical information sharing for justice, public safety, and homeland security—is pleased to announce the report entitled, Strategies for Procurement Innovation and Reform. The report,… Read more »

Thwarting Cyber Threats with Advanced Secure KVM and KM Technology

One of the most under-utilized preventative measures for thwarting cyber attacks is KVM (keyboard/video/mouse) switching devices. These devices allow employees in any type of business to securely switch between networks with various security levels from one desktop location. Advanced Secure KVM Switches offer superior security and data cyber threat protection by providing true data path… Read more »

Bryan Sivak Issues Call for Health IT Innovators

The Department of Health and Human Services has partnered with health information technology not-for-profit organization Healthcare Information and Management Systems Society to search for a candidate to help develop future advances in healthcare IT. HHS and HIMSS are looking for an Innovator In Residence that will work to create framework for patient data matching as… Read more »