Posts Tagged: cybersecurity

The Tech Loop: Fast & Furiously Data-Driven

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cybersecurity, big data & analytics, and cloud. Cybersecurity Sound the alarm! Or “pound the alarm,” as Nicki Minaj would say. In an executive order signed this week, President Obama declared foreign cyberthreatsRead… Read more »

Cyberspace: Asset or Liability?

Cyberthreats are a national emergency. That’s what President Obama declared in an executive order signed yesterday, that also authorized the levying of targeted sanctions against individuals or groups involved in malicious cyber activities aimed at the U.S. With this most recent action to address the growing cybersecurity challenge, it was especially timely to hear fromRead… Read more »

Creating an Adaptive Cybersecurity Strategy & Culture through Agile Cybersecurity Action Planning (ACAP)

Cybersecurity should not about just building better castles, but looking ahead to the emerging threats. Castles were undone by introduction of cannons and mobile warfare. This will likely be true of Cybersecurity because the “cyber barbarians,” whether state or non-state actors, criminals or hacktivists, are constantly looking for new technologies, human weakness, back doors and… Read more »

The Tech Loop: Hot Damn!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, GIS, cybersecurity, big data, and IoT. Cloud A cloud of doubt? According to Gartner, Inc., CIOs remain hesitant to consider cloud computing as a first-line option for IT projects. Most areRead… Read more »

Hillary’s Email Isn’t the Only Email Worry for State

Former Secretary of State Hillary Clinton’s email isn’t the only State Department email to make headlines in the past few months. In 2014, the State Department found themselves in a very difficult situation. State Department emails had been breached, presumably by Russian hackers. “The hackers bedeviled the State Department’s email system for much of theRead… Read more »

Insider Threats: The Stranger Next Door

Cybersecurity dialogues often talk about threats and breaches stemming from hackers, terrorists, and cyber-criminals. However, there are significant threats that come from individuals who are closer than you think – maybe even the person you sit next to at the office. SolarWinds, an IT management software company, recently researched insider threats to the federal government.Read… Read more »

The Tech Loop: Big Data and March Madness

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include cloud, IoT, cybersecurity, and big data. Cloud 3, 2, 1. Cloud liftoff. It’s been a little over four years since then-federal CIO Vivek Kundra announced a cloud-first policy as part of theRead… Read more »

The Tech Loop: To Cloud Infinity and Beyond!

The Tech Loop is a weekly compilation of the latest happenings in government technology gathered from around the web. This week’s topics include IoT, federal gov, cybersecurity, big data, and cloud.  Internet of Things I support things! Not the most effective campaign mantra, but nonetheless, a bipartisan group of U.S. senators has drafted an InternetRead… Read more »

The 7 Deadly IT Sins

It’s a scary cyber world out there. Threats are becoming more sophisticated, effective, and pervasive everyday. According to a Government Accountability Office report, cyber threats to federal agencies increased 782 percent between 2006 and 2012. What’s more, a Center for Strategic and International Studies study estimated the global cost of cybercrime at over $400 billionRead… Read more »