Yearly Archives: 2012

The Four Rules of Media and Layers

These four rules help government agencies plan for social campaigns, because they force us to answer key questions about our audience, our message, the tools at our disposal, and the resources available to us–the four constant variables in every activity that includes a social layer. The Goal of a more Participatory Government I’ve been thinkingRead… Read more »

Estonia as a Cyber Trafalgar

On Wednesday, May 23, Jason Healey, moderator for the Atlantic Council’s “Building a Secure Cyber Future: Attacks on Estonia, Five Years On,” reminded us that for all the talk of emergent threats and new technology, cybersecurity has a history that’s worth remembering and learning from. While the Navy still studies the Battle of Trafalgar fromRead… Read more »

How Do You Retain Security With BYOD?

Mobile devices and applications have become an essential component of the modern workplace. On a daily basis, mobile devices are being integrated into the work environment. Across government, agencies are now exploring ways to implement bring-your-own-device policies, with the hopes that by allowing people to work on the platform they choose, agencies will be ableRead… Read more »

GovBytes: Run-of-the-mill malware still poses huge cybersecurity threat

As of late, we’ve all heard of the threat of new, advanced, nation-state sponsored viruses like Stuxnet and Flame. But it’s important not to forget the risk posed by run-of-the-mill malware to our machines and personal information. McAfee’s latest threat report suggest that this year is shaping up to be one of increased risk online,Read… Read more »

How one feds is making inroads on nuclear proliferation and is big data a fad or something more?

On today’s DorobekINSIDER We often talk about the challenges of government work — and one of the real challenges is measuring results. Today, we’re going to introduce you to somebody who works on one of the most challenging issues — nuclear proliferation. That work has made her a finalist for the Service to America MedalsRead… Read more »

Confusion Surrounding Social Media Monitoring

Here are some verbatim responses I often get when asking clients the following question: “Have you ever monitored social media while at work?” “social media monitoring is not our responsibility, it’s done by the [comms/web/IT] people]” “we have a social media monitoring tool gathering info for us” “we already do media monitoring” “our [branch/department/organization] doesn’tRead… Read more »

Avoiding Business Development Budgeting Pitfalls and Proposal Cost Cutting Blunders

As a proposal manager getting a proposal plan approved, I always found it difficult to get my management to approve a budget that was based on 40-hour weeks for employees and 50, 60, or even 70-hour weeks for consultants. It just didn’t look good: a consultant often cost more per hour than an employee, andRead… Read more »

Connery got the job done at the 2010 Nuclear Security Summit

In post 9/11 world, securing nuclear materials and safeguarding them from non-governmental actors is as important as ever. In 2010, President Obama hosted 50 world leaders in Washington, DC at the Nuclear Security Summit. The gathering was the largest of world leaders since the creation of the United Nations in 1945. Joyce Connery, the currentRead… Read more »

DorobekINSIDER: 7 stories you need to know: Another year of federal pay freezes?

The SEVEN stories that impact your life for Thursday the 7th of June, 2012 A House spending panel has approved a bill that would freeze pay for another year. The Federal Times says the financial services and general government appropriations bill is now headed to the full House Appropriations Committee, where it is expected toRead… Read more »