Posts By Matthew Garlipp

Challenges in Cooking Ham & Training Govies

Delicious smells permeate the kitchen as a daughter watches her mother cook a Thanksgiving ham. She’s intrigued by her mother’s process, especially as she cuts off both ends of the ham before placing it in the oven. “Why do you cut off both ends before putting the ham in the oven, mom?” the girls asks.Read… Read more »

Crafting Holistic Insider Threat Protection

The following interview with Prem Jadhwani, Chief Technology Officer of Government Acquisitions, Inc, is an excerpt from our recent guide, Securing Government: Lessons from the Cyber Frontlines. In this guide, we review five tactics government organizations are using to enhance their cybersecurity. In addition to risking national security, insider threats are a serious vulnerability to intellectual property and classified information.Read… Read more »

The Tech Loop: Cannon Ball!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, IoT, cybersecurity, and big data  & analytics. Cloud My understanding is a little foggy. Having trouble separating cloud fact from fiction? This resource should help. Lack of understanding may be aRead… Read more »

Say What? Congress Works Together for Cyber

Everyday, cyberthreats are growing in number and sophistication. As each new exploit is exposed, it leads one to wonder what else is vulnerable in the federal government’s vast network architecture. And with limited resources and trained personnel, it is increasingly difficult for government to keep up with the advanced capabilities of cyber adversaries. In response,Read… Read more »

Talking TECH: A Fresh Take on Cybersecurity

The state of cybersecurity is constantly evolving and growing in sophistication. Shouldn’t discussions about it be similarly innovative? If you’re looking for something different in your cybersecurity education and some fresh voices outside of the tech echo chamber, then you’ll be excited to learn about the 2015 Symantec Government Symposium – Secure Government: Manage, Mitigate,Read… Read more »

The Tech Loop: Harder. Better. Faster. Stronger.

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include big data & analytics, cybersecurity, GIS, cloud, and IoT. Big Data & Analytics Oops, NIST did it again. Except in a good way. Following the wide and growing use of the NationalRead… Read more »

The Tech Loop: Fast & Furiously Data-Driven

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cybersecurity, big data & analytics, and cloud. Cybersecurity Sound the alarm! Or “pound the alarm,” as Nicki Minaj would say. In an executive order signed this week, President Obama declared foreign cyberthreatsRead… Read more »

Cyberspace: Asset or Liability?

Cyberthreats are a national emergency. That’s what President Obama declared in an executive order signed yesterday, that also authorized the levying of targeted sanctions against individuals or groups involved in malicious cyber activities aimed at the U.S. With this most recent action to address the growing cybersecurity challenge, it was especially timely to hear fromRead… Read more »

The Tech Loop: Hot Damn!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, GIS, cybersecurity, big data, and IoT. Cloud A cloud of doubt? According to Gartner, Inc., CIOs remain hesitant to consider cloud computing as a first-line option for IT projects. Most areRead… Read more »

Look Before You Leap: Tips on Creating a Big Data Plan

Today, there is an unprecedented amount of data being generated from countless sources. Some areas of government are producing one petabyte of data per day. Yes, daily. The ability to store massive amounts of data relatively cheaply permits organizations to ingest this information and extract value and insight previously unimaginable. But before your agency startsRead… Read more »