McAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...
Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...
View ArticleCybersecurity and Network Security: Next-Generation Firewalls Take Center Stage
Cybersecurity is on the mind of most everyone with the latest attacks, Executive Order and one of the biggest conferences of the year RSA 2013. We’ve asked our partners to let us know what is top of...
View ArticleThe Changing Face of InfoSec
Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...
View ArticlePodcast: Gary DePreta, Director of Federal Healthcare and Scientific Agencies...
This month we will be featuring a series of interviews with various subject matter experts about healthcare IT and how cloud, collaboration, security, mobility and other emerging technologies are...
View ArticleEffective Security Strategy Requires a Lifecycle Approach
A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep...
View ArticleCryptoLocker, Heartbleed and the Next Cybersecurity Threat
Although new security threats and vulnerabilities are constantly being discovered, three major security issues were recently exposed that can threaten virtually every citizen and corporation. The first...
View ArticleHow Metrics Can Tell the Story of Network Security
Network security metrics might not be the most tantalizing topic in the IT world, but it’s one that is increasingly important as networks become more complex and threats more pernicious. Metrics can...
View ArticleCyber Security Top Priority for VA CIO
Hardly a week goes by without news of another security breach affecting millions of citizens and government agencies. Cyber threats continue to grow more sophisticated, and securing customer and...
View ArticleThe Benefits and Considerations of Big Data Implementations
With the proliferation of devices and sensors that generate data, today’s federal government agencies are faced with the difficult task of storing, managing and sharing a mountain of data and...
View ArticleIs the Government Ready for FedRAMP Ready?
To ensure that the cloud solutions and services being implemented by government agencies are secure and meet an established set of standards, experts from multiple federal agencies, including GSA,...
View Article
More Pages to Explore .....