Posts Tagged: Security

The 4 A’s Government Needs to Protect Your Privacy

“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »

Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security

Please join in the discussion! GTRA Technology Council Meeting – Government IT Security Collaboration June 22 – 24, 2014 The Lansdowne, Leesburg, VA http://govtechcouncil.org/index.php/council-meeting/june-2014 Unleashing the Power of Technology: Driving American Excellence through Innovation, Analytics, Efficiency, and Security The GTRA Technology Council Meeting brings together an elite group of federal IT leaders who believe inRead… Read more »

Alcohol and Your Security Clearance

Your use of alcohol and, more specifically, the following circumstances, can impact your eligibility for a security clearance: a. Criminal conduct involving alcohol b. Counseling or treatment for alcohol use c. Excessive use/drinking to intoxication There are various sections on the Personnel Security Questionnaire SF-86 which can elicit responses to determine if your judgment shouldRead… Read more »

Huffington Post Interview With Xerox’s Chuck Brooks

http://www.huffingtonpost.com/brian-e-finch/cybersecurity-industry-in_2_b_4620232.html?utm_source=Alert-blogger&utm_medium=email&utm_campaign=Email%2BNotifications www.huffingtonpost.com/brian-e-finch/”,”background_color”:”#cccccc”,”font”:”lucida grande”,”layout”:”button_count”,”author_nickname”:”hp_blogger_Brian E. Finch”,”entity_type”:”1″,”entity_id”:320489,”hp_track”:”Author Info”,”vertical_id”:0}”> Cybersecurity Industry Interview With Xerox’s Chuck Brooks by Brian Finch, Partner, Dickstein Shapiro, LLP As we kick off 2014, I am starting the New Year with an interview series, which will provide an overview of the cybersecurity industry. I spoke with Vice President and Client Executive at Xerox, ChuckRead… Read more »

Telecom, Security, Cloud and the State of California – Your chance to join the discussion

On Monday, February 10, 2014 the Public Sector Technology Exchange (PSTE) will be hosting a government and industry panel discussion on “Telecom, the Cloud, and Security” from 8:30 a.m. to 11 a.m. at the CalPERS Building Auditorium located on 400 Q Street in Sacramento, California. The PSTE is an independent forum that discusses the issuesRead… Read more »

Federal Cybersecurity Trends in 2014

2013 proved to be an eye-opening year when it came to cybersecurity. The NSA data breach shined a light on how virtually any organization is vulnerable to insider threats, and that achieving cybersecurity goals can be highly challenging. Next year, the rise of mobile device consumerization will continue to provide both security challenges and opportunities.Read… Read more »

Thwarting Cyber Threats with Advanced Secure KVM and KM Technology

One of the most under-utilized preventative measures for thwarting cyber attacks is KVM (keyboard/video/mouse) switching devices. These devices allow employees in any type of business to securely switch between networks with various security levels from one desktop location. Advanced Secure KVM Switches offer superior security and data cyber threat protection by providing true data pathRead… Read more »

WHSR to Hold Industry Engagement Award Ceremony for Federal Agencies

The Washington Homeland Security Roundtable will honor federal officials from Department of Homeland Security component departments for work with industry partners at an upcoming Holiday Reception event. The Industry Engagement Awards aims to acknowledge agencies who maintain relationships with the industry segment, WHSR said Nov. 18. “Partnerships enable real collaboration between industry and government toRead… Read more »

The Importance of Project Schedule in Government Program Management

The government runs on programs. Studies have shown effective program management saves the government time, and money. In a fiscal environment dominated by sequestration, how do program managers stay above the fray? In this four-part series we’ll take a look at managing schedule, cost, scope, and quality. We’ll give you valuable tips and feedback toRead… Read more »

Belkin Releases Secure Headset Adapter as the Ideal Security Solution for Classified Discussions Held Where Computers Are Present

New Secure Headset Adapter Is the Only Solution on the Market that Enables Use of Analog Devices in a Secure Environment to Help Thwart Cyber Attacks and other Security Breaches Belkin, a trusted leader of technology solutions for office, classroom, IT infrastructure, and mobile environments, today announced its release of the Belkin Secure Headset Adapter,Read… Read more »