Another Look at Virtual Integrity

|
“It happens every day. Debra, a junior at a prestigious Ivy League university, needs better grades. She downloads and submits someone else’s research. Frank, a respected business man, plugs a pen drive into his work laptop. Within seconds he’s viewing inappropriate material and downloading copyrighted movies. April and Sara, two ... Read More

Securing Your Vote: Are the 2018 Elections Protected? It Depends

|
As we approach the midterm elections in 2018, there is a mix of good news and warning signs regarding election security. Americans eagerly await the election results and answers to questions like which political party will win control of Congress? Also, will state governments swing left or right? But behind ... Read More

Securing Your Vote: Are the 2018 Elections Protected?

|
As we approach the midterm elections in 2018, there is a mix of good news and warning signs regarding election security. Americans eagerly await the election results and answers to questions like which political party will win control of Congress? Also, will state governments swing left or right? But behind ... Read More

State of the States for Tech and Cyber

|
With the midterm elections just days away, state government leaders in technology and cybersecurity assembled in San Diego, California, this past week for the National Association of State CIOs (NASCIO) Annual Conference. The presentations, survey results and hallway conversations were compelling – to say the least. No doubt, many new ... Read More

Where Next With Cloud Security?

|
Cloud computing is more than a decade old, but cloud security, compliance, and even definitions of the technology components, are changing rapidly. As cloud adoption surges almost everywhere, some governments are even moving from a ‘cloud-first policy’ to a ‘cloud-only policy’ with a few rare exceptions. Others are still trying ... Read More

Security Audit Weaknesses Offer a Silver Lining

|
Very disappointing, some might even say demoralizing, security findings were made public this week in a report from a U.S. Government Accountability Office cybersecurity study regarding the Defense Department’s newest weapons systems. Why was this audit report created, and what was the scope? According to the report highlights: “DOD plans ... Read More

Expert Interview on 2018 Election Security

|
As we head into the final days before the 2018 elections, the media coverage of election security has never been greater. Sadly, much of the news is not very encouraging. For example: Time magazine: ‘Our House Is on Fire.’ Elections Officials Worry About Midterms Security The New York Times: The ... Read More

Expert Interview on 2018 Election Security-2

|
As we head into the final days before the 2018 elections, the media coverage of election security has never been greater. Sadly, much of the news is not very encouraging. For example: Time Magazine: ‘Our House Is on Fire.’ Elections Officials Worry About Midterms Security – The New York Times: ... Read More

New National Cyber Strategy Message: Deterrence Through U.S. Strength

|
The best defense is a good offense. That well-known sports saying is true not only in football but also in cybersecurity. And according to the National Cyber Strategy of the United States of America, just released by the Trump administration on Sept. 20, 2018, the need to deter adversaries through ... Read More

Missouri CISO Michael Roling Leaves a Legacy of Excellence in Government Cybersecurity Leadership

|
Michael Roling’s last day in Missouri government will be Sept. 28, 2018. He is leaving for another private-sector position as the “lead technical project manager at a company that has several SaaS offerings.” Coverage of his announcement has been widespread with related articles in Government Technology magazine and other publications ... Read More
Loading...