Over 230 Startups Apply to Code for America

Just a little over six weeks ago, we opened up applications for the CfA Startup Accelerator. Honestly, when we did, we thought we would receive maybe a dozen or two applications. We weren’t sure if folks would know what we meant by “civic,” or be able to hear about it soon enough to apply; orRead… Read more »

Developing the National Cybersecurity Workforce, The National Level Exercise 2012, and More

Here is today’s federal cybersecurity and information technology news: The Department of Homeland Security has launched a new initiative to develop and recruit the national cybersecurity workforce. More here. A Washington Post poll finds that Americans are divided about what role, if any, the federal government should play in setting and enforcing cybersecurity standards forRead… Read more »

Free June 12 webinar: Advancing Health Reform by Inclusion: Engaging Communities of Color in Creating Policy Change

From Community Catalyst: “Advancing Health Reform by Inclusion: Engaging Communities of Color in Creating Policy Change Tuesday, June 19, 2012 from 2 p.m. to 3 p.m. Eastern Time Register at http://bit.ly/KMvqDm by Friday, June 15, 2012 The best change occurs when the communities most affected are involved. Moving toward health equity requires full participation byRead… Read more »

The Four Rules of Media and Layers

These four rules help government agencies plan for social campaigns, because they force us to answer key questions about our audience, our message, the tools at our disposal, and the resources available to us–the four constant variables in every activity that includes a social layer. The Goal of a more Participatory Government I’ve been thinkingRead… Read more »

Estonia as a Cyber Trafalgar

On Wednesday, May 23, Jason Healey, moderator for the Atlantic Council’s “Building a Secure Cyber Future: Attacks on Estonia, Five Years On,” reminded us that for all the talk of emergent threats and new technology, cybersecurity has a history that’s worth remembering and learning from. While the Navy still studies the Battle of Trafalgar fromRead… Read more »

GovBytes: Run-of-the-mill malware still poses huge cybersecurity threat

As of late, we’ve all heard of the threat of new, advanced, nation-state sponsored viruses like Stuxnet and Flame. But it’s important not to forget the risk posed by run-of-the-mill malware to our machines and personal information. McAfee’s latest threat report suggest that this year is shaping up to be one of increased risk online,Read… Read more »

Confusion Surrounding Social Media Monitoring

Here are some verbatim responses I often get when asking clients the following question: “Have you ever monitored social media while at work?” “social media monitoring is not our responsibility, it’s done by the [comms/web/IT] people]” “we have a social media monitoring tool gathering info for us” “we already do media monitoring” “our [branch/department/organization] doesn’tRead… Read more »

Avoiding Business Development Budgeting Pitfalls and Proposal Cost Cutting Blunders

As a proposal manager getting a proposal plan approved, I always found it difficult to get my management to approve a budget that was based on 40-hour weeks for employees and 50, 60, or even 70-hour weeks for consultants. It just didn’t look good: a consultant often cost more per hour than an employee, andRead… Read more »

Connery got the job done at the 2010 Nuclear Security Summit

In post 9/11 world, securing nuclear materials and safeguarding them from non-governmental actors is as important as ever. In 2010, President Obama hosted 50 world leaders in Washington, DC at the Nuclear Security Summit. The gathering was the largest of world leaders since the creation of the United Nations in 1945. Joyce Connery, the currentRead… Read more »