Tech

Hackers and Honeypots: Getting Things Done

It’s always been fashionable in the cybersecurity industry to throw up our hands and call cyber crime an intractable problem. We don’t have the technical skills to match hackers, attribution is impossible in cyberspace, we don’t have the legal framework for Internet crimes, or international cooperation is insufficient to go after the shadowy, transnational cabalRead… Read more »

Join Our Research Study: Exploring Bring Your Own Device In Government

Please take a moment to participate in our online survey exploring bring your own device in government, survey link can be found here. Thank you! I’m conducting a research study, “Exploring Bring Your Own Device in Government.” Our study hopes to understand current trends with Bring Your Own Device (BYOD) initiatives, identify best practices andRead… Read more »

Over 230 Startups Apply to Code for America

Just a little over six weeks ago, we opened up applications for the CfA Startup Accelerator. Honestly, when we did, we thought we would receive maybe a dozen or two applications. We weren’t sure if folks would know what we meant by “civic,” or be able to hear about it soon enough to apply; orRead… Read more »

How Do You Retain Security With BYOD?

Mobile devices and applications have become an essential component of the modern workplace. On a daily basis, mobile devices are being integrated into the work environment. Across government, agencies are now exploring ways to implement bring-your-own-device policies, with the hopes that by allowing people to work on the platform they choose, agencies will be ableRead… Read more »

GovBytes: Run-of-the-mill malware still poses huge cybersecurity threat

As of late, we’ve all heard of the threat of new, advanced, nation-state sponsored viruses like Stuxnet and Flame. But it’s important not to forget the risk posed by run-of-the-mill malware to our machines and personal information. McAfee’s latest threat report suggest that this year is shaping up to be one of increased risk online,Read… Read more »

How one feds is making inroads on nuclear proliferation and is big data a fad or something more?

On today’s DorobekINSIDER We often talk about the challenges of government work — and one of the real challenges is measuring results. Today, we’re going to introduce you to somebody who works on one of the most challenging issues — nuclear proliferation. That work has made her a finalist for the Service to America MedalsRead… Read more »

Connery got the job done at the 2010 Nuclear Security Summit

In post 9/11 world, securing nuclear materials and safeguarding them from non-governmental actors is as important as ever. In 2010, President Obama hosted 50 world leaders in Washington, DC at the Nuclear Security Summit. The gathering was the largest of world leaders since the creation of the United Nations in 1945. Joyce Connery, the currentRead… Read more »

Big data is great — BUT only when the information is accurate

Big Data — it’s the latest buzz word making its way across government. “Trends emerge and they get labeled. Provider flock to the new label, align themselves and say, ‘look we’ve always been doing this,’” says Paul Wohlleben the President of Wohlleben consulting and a former federal CIO. But what really is Big Data? WohllebenRead… Read more »