Technically Speaking - 8/5

This week in Technically News: Striking The Right Balance Between BYOD & Security; Q&A: HHS CTO Bryan Sivak On Disrupting Government Culture; Big Data – Big Exposure. What Can You Do About It; NIST Cybersecurity Center Moves Into High Gear; Do We Need a US Department of Technology; Virtualization Has Changed Disaster Recovery: 15 Data Points.

Technically News - 7/8

This week in Technically News: Google Adds BYOD Management Tools for Android; 4 Government Programs that Drive Innovation; CIA, NSA See Benefits in Double-Barreled Approach to the Cloud; Top 10 Virtualization Killers; Can State & Local Govs Benefit From the US Commerce Department’s Cybersecurity Program; Oracle Launches Database 12c for Clouds.

Technically News - 4/1

In this week's Technically News: Veterans Affairs Tables BYOD Plans; U.S. CIO Wants IT-as-a-Service; How to Succeed Under LPTA; Congress Wants to Ban Government IT Purchases from China; The Seven Responsibilities of Agency CISOs. And in DLT Monthly News Roundup: DLT Increases Revenue by 16% in 2012; DLT Solutions Wins Air Force Contract Worth up to $23.2M.

Technically News – 2/18

In this edition: Cloud Superstars Have Their Heads in the Cloud; Why You Should Pay for Open Source Software; Identity Management Is Complicated; Converged Infrastructure is the Future of Data Centers; Red Hat’s Jim Whitehurst Looks 20 Years Into the Future; 12 IT Predictions from the Federal Government.

Mobile Malware is the New PC Malware

In 2004, Cabir became the first mobile-based worm, infecting Symbian-based devices including old Samsung and Nokia models. Although it was developed as a proof-of-concept, within a year Cabir helped spawn mobile malware including the first mobile Trojan (Qdial) and mobile application hack (Skulls). Today, explosion of smartphones and tablets has spawned an entirely new hacking industry – one that has the potential to bypass your current cybersecurity strategies if you have not included mobile protection.

GovDefenders Wednesdays: Cybersecurity Starts at the Bottom of the Totem Pole

One of the most frequently misused quotes references the bottom of the totem pole. Many people associate it with negativity - “I’m stuck at the bottom of the totem pole.” However, the bottom is one of the places you wanted to be because it was one of the most honorable positions. It was those at the bottom who everyone relied on to hold society up. Cybersecurity is no different. Those at the bottom now must help hold those at the top.