Critical Infrastructure: Principles & Activities to Achieve a Strong Cybersecurity Posture

We’ve posted the GovDefenders panel on YouTube. Moderated by DLT Solutions’ Chief Technology Officer Van Ristau, the panel featured Ken Durbin, Continuous Monitoring Practice Manager, Symantec; Paul Christman, Vice President, Dell Software Public Sector; and Wallace Sann, Regional Vice President – Systems Engineering & Federal Chief Technology Officer, ForeScout.

The Next Chapter in Federal Cybersecurity

I recently appeared on a panel for Federal Times at their “The Next Chapter in Federal Cybersecurity: Continuous Monitoring & Identity Access for Secure Networks” breakfast event. I was joined by Deborah Gallagher, Director, Identity Assurance & Trusted Access Division, Office of Governmentwide Policy, GSA and Paul Grant, Strategy Advisor for Cybersecurity, Defense Department, Office of the CIO. We didn’t get through all the questions so I thought I’d continue the conversation here.

If “Fire and Forget” is Part of your FOIA or Legal Hold Playbook, Don’t Aim at your Feet

From time to time, the “fire and forget” strategy applies to managing Freedom of Information Act (FOIA) search requests and litigation holds. When this familiar tactic rears its ugly head, collateral damage can happen to an agency or organization in legal proceedings because FOIA searches can’t be adequately justified or data isn’t properly preserved due to a breakdown in the legal hold process.

Technically News - 2/21

This week in Technically News: Cybersecurity Framework: What's Next?; How Big Data is Remaking the Government Data Center; Survey Shows Government Pipelines Not Ready for Data-Heavy Projects; Red Hat CEO Addresses Big Data's Chicken-and-Egg Question; Kiss Passwords Goodbye: A Single Sign-On Future Is Within Reach.

The Internet of Hackable Things

The market for wearable technology will explode over the next three years, bringing about the age of the Internet of Things and everyday cybersecurity issues like the aforementioned. And thanks to a recent Symantec finding, hackers aren’t waiting for popular adoption before using what’s already on the market to spy. You think BYOD is bad now? Hold tight.

Technically News - 12/9

This week in Technically News: Battling Malware and Madware; Is PaaS the Savior of the Federal Datacenter Consolidation Initiative; Symantec Gets FISMA Certification for Shared Service Products; 7 IT Strategies for 2014; Less Malware Predicted for 2014 But New Tactics Emerge.

Technically News – 10/7

This week in Technically News: Shutdown Heightens Cybersecurity Risks, Feds Warn; Symantec Knocks Half a Million Computers Out of the ZeroAccess Botnet; Budget Worries Grow for Government IT Leaders; Why IT's Economics Revolution Is More Than OpEx and CapEx; Your Fragile Supply Chain: Fatal to Business.