GovDefenders | An Interview About Cybersecurity Training with the Executive Director of FITSI

Jim Wiggins is the Executive Director of the Federal IT Security Institute and the Wounded Warrior Cyber Combat Academy. He's one of the keynote speakers for this year's GovDefenders free online cybersecurity conference. We've sat down with Jim beforehand to discuss different aspects about cybersecurity training including why budgets for training are decreasing even when spending is increasing, what qualities to look for in a IT security professional, and how training has evolved over the last decade.

How to Configure and Deploy a Mobile App in Minutes using FullCircle Mobile App

Many professionals are unaware how to troubleshoot, load, or configure their devices and will turn to their IT department for help. Doing so results in lost time, frustration, and third party assistance. Now there is a simple solution that CAD and GIS users can practice to configure their mobile apps.

FullCircle Mobile App is a configurable platform that supports web, mobile and SmartPens. This provides organizations with the flexibility that they need to address all possible field requirements while minimizing the impact on IT staff.

GovDefenders | An Interview with the President of the Cloud Security Alliance DC

John Nicholson is the President of the Washington D.C. Metro Chapter of the Cloud Security Alliance (CSA) and one of the keynote speakers during this year's GovDefenders Cybersecurity Virtual Event. In preparation for the big event, we briefly interviewed John about cloud computing. Watch the below video to learn: "What resources can the Federal cloud community tap into regarding contracting and best practices?" and "How can cloud providers leverage the CSA's Cloud Controls Matrix and are there any currently leveraging it?"

GovDefenders Assemble: A Free Cybersecurity Virtual Event

The GovDefenders Cybersecurity Virtual Event, presented by DLT Solutions, is a free cyber event focused on the public sector. Join us from your desk on Wednesday, April 24 as professionals from leading IT companies, including NetApp, Symantec, ForeScout, Red Hat, Quest Software, now a part of Dell, SolarWinds, and DLT Solutions, as we discuss trends, best practices, and the future of public sector cybersecurity.

GovDefenders Wednesdays | Are Your Paleolithic Post-Patch and Post-Phish Processes Leaving You in a Pickle?

Last month the National Institute of Standards (NIST) database of software vulnerabilities, the National Vulnerability Database (NVD), was taken offline for several days because it was discovered that the web servers hosting the NVD, as well as other government databases, had been compromised by a software vulnerability. In this blog, I’ll review the problem; next week I’ll identify tools and processes that can help solve the problem.

The RHN Satellite Survival Guide

I'll be posting a series of articles on tips, tricks and considerations on Red Hat's RHN Satellite system life-cycle management tool. Each new post will get a link here, so they'll be easy to find. I'll be putting things I've learned from my own mis-steps, inside track from friends inside Red Hat, and perspectives gained from talking with others who work with RHN Satellite on a daily basis.

Technically News - 4/1

In this week's Technically News: Veterans Affairs Tables BYOD Plans; U.S. CIO Wants IT-as-a-Service; How to Succeed Under LPTA; Congress Wants to Ban Government IT Purchases from China; The Seven Responsibilities of Agency CISOs. And in DLT Monthly News Roundup: DLT Increases Revenue by 16% in 2012; DLT Solutions Wins Air Force Contract Worth up to $23.2M.