Tech

Mobile Gov Shifts + Prognostications

A quick video on trends in practices for agencies, shifts in agency aproaches and predictions about the Mobile Gov landscape from Gwynne Kostin, Director Mobile in GSA’s Office of Citizen Services and Innovative Technologies. Resources Get your thinking “unstuck” and check out the resources to help you smartly deliver anytime, anywhere, any device mobile infoRead… Read more »

GovBytes: At least 100 million compromised records in 2011 linked to hacktivism

Statistically, 2011 was the year of the hacktivist according to a Verizon report. The report, which analyzed 855 databreaches worldwide that occurred in 2011, concluded that more than 100 million of the 174 million records compromised was the work of hacktivists rather than those seeking profit. In contrast, only 3% of the attacks were traceableRead… Read more »

Risk management coming into focus for law enforcement

Law enforcement officials maintain a delicate relationship with the communities they protect. They must ensure the safety of citizens while also acting as a force for justice. As communities and law enforcement activities become more complex, officials are seeking out new ways to handle relationship management and avoid risk. CivSource spoke with Captain Mark LongRead… Read more »

Two British NATO troops killed in attack by shooter wearing Afghan army uniform

www.homelandsecuritynet.com KABUL — A gunman wearing an Afghan National Army uniform Monday turned his weapon against NATO troops in southern Afghanistan, killing two British soldiers. “The individual who opened fire was killed when coalition forces returned fire,” the International Security Assistance Force said in a statement. “A joint Afghan and ISAF team is investigating theRead… Read more »

Cybersecurity Track at FOSE – Register Today for Discount

I am looking forward to attending the FOSE Conference April 3-5 in Washington DC. This post kicks off a blog series highlighting the conference tracks. The five tracks for the event are Cybsecurity, Cloud and Virtualization, Mobile, Defense Innovations and Records and Information Management. Over the next week, I’ll highlight one of the tracks andRead… Read more »

On Becoming an IT Solution Architect – 5 Critical Practices

The Information Technology (IT) inventory of HR role and position labels is broad and deep. IT position descriptions may be closely associated with actual black box technology (like “Microsft Windows Server 2008 Administrator” or “Storage Area Network (SAN) Engineer”), or they may describe roles in a methodology-driven context required for IT success (“IT Project Manager”,Read… Read more »

Disaster Recovery and Business Continuity Planning During a Crisis

With so many new technologies at the disposal of IT departments to help during an emergency, IT departments need to be proactive while planning for natural disasters, outages, cyber –crime and a dozens of potential events that could jeopardize network accessibility. In a current white paper from Century Link, Century Link provides some insights asRead… Read more »

Password Please

At the beginning of the month, I wrote a blog about how a study showed that Facebook may just be a reliable assessment tool for recruiters. It sparked a conversation about whether employers should be using Facebook to screen applicants. Flash forward a couple of weeks, and stories about job seekers being asked for FacebookRead… Read more »

Breaking News: Microsoft Partners With World Class Best Cyber Firm Kyrus Tech Inc and Helps Defeat Some Very Bad Criminals

We have previously written about Kyrus Tech Inc and have highlighted their unique capability called Carbon Black. We have worked with the team of experts there in the past and I am very proud to have been professionally associated with Michael Tanji since we were both in government in the mid 1990′s. We have alsoRead… Read more »