The Graying of Black Hat, DEFCON and InfoSