Subscribe

Cybersecurity, Uncategorized
We’re writing to you from the cybersecurity focused RSA Conference in San Francisco. Although we have two days left, we’ve already attended a lot of sessions and seen a lot of presentations you’ll want to know about. Next week we’ll do a full break down, including our key takeaways, for you. For now, here are a few links to articles summarizing interesting points made during the first couple days.
Cybersecurity, Uncategorized
SolarWinds, a leading provider of powerful and affordable IT management software, recently released the results of their 2013 SolarWinds Security and Compliance Survey. Over 160 IT professionals were polled and their answers revealed fears about the present and future, on both cybersecurity and the influx of new technology.
Digital Design
A CAD event isn’t one without a certain Autodesk Evangelist showing up. Thankfully, Lynn Allen not only made an appearance during the [acronym] Magazine’s Public Sector CAD Awards virtual event and expo, she gave the keynote talk. 60 AutoCAD Tips in 60 Minutes provided users with more valuable tricks and shortcuts than a magician carries up his infinite sleeve and within his endless hat.
Cybersecurity, Uncategorized
Last Friday, I had the privilege of hearing Henry Sienkiewicz, Vice Chief Information Assurance Executive for the Defensive Information Systems Agency (DISA), at a luncheon hosted by the Northern Virginia chapter of the Air Forces Communications and Electronics Association. In his opening remarks, Mr. Sienkiewicz identified three vectors challenging their cybersecurity delivery: budget decreases, strong demand from the services, and how cybersecurity is being conducted to defend and protect the mission. My five key takeaways are the following...
Digital Design
Imagine a pen that practically remembers what it writes. SmartInk provides the ability to do just that. There is a desire for paperless field data collection, but it has yet to happen – until now.
Cybersecurity, Uncategorized
With the holidays in the rear view mirror we take a moment to look at what online scammers have been up to this season. It is that time of year where the perfect conditions exist for malicious programmers to run their seemingly annual Search Engine Poison (SEP) attacks. For those who aren’t aware: What is SEP?