Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Latest Blogs from Government Cyber Assurance
There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to ...
Is there more than bitcoin to blockchain? Absolutely, because today's blockchain is opening up a pathtowards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it's more famous bitcoin use case. As a fundamental digital tool...
Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While t...
Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on ...
A couple of weeks ago while attending IBM Interconnect 2017 I had the awesome opportunity to participate in the IBM Interconnect 2017 Podcast Series with Dez Blanchfield. I not only got to pontificate on all things tech, but also had the honor of collaborating with some of the best min...
In today’s globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have ...
Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty...
As cloud computing becomes the information technology mainstream, data center technology is accelerating at a breakneck speed. Concepts like software define infrastructure, data center analytics and Nonvolatile Memory Express (NVMe) over Fabrics are changing the very nature of data cen...
In 2016, cloud computing started to dominate many IT market segments. As a business, Synergy Research Group reported that industry revenue for the four quarters ended Sept. 30 grew 25%. Operator and vendor revenue for six segments of cloud computing reached $148 billion during that per...
The City of Beaverton is located seven miles west of Portland, Oregon, in the Tualatin River Valley, It encompasses 19.6 square miles, and is home to more than 95,000 residents. The city is Oregon’s sixth largest and the second-largest incorporated city in Washington County. Located in...
From the rise of increasingly capable nation-states—like Iran and North Korea—conducting destructive attacks against American private sector companies, to the continuing pace of IP theft by China striking at the very heart of our innovation economy, the new team at the White House will...
End of year predictions in December are as predictable as tomorrow’s sunrise, but a recent video on 2017 Technology Trends helped me really understand how important a digital transformation strategy is to just about any business executive. The CSC Town Hall conversation actually identi...
Firebrand, the leader in Accelerated Learning, has recently announced it's 2017 delivery schedule for their accelerated CloudMASTER® training course. Delivered in partnership with Logical Operations and the NCTA, this unique opportunity to immerse yourself in cloud computing will be of...
Olisipo Learning in Portugal has a culture that is based on the constant search for new challenges. Recognized by their clients as the “Best HR Supplier”, they have placed more than 450 specialists into some of the country's most attractive and innovative IT projects. As a leading Port...
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, hel...
As cloud computing simultaneously transforms multiple industries many have wondered about how this trend will affect manufacturing. Often characterized as “staid”, this vertical is not often cited when leading edge technological change is the topic. This view, however, fails to address...
The ongoing digital transformation continues to generate a steady demand for workers with increasingly sophisticated digital skills. This process is multi-dimensional and workers with these highly specialized skills are very much sought after. The European Union Commissionestimates tha...
A recent report by Praetorian, a cybersecurity company headquartered in Austin, TX, focused on threats that resulted in data compromise or access to sensitive information. Based on a review of 100 separate internal penetration test engagements the study identified the five most prevale...
So how could a NCTA Certified CloudMASTER accelerate his career in the fashion industry?To answer that question, you would need to catch up with George Youmans, Jr. He has been with fashion giant Ralph Lauren since October 2012. That was around the time he decided to complete the NCTA ...
The CompTIA Cloud+certification validates the skills and expertise of IT practitioners in implementing and maintaining cloud technologies. This is exactly what it takes to become a good cloud technician. In the past few years, however, the National Cloud Technologists Association (NC...
Since May 2010, “Cloud Musings” has demonstrated, educated and celebrated the use of advanced technology in business. Specific subjects are sometimes varied, but cloud computing and cybersecurity seem to have become our sweet-spot. Over this period, information technology has transform...
For over 30 years, New Horizons has provided more than 30 million students with industry-leading technical training that delivers the most relevant and intuitive computer courses and certifications. They are the world’s largest independent IT training company, with over 300 computer tr...
A steel bar is resistant to stress and is capable of maintaining its form while bearing large loads. While steel is also known as one of the world's strongest metal's (Titanium, Tungsten and Iconel round out the top four), it is also susceptible to shearing and completely breaking. A r...
