Join Women in Cybersecurity This Week in Dallas

Women in Cybersecurity (WiCyS) is hosting its third annual Women in Cybersecurity event on March 31 through April 2 at the Hyatt Regency DFW International Airport. WiCyS continues to innovatively expand its mission to bring together women in cybersecurity from academia, research and industry. This event is designed as a forum for speakers and guests to exchange knowledge, […]

Federal Agencies Now Have Access to “Fast Start” Cybersecurity Assessments Via Pre-Competed GWAC

Government agencies face continuing challenges in enhancing service to citizens and critical functions of support to the economy, law enforcement and national security. And now every agency also faces new challenges in serving those missions in an age of cyber conflict. Organizations and even other nations have demonstrated an unrelenting focus on their attempts to […]

Fed Tech Roundup January 14

The following are some of the hot topics in the federal technology ecosystem (fromFedTechTicker.com and TopTechTicker.com):  Fed Tech Ticker Overnight Tech: State of the Union turns up light on tech – The Hill US must keep pace with China in cyberspace – FCW.com NASA Advisory Panel Releases 2015 Safety Report New auto safety standards are coming, and […]

The Global Cyber Alliance Appoints Philip Reitinger as its First President and CEO

Editor’s note: We have known and admired the work of Phil Reitinger for decades and believe his strengths make him uniquely qualified to successfully make progress in the important missions of this new global alliance for good. – bg From: www.globalcyberalliance.org The Global Cyber Alliance (GCA), an international, cross-sector not-for-profit designed to identify, confront, and prevent […]

Cyber Security for Government 2015

Proactive Strategies for Managing Cyber Vulnerabilities Join the conversation of Cyber Security for Government among peers from Federal, State and local levels of government nationwide in Washington DC. The recent Office of Personnel Management (OPM) breach and Government Accountability Office (GAO) report point to the need for this conversation. The FBI has stated that it is not a […]

There Will Be Cyberwar: How The Move To Network-Centric War Fighting Has Set The Stage by Richard Stiennon

With new technology, come new problems. Oft times, with the increasing demand for the latest and greatest tech, security is more of an after thought. What has been a consistent theme is developing the next best technology, and then figuring out how to protect it. Before the tests are run to find the gaps, a […]