Monday, February 25, 2013
In August I wrote a piece for AOL Government asking: “After BlackBerries, What’s Next For Government Mobile Users?” We were all witnessing the decline of BlackBerries as a favored mobile device for government users and I discussed the alternatives that existed in the marketplace.
The Chertoff Group, Wednesday, February 13, 2013
During his State of the Union address on Tuesday, President Obama declared that "America must also face the rapidly growing threat from cyber-attacks." On the same day, he signed the "Improving Critical Infrastructure Cybersecurity" Executive Order to strengthen cyber defenses and better protect our economic and national security.
National Institute of Standards and Technology, Wednesday, February 13, 2013
The National Institute of Standards and Technology (NIST) today announced the first step in the development of a Cybersecurity Framework, which will be a set of voluntary standards and best practices to guide industry in reducing cyber risks to the networks and computers that are vital to the nation’s economy, security and daily life.
Ellen Nakashima, Washington Post, Tuesday, February 12, 2013
Citing the growing threat from cyberattacks, President Obama on Tuesday announced that he had signed an executive order that calls for the creation of voluntary standards to boost the security of computer networks in critical industries such as those that keep trains from colliding and drinking water clean.
Thursday, January 17, 2013
Recently, Microsoft’s Digital Crimes Unit discovered the botnet Nitol – Chinese malware embedded in more than 4,000 computers purchased by consumers from U.S. retailers. The malware equipped hackers with the ability to remotely turn on the machines; record users by hacking microphones and webcams; and log all keystrokes, including passwords and banking information. This breach shows us just how vulnerable our supply chains really are. The ease by which cyber thieves are attacking trusted U.S. providers is sobering.
Wednesday, January 16, 2013
If 2012 was the year for finalizing FedRAMP as a streamlined security program for government cloud computing, 2013 may be the year where the work pays off and vendors start announcing certified FedRAMP cloud computing solutions. But even as vendors get their solutions FedRAMP certified, does FedRAMP really address all the potential concerns an agency might have for implementing a robust cloud computing solution?
Friday, January 11, 2013
Despite major disagreements over the implications of Obamacare, both Democrats and Republicans have at least agreed on one issue that will benefit all Americans: a transition to electronic records is necessary to increase the effectiveness of the U.S. medical system and the privacy of medical records.
Thursday, August 16, 2012
Recently, I spent some time with a group of people considering cyber security from a number of different sides and levels. We had an interesting scenario discussion where we debated the correct way to handle a specific behavior-related situation.
Tuesday, May 22, 2012
Something you have, and something you know resulting in a secure connection to whatever you were connecting to. Security being the prime protector the way we keep the information at our fingertips but not at the fingertips of those whom we are protecting against.