We tend to think of international cyber attacks as a new phenomenon: threats only created by recent mass digitalization. But, in reality, they have been around since the Cold War. Back in 1982, the CIA accessed the control system for a Soviet gas pipeline and triggered a massive explosion. At the time, such events were known as ‘logic bombs’. […]

Kevin Cox is Jon Snow in the war against cyber threats–for the cyber night is here and full of terrors. And, winter isn’t coming–it’s already here. As Continuous Diagnostics and Mitigation (CDM) rounds out phases I and II, our government needs automation, artificial intelligence (AI) and machine learning (ML) to hold back the ugly cyber hoards. AI, ML, and cloud are the dragons, dragon glass, and Valyrian steel that the Department of Homeland Security (DHS) needs to combat the hacking white walkers. Okay, so how to separate fact from fairytale?






[…]

Federal agencies have a data problem. Data that was traditionally inside four walls is now everywhere. Employees and vendors access it from all kinds of devices, located in all kinds of places, making it increasingly challenging for security teams to see what those users are doing with that data.






[…]

With an increasing attack surface resulting in millions of new threats every year, partially updating C&A documents every six months, re-mediating a few Plan of Action and Milestones, and updating all docs every three years, won’t, and doesn’t, keep the bad guys out of Federal networks.






[…]

With the need for secure, reliable communications at an all-time government high, the solutions on EIS aren’t just in the “nice to have” category, they’re things your office “must have” if it is to continue meeting critical missions well, says Steve Boberski of Collab9.






[…]

In the second article in a series about the most important technology trends, Tom Soderstrom of NASA’s Jet Propulsion Laboratory focuses on the key technologies that will deliver maximum benefits, especially when used together.






[…]

In a new series, Tom Soderstrom, the CTO at NASA’s Jet Propulsion Laboratory, discusses the future of technology: how work evolves, key technologies, and how to engage the next generation.






[…]

Since reorganization is a perennial issue in the Federal government, one would expect substantial academic literature to exist on this matter, according to Alan Balutis. Almost nobody has asked the question: What difference have these reorganization plans and executive orders made? How have they been implemented and with what results?






[…]

Recently, John Chambers was in town for meetings of the U.S.-India Business Council, which he chairs. Chambers is now chairman of the board at Cisco Systems after having served as CEO for more than 20 years–an eternity in Silicon Valley. He spoke at a CXO breakfast attended by 20-plus government CXOs. Here are some highlights of his remarks.






[…]

Congress’ power of the purse, enunciated in Article I of the Constitution, is at the very heart of its authority and role in our democracy. That’s why I’m somewhat amused by all the concern, gnashing of teeth, press articles, and the like about President Trump’s recent release of his FY 2018 budget.






[…]

David Vennergrund offers eight paths to reach an enhanced, enlightened state for your data analytics efforts–a state that eases suffering, and provides deeper, more impactful experiences, both today, and with ever-increasing data volumes.






[…]

Windows 10

The Department of Defense’s decision to move to Windows 10 remains solid. As Microsoft’s most secure operating system ever deployed, Windows 10 offers significant security features baked right in. What’s slowing the effort at many agencies, however, is the actual migration process–it’s time-consuming, expensive, and unattainable within a year’s time frame. It doesn’t have to be, says Mike Wilkerson of VMware.






[…]

You may have heard the phrase “this is a marathon, not a sprint” used when discussing important programs launched by organizations. That might be the case with some business initiatives, but it doesn’t necessarily apply to Federal IT, says Jason Kimrey at Intel.






[…]

The 2016 Executive Leadership Conference (ELC) will gather #ChangeAgents for training and education and showcase examples of #ChangeAgents who are already making a difference today. We need to provide “safe spaces” to experiment on doing public service differently and better, says FCC CIO David Bray.






[…]

Often we’re so focused on locking down data access that we lose sight of whether our business can continue when data is lost, stolen, or compromised. Instead of asking if your network is secure, step back and ask yourself, “Is my network resilient?”






[…]

As Cloud Computing matures as an engine of cost savings, improved agility, and enhanced security, options have grown beyond the “one-size-fits-all” offerings available to early users. Organizations can choose between a mix of on-premises or off-premises clouds, or implementing hybrid architectures that combine the best features of all these choices into a tailored solution that meets their own unique needs. When […] […]

1 2 3