How to Keep Your Company’s Information Organized

The larger that your company grows, the more vital that it is for all the information your company processes to be properly organized at all times. Information organization quality is directly correlated with just how actionable the information is. Accurate information organization puts your company in the best position to develop fully customized white label […]

Creating The New Cyber Warrior: Eight South Carolina Universities Compete

When Defense Secretary Hagel announced that he was going to expand his cyber workforce by more than 6,000 by the end of 2016, I think most of us in the industry collectively wondered: “Where the heck is he going to FIND these cyber warriors?” While almost every University is paying attention to this career enhancing […]

DISA Provides A milCloud Overview: Looks like progress, but watch for two big risks

DISA released the information below as an update on milCloud, an integrated suite of capabilities designed to drive agility into the development, deployment and maintenance of DoD applications. I have no insider information on this activity, but reading between the lines leads me to conclude there are two key risks to this program. My sense […]

Calling in Cyber Strikes, "Reckless" Cyber Attacks Against the US, and More

Here is today’s federal cybersecurity and information technology news: Debora Plunkett, head of the National Security Agency’s Information Assurance Directorate, accused other nations of launching “reckless” cyber attacks against the United States without “any sense of restraint.” More here.  Nearly 3,000 donors were fooled into giving over $570,000 to a network of look-alike campaign websites in what […]

Personal Mobile Devices in DoD by 2014 but not in NSA and More

Here is today’s federal cybersecurity and information technology news: Bruce Bennett, program executive officer of communications systems within the Defense Information Systems Agency, predicted that Department of Defense personnel may be able to use personal mobile device for unclassified data in late 2013 or early 2014. More here. A White House science advisory panel has recommended federal and commercial users […]

Planning continues for the FedCyber.com Government-Industry Computer Security Summit

Two weeks ago we pre-announced the FedCyber.com Government-Industry Computer Security Summit. On 28 September 2011 a small number of cyber innovators, computer security practitioners and information assurance experts will gather in an attempt to map out new paths for positive change in the cyber security dynamic.This summit seeks dramatically enhance the state of security and […]