How to Implement Continuous Monitoring and improve your Agency’s Security Posture
Security hazards are a fact of life and the public sector is a leading target for attacks. Despite progress and increased risk awareness, government hacks and security breaches are skyrocketing. There were almost 61,000 attacks on the federal government in 2013.
Get Ahead of the Threat – How to Craft a Plan of Action on Identity Management
Identity management is a perplexing problem – particularly in government where evolving threats render traditional ID security strategies inadequate. One of the biggest problems is that agencies aren’t aware of the gaps in their security posture until they’re audited or experience a breach.
IPv6 - A Stealthy Threat within the World’s Most Secure Networks?
The Government Cloud Set to Expand Beyond Storage and Email in 2015
What can government agencies expect from cloud computing in 2015?
IDC Government Insights recently released its worldwide predictions for 2015 and predicts that governments will increasingly draw on cloud computing to underpin and enable a number of key initiatives.
Open Source Technologies for the Classroom, the Campus, and your Budget
The 4 Biggest Government Cybersecurity Threats of 2014 (and How to Stop Them)
While we’ve been busy fretting about Ebola and the Islamic State, in 2014 cybersecurity trumped terrorism as the number one threat to the U.S.
Despite investing billions in cybersecurity, federal, state and local agencies are struggling to keep pace with ever-evolving threats.
Let’s take a look at the biggest cybersecurity threats of 2014 (so far) and steps the federal as well as state and local government can take to stop them.
The Government Workforce
States Remain Vulnerable to Catastrophic Email Loss and Non-Compliance
Disaster recovery, governance and business continuity are a top priority for America’s cities and counties in 2015, behind only cybersecurity, open government and IT staffing. That’s according to the latest survey data from the Center for Digital Government – and with good reason. Keeping up with state and local guidelines and regulations for data integrity and the protection and availability of public records is exhausting.
Compliance Begins with People and Processes, Ends with Software
All too often, federal IT personnel misconstrue software as being able to make their agency compliant with various regulations. It can’t – at least not by itself.
Azure Outages Raises Doubts over its Readiness for Mission-Critical Workloads
“Microsoft Azure suffers another outage” is becoming an all too familiar headline. A series of problems has plagued the Azure infrastructure and PaaS cloud tools this year leaving customers across the globe reeling from outages and interruptions, some of them lasting as long as a week.
Top 5 Reasons to Migrate Your Oracle Licenses
Ever wonder what to do with your old, out-of-date software licenses from Oracle? Technology is constantly improving and new programs are being developed all the time. Some of those old programs are combined with others to form new product bundles, some are upgraded and repackaged, and some are simply retired and replaced by new programs. Fortunately, the license migration is a way to make sure that your licenses remain useful and valuable over time as technologies and business needs evolve, and facilitates effective license management by you, the end user.