GovBytes: At least 100 million compromised records in 2011 linked to hacktivism

Statistically, 2011 was the year of the hacktivist according to a Verizon report. The report, which analyzed 855 databreaches worldwide that occurred in 2011, concluded that more than 100 million of the 174 million records compromised was the work of hacktivists rather than those seeking profit. In contrast, only 3% of the attacks were traceableRead… Read more »

HUD IT modernization efforts needs contractors of all sizes

From the Washington Business Journal: The Department of Housing and Urban Development’s Stan Buch outlined the agency’s effort at modernization and adopting new technologies at a Deltek Inc. Deltek Inc. Latest from The Business Journals Deltek co-founder dies at 80Pay for performance? A procurement model tied to outcomes is pitched by iGate Corp., but challengesRead… Read more »

Risk management coming into focus for law enforcement

Law enforcement officials maintain a delicate relationship with the communities they protect. They must ensure the safety of citizens while also acting as a force for justice. As communities and law enforcement activities become more complex, officials are seeking out new ways to handle relationship management and avoid risk. CivSource spoke with Captain Mark LongRead… Read more »

Two British NATO troops killed in attack by shooter wearing Afghan army uniform

www.homelandsecuritynet.com KABUL — A gunman wearing an Afghan National Army uniform Monday turned his weapon against NATO troops in southern Afghanistan, killing two British soldiers. “The individual who opened fire was killed when coalition forces returned fire,” the International Security Assistance Force said in a statement. “A joint Afghan and ISAF team is investigating theRead… Read more »

On Becoming an IT Solution Architect – 5 Critical Practices

The Information Technology (IT) inventory of HR role and position labels is broad and deep. IT position descriptions may be closely associated with actual black box technology (like “Microsft Windows Server 2008 Administrator” or “Storage Area Network (SAN) Engineer”), or they may describe roles in a methodology-driven context required for IT success (“IT Project Manager”,Read… Read more »

Password Please

At the beginning of the month, I wrote a blog about how a study showed that Facebook may just be a reliable assessment tool for recruiters. It sparked a conversation about whether employers should be using Facebook to screen applicants. Flash forward a couple of weeks, and stories about job seekers being asked for FacebookRead… Read more »

Breaking News: Microsoft Partners With World Class Best Cyber Firm Kyrus Tech Inc and Helps Defeat Some Very Bad Criminals

We have previously written about Kyrus Tech Inc and have highlighted their unique capability called Carbon Black. We have worked with the team of experts there in the past and I am very proud to have been professionally associated with Michael Tanji since we were both in government in the mid 1990′s. We have alsoRead… Read more »

Gov’t & Industry – Partnering to Procure Smarter and More Sustainable Products and Services

Government and Industry – Partnering to Procure Smarter and More Sustainable Products and ServicesDate of Event: April 12, 2012Event Location: American Institute of ArchitectsEvent Time: 10:00 am (Registration Opens); 10:30 am – 12:00 pm (Program) Register Here: ACT-IAC Program Event Who should attend?Federal employees interested in: • Helping your organization set and achieve sustainability goals•Read… Read more »

Top 10 WWWD (What Would Washington Do)?

Nearly daily a political figure or commentator demands a return to the principles of America’s founding fathers. For a few of these speakers, incorporating colonial ideas on civility & decent behavior in company and conversation, might be very worthwhile. The Colonial Williamsburg Foundation, operator of the world’s largest living history museum in Williamsburg, Virginia holdsRead… Read more »