Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Articles from Government Cyber Assurance
When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use m...
Everyone has heard of the 50 Shades of Grey. But do you know the “36 Shades of Hybrid IT”? These shades are a new way of describing the 36 point solutions across a hybrid IT environment. Enterprises looking to transform the way information technology is leveraged should evaluate their ...
GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an impo...
IBM Cloud is now providing developers with the infrastructure and portal to a 5 qubit quantum computer. This equips them with the ability to build interfaces between classic computers and IBM's quantum platform. Quantum computers make direct use of quantum-mechanical phenomena, such as...
Over the past few years, the use of artificial intelligence has expanded more rapidly than many of us could have imagined. While this may invoke fear and dread in some, these relatively new technology applications are clearly delivering real value to our global society. This value is ...
Chat apps characteristics make them very appealing to businesses and marketers. Prominent ones include their size, user retention, usage rates, and user demographics. In fact, the combined user base of the top four chat apps is larger than that of the top four social networks. Chat app...
The computer and the network that connects them are both inextricably linked to the success of any business. This truth is at the heart of our contemporary connection economy. "The computer patiently measures and reports. [T]he network creates value in connection. The connection econo...
With all the excellent training available on television today, we are all now well prepared to deal with the coming Zombie Apocalypse. Our failure as a society lies, however, in our misunderstanding of the nature of the cybersecurity challenge. This failure threatens us all and our su...
Today data has replaced money as the global currency for trade. “McKinsey estimates that about 75 percent of the value added by data flows on the Internet accrues to “traditional” industries, especially via increases in global growth, productivity, and employment. Furthermore, the Uni...
According to the IBM Institute for Business Value the market will see a rapid adoption of initial cognitive systems. The most likely candidates have moved beyond descriptive and diagnostic, predictive and routine industry-specific capabilities. 70 percent of survey respondents are curr...
Cloud computing has taken over the business world! With almost maniacal focus, single proprietors and Board Directors of the world's largest conglomerates see this new model as a "must do". This rapid shift is, in fact, accelerating. As Jeff Bertolucci observes in "The Shift to Cloud S...
Desde mayo de 2010, “Cloud Musings” ha mostrado, informado y celebrado el uso de las tecnologías más avanzadas en el mundo de la empresa. Los temas cubiertos han podido variar de vez en cuando, pero el cloud computing y la ciberseguridad se han convertido en nuestro terreno ideal. Dura...
Cloud Service Brokerage is changing from an industry footnote toward becoming a major system integration play. This role has now become a crucial component of a cloud computing transition because they help organizations aggregate multiple cloud services, integrate services with in-hous...
Virtual Newsmakers is a webcast show featuring virtual newsmakers, who are bridging traditional and digital communications and empowering human communications through technology. The show highlights people who are using technology as a conversation to bring communications to a human le...
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and untrusted infrastructure. What is a security professional to do? According to Bill Odell, the ...
How is cloud computing bringing society and its ideas closer together? This got me thinking. Last week the President of the United States started following me on Twitter. Now I realize that it's not really President Obama on the other side of that virtual table, but the event brought ...
The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is also feared as the real- life instantiation of The Terminator’s Skynet, where sentient robot team with an o...
“Threats are always evolving and the days of ‘set it and forget it’ malware and virus scanners are over if you want to keep your business information secure,” explained Abel Sussman, Director of Federal Services at Coalfire, in this exclusive Q&A with Cloud Expo Conference Chair Roger ...
Everyone from pre-teens to granddads does social media today. With Twitter, Instagram, Facebook and many newer ways to stay in the know popping up every day, picking the right platform can be a difficult task. While the personal value of this modern convenience seems obvious to most, t...
With careful planning and the right technology, Federal, State and Local Government IT Leaders can overcome fears of data migrations, breaking free from archaic procedures to lead the pack . Jurassic World, the latest installment in the Jurassic Park film series, opened this week - an...
March is Women’s History Month. As we celebrate women and their role in our history, our workplaces, and our homes, I thought it was important to bring to the forefront some of the strengths that might make them stand out as compelling agents of change in such a time as this in the IT ...
Privacy is gaining in importance across the globe, often involving laws and regulations, relating to the acquisition, storage, and use of personally identifiable information (PII). Typically, privacy implies limitations on the use and accessibility of PII, with associated requirements ...
The Veterans 360 mission is to support our young combat veterans as they integrate into civilian life. In line with their four pronged approach (engagement, education, employment, and healing), and to help veterans get the skills necessary to obtain employment with a solid future, they...
We are offering a fun and educational event just about the cloud. This session will help CEOs, Directors, Managers, and Dilberts learn what the heck the cloud is all about. Don’t get left out of the conversation. Learn how your business / organization can benefit from this technol...
There are many important characteristics of great leaders. Team players, good listeners and visionary are clear hallmarks. But being ambidextrous is required now more than ever. Ambidextrous leadership is a balanced approach where flexible leadership behaviors that lead to better busin...
"The next generation of technology solutions will transform lives, businesses and economies." This is the theme at this year's Dell World opening keynote and this view is supported by Gartner's Top 10 Strategic Technology Trends for 2015:Computing Everywhere - As mobile devices continu...
American interest in online privacy and surveillance programs has jumped since Edward Snowden’s revelations about digital government surveillance in the United States. Deteriorating public relations have plagued intelligence agencies that have been identified as participating in the ma...
For many of us old enough to remember, the early days of life online had little to do with the internet. Before we browsed the open web, we dialed into Prodigy or CompuServe or AOL with a 1400-baud telephone modem. Once connected to a particular service, we used its proprietary sof...
A recent Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent (l). This forecast was gleaned from a just released Emergent Research and Intuit study. Th...
Frontier Communications’ (NASDAQ:FTR) newest customer service center, focused on supporting customers of its Frontier Secure business unit, has opened in the Eastbay Technology Park, Building D, in Provo, Utah. Frontier Secure has hired 50 employees to date and looks to hire approx...
Akamai Technologies has completed its acquisition of Prolexic Technologies, Inc., a privately held company based in Hollywood, Florida that provides cloud-based security solutions for protecting data centers and enterprise IP applications from distributed denial of service (DDoS) attac...
Last year’s revelations of government surveillance programs by the NSA and others, along with possible lack of enforcement of the Safe Harbor program by the FTC, caused the European Civil Liberties Committee to recommend suspending the entire EU-U.S. Safe Harbor approach. If the recomm...
In September, the NCOIC delivered the Geospatial Community Cloud (GCC) demonstration. Sponsored by the National Geospatial-Intelligence Agency, this demonstration showed how an interoperable, hybrid-cloud operating environment can be quickly enabled and used as a rapid response capabil...
Today I am announcing my partnership with EITAGlobal to produce and deliver a series of business focused training webinars on cloud computing. Headquartered in Fremont, California, EITAGlobal is a continuing professional education provider with a difference. Their strategy delivers ef...
Today I'm proud and honored to announce my appointment to the Board of Advisors for Veterans 360. Their mission is to provide young, recently-separated combat veterans with a program of support that will help them develop the professional and interpersonal skills needed to succeed in c...
As the lead in managing an organization's information technology platform, infrastructure and operations (I&O) professional have typically been focused on the technical aspects of provisioning, management, governance and security. This represents only 44% of the IT value chain. While e...
Next month, the Network Centric Operations Industry Consortium (NCOIC) will introduce an open pattern that will enable governments, agencies and businesses to create a secure, hybrid IT environment quickly and cost effectively. Cloud computing expert Kevin Jackson has been named to lea...
As more business applications move to the cloud, security seems to be top-of-mind for all concerned parties. Also, the Bring Your Own Device (BYOD) to work trend, along with more smartphones and tablets that require wireless connectivity in the workplace, has increased the level of con...
I've just had the opportunity to preview my good friend Melvin Greer's newest effort, "21st Century Leadership: Harnessing Innovation, Accelerating Business Success". Now in pre-release, this book highlights the compelling linkage between internet scale technology, advance business mod...
The NGA project began in late 2012 with Cycle One, during which the cloud infrastructure was defined and built. The NCOIC team established standards and processes, utilized best practices, and addressed potential problems such as ownership, bandwidth, latency, availability, access and ...