Will Samsung’s KNOX, Centrify Deliver Knockout Punch to BlackBerry?

Doug Miller by Doug Miller, SafeGov.org
Monday, February 25, 2013

In August I wrote a piece for AOL Government asking: “After BlackBerries, What’s Next For Government Mobile Users?” We were all witnessing the decline of BlackBerries as a favored mobile device for government users and I discussed the alternatives that existed in the marketplace.

Point of View: Improving Critical Infrastructure Cybersecurity

The Chertoff Group,  Wednesday, February 13, 2013

During his State of the Union address on Tuesday, President Obama declared that "America must also face the rapidly growing threat from cyber-attacks." On the same day, he signed the "Improving Critical Infrastructure Cybersecurity" Executive Order to strengthen cyber defenses and better protect our economic and national security.

National Institute of Standards and Technology Initiates Development of New Cybersecurity Framework

National Institute of Standards and Technology,  Wednesday, February 13, 2013

The National Institute of Standards and Technology (NIST) today announced the first step in the development of a Cybersecurity Framework, which will be a set of voluntary standards and best practices to guide industry in reducing cyber risks to the networks and computers that are vital to the nation’s economy, security and daily life.

Obama orders voluntary security standards for critical industries’ computer networks

Ellen Nakashima, Washington Post,  Tuesday, February 12, 2013

Citing the growing threat from cyberattacks, President Obama on Tuesday announced that he had signed an executive order that calls for the creation of voluntary standards to boost the security of computer networks in critical industries such as those that keep trains from colliding and drinking water clean.

Too Easy – Chinese Malware Gives Complete Control to Attackers

Gavin Long by Gavin Long, Civitas Group
Thursday, January 17, 2013

Recently, Microsoft’s Digital Crimes Unit discovered the botnet Nitol – Chinese malware embedded in more than 4,000 computers purchased by consumers from U.S. retailers. The malware equipped hackers with the ability to remotely turn on the machines; record users by hacking microphones and webcams; and log all keystrokes, including passwords and banking information. This breach shows us just how vulnerable our supply chains really are. The ease by which cyber thieves are attacking trusted U.S. providers is sobering.

Will FedRAMP Become Mainstream in 2013?

Doug Miller by Doug Miller, SafeGov.org
Wednesday, January 16, 2013

If 2012 was the year for finalizing FedRAMP as a streamlined security program for government cloud computing, 2013 may be the year where the work pays off and vendors start announcing certified FedRAMP cloud computing solutions. But even as vendors get their solutions FedRAMP certified, does FedRAMP really address all the potential concerns an agency might have for implementing a robust cloud computing solution?

Cloud as a prescription for health data security

Julie Anderson by Julie Anderson, Civitas Group
Friday, January 11, 2013

Despite major disagreements over the implications of Obamacare, both Democrats and Republicans have at least agreed on one issue that will benefit all Americans: a transition to electronic records is necessary to increase the effectiveness of the U.S. medical system and the privacy of medical records.

How to improve federal security

Julie AndersonKaren Evans by Julie Anderson, Civitas Group
Karen Evans, KE&T Partners
Tuesday, January 01, 2013

SafeGov experts Karen Evans and Julie Anderson join FederalNewsRadio host John Gilroy to discuss improvements in cyber security.

Who is responsible when the gun discharges?

Scott Andersen by Scott Andersen, Unisys
Thursday, August 16, 2012

Recently, I spent some time with a group of people considering cyber security from a number of different sides and levels. We had an interesting scenario discussion where we debated the correct way to handle a specific behavior-related situation.

The Security of, you!

Scott Andersen by Scott Andersen, Unisys
Tuesday, May 22, 2012

Something you have, and something you know resulting in a secure connection to whatever you were connecting to. Security being the prime protector the way we keep the information at our fingertips but not at the fingertips of those whom we are protecting against.