I learned quite a bit about the Trusted Analytics Platform (TAP). TAP is an open source project that Intel developed to make it easier for developers and data scientists to deploy custom big data analytics solutions in the cloud as well as reduce development costs and time-to-market. A...
Our world is driven by data. It may speak in whispers, but it can also scream insight and information to those that understand it’s language. This is why I’ll be attending Strata+Hadoop World, Sept 26th to 29th, in New York City. Even though data can also speak many different languag...
JUST ANNOUNCED!!I am personally excited to be delivering the (ISC)² CCSP Two-Day Crash Course at RSA Conference 2017!"The current state of cybersecurity means there are many opportunities for the industry as a whole to collaborate on new innovations. Discovering the next great opp...
Powered by Singapore-based Big Data start-up Crayon Data, BigData-MadeSimple.com tapped the insurance industry as being at the forefront of integrating cloud technology into their digital eco system. As stated in one of their recent articles "Cloud based platforms, storage and applica...
In a recent CloudTech article multi-cloud, or hybrid cloud, strategy was heralded as “… transformative for businesses, allowing them flexibility to scale offerings, save on hosting solutions, and ultimately offer better solutions to their customers. The article goes on to cite: A 201...
It was late 2011 and Steven Donovan was comfortable working at SHI International Corporation, a growing information technology firm, as a personal computer break/fix technician. His company had been growing quickly from a $1 million "software-only" regional re-seller into eventually be...
Cloud computing is now entering adolescent. With all the early adopters now swimming in the cloud pool with that “I told you so” smug, fast followers are just barely beating the early majority. The gold rush to cloud is also driving the IT herd to get cloud computing training. Traini...
The U.S. Army Intelligence and Security Command (INSCOM) has awarded BAE Systems a five-year contract worth as much as $75 million to provide enhanced geospatial intelligence technical and analytical support. The award was issued under the INSCOM Global Intelligence indefinite deliver...
Karen Field, Penton Communications' IoT Institute director, in her article "Start Small to Gain Big," postulated an oil drilling platform with 30,000 sensors would generate about 1 Terabyte of data per day. She also stressed that only 1% of that data would likely be used. From a system...
IoT networking requirements are vastly different from those supported by today's cloud network. The processing and transport levels are multiple orders of magnitude higher than ever seen before. More importantly though, societal economic and the safety ramifications of making mistakes ...
The "Internet of Things" depends on the "Cloud" for the processing and storage of data. The Cloud's backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network. Imagine a sea of sensors, put out in...
Enterprise storage is trending away from traditional, enterprise managed network-attached storage (NAS) and storage area networks (SAN) towards a more complex environment that includes software-defined and cloud-based solutions. Spinning disks are also being replaced with flash arrays ...
Enterprises must rethink network management in the cloud computing world. This new reality is driven by the rise of software defined networking, the virtualization of everything and a business imperative to create and deploy even newer information delivery models. With the entire infra...
In the mythical, medieval land of AWS, a civil war brews between the several noble Cloud Services over rulership. Meanwhile, across the sea, the former controlling dynasty, Traditional IT, attempts to make its way back home and reclaim the throne with the help of the "Do It Yourself" o...
Not to long ago I was honored to be included as a storage expert in the Dell ebook, "10 Ways to Flash Forward: Future-Ready Storage Insights from the Experts." This publication provided insight into some of the most recent advances in enterprise storage and gave some excellent recomend...
A few weeks ago I had the pleasure of doing a Blab on advanced storage with Daniel Newman and Eric Vanderburg. We covered some pretty interesting points on enterprise storage challenges, advanced storage trends and flash. If you didn't catch it, a replay is now available.
The definition of DevOps emphasizes collaboration and communication between software developers and other IT professionals while automating the software delivery and infrastructure change process. While agile software development and the use of automated infrastructure configuration to...