Cybersecurity

A New Way To Run For Office – The Open Sourced Way

The definition of, of insanity is trying the same thing over and over again and expecting different results. So that begs the question is there a better way to create a political platform? David Cole is a 28 year old software developer who spent 2 years working at the White House as a Deputy DirectorRead… Read more »

Protecting Against Fraud

By Marci Carris Bad actors have been known to target wireless customers as well as banking and credit card customers. That’s why it’s important that you educate yourself about typical tactics fraudsters use and know how to avoid being a victim. Fraudsters may call, text or email you falsely representing themselves as official representative ofRead… Read more »

Security in the Post-Snowden World – Plus Your 7 Gov Stories

On GovLoop Insights’ DorobekINSIDER: The federal IT landscape is shifting. Now more than ever, contractors and the federal government alike are looking to buy and sell government services, not hardware. Think cloud computing over data centers. But the shift is causing some problems, because the federal procurement system simply isn’t set up to handle thoseRead… Read more »

How To Get Women In The Contracting Game

Women owned small businesses make up less than 5% of the federal procurements, but the federal government is trying to make a change. They have created requirements and set-asides to help women-owned businesses enter into federal contracts. The Small Business Administration and American Express Open have also teamed up to help get the word outRead… Read more »

Howard County, Md., Launches CISO in Residence Program – Find Out Why

Howard County, Maryland’s Center for Entrepreneurship and the Howard Tech Council have teamed up to launch a new Chief Information Security Office In Residence program, they are calling it HoCo CISO. The idea is simple, the HoCo CISO gives Howard Tech Council members, the opportunity to receive security consulting advice and resources from trained securityRead… Read more »

A New Era At TechAmerica – Five Big Priorities

TechAmerica has been working through a difficult period after four key executives left suddenly to start a competing public sector organization. Now, Mike Hettinger the newly hired Senior Vice President for Public Sector, is hitting the ground running. He told Chris Dorobek on the DorobekINSIDER program that he has spent considerable time since he wasRead… Read more »

NASCIO Unveils To-Do List For States – Plus Your Weekend Reads

Priority lists are commonplace in government. There are the 25-point implementation plans, the 7-year contracts and the 30-leases. However, creating a priority list of action items to be completed in the next year is rare. But that is exactly what the National Association of State Chief Information Officers have done by releasing their annual listRead… Read more »

More Communication, Collaboration Needed in Federal Cybersecurity

By Jeff Ghelerter and Curtis Cote The numbers are astonishing. There are around 70 million cyber-attacks on the Department of Defense per week, or roughly 115 per second, and the National Nuclear Security Administration matches those numbers. Cyber-attacks on the federal government increased 782% between 2006 and 2012, and 66% of security breaches go undetectedRead… Read more »

The 4 A’s Government Needs to Protect Your Privacy

“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »