Search Results for: Cloud

Defend Your Agency Against Cybercriminals’ Top Tricks

Vulnerabilities, faster attacks, files held for ransom, malicious code…Knowing how cyber criminals are threatening security is the first step to securing your information and ensuring your agency can effectively carry out its mission. But with such a daunting threat landscape, you may be thinking “what can be done?” Join this on-demand training to learn: The currentRead… Read more »

Move Fast Without Breaking Things

This post is an excerpt from our recent guide, Agile, DevOps & More: How to Succeed at Government Project Management. To download the guide for free, head here. Today’s IT public sector development atmosphere is incredibly different than even a decade ago. Organizations must balance high velocity software development in a world of increasing compliance, securityRead… Read more »

Measuring the Drapes Before Getting to the Office

The presidential transition is a year and a half away, and everyone is already talking about it. Who are the candidates? Who’s going to win? What policies will they bring to the table? Yet few raise the question: How will he/she actually implement the policies? What exactly does the President do when first getting toRead… Read more »

Cereal, Soda, Cigarettes and the Annual Federal Performance Review – Hope for Humanity!

If we can get smarter about what we devour, we should be able to do the same with the disdained annual performance review. Thankfully, we are. Perhaps nothing in the HR field is under as much attack these days as the annual performance review, an event typically loathed equally by both employee and manager. As… Read more »

The Wolf PACT of Innovation – What Alan and Gov Have In Common

Back in 2009, the movie the Hangover introduced us to the ultimate Wolfpack. In the film, the oddball character Alan, played wonderfully by Zach Galifianakis, toasts his future brother-in-law during his bachelor party. “You guys might not know this, but I consider myself a bit of a loner. I tend to think of myself as aRead… Read more »

The Simplicity of the Software-Defined Network

This blog post is an excerpt from GovLoop’s recent guide, Forecasting the Cloud: Eight Ways the Technology is Changing Government. To download the full guide, head here. Today, the public sector is seeking solutions to its networking challenges. Organizations want their networks to adjust and respond dynamically, based on their policies, and they want thoseRead… Read more »

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »

New Zealand: Finding the Balance Between Privacy and Data

Good: Big data. The Cloud. Information economy. Internet of Things. Medical advances. Engaged citizens. Crowdfunding. 3D printing. Crowdsourcing. Co-creation. Co-production. Open source. Open government. Smart cars. Bad: Identity theft. Big Brother. Phishing. Spyware. Malware. Spam. Zombie computers. Key logging. Hackers. Pharming. 419s . Social isolation. Marginalization. Privacy breaches. SkyNet. Sorry about that last one –Read… Read more »

Is Federal Information Security Better or Worse off Than a Year Ago?

That’s the question (ISC)2, a nonprofit education and certification organization, posed to more than 1,800 federal security professionals for its 2015 global workforce study. Nearly half of those surveyed — 47 percent — said government information security has not improved. A small but growing number of professionals —17 percent — said federal security is worseRead… Read more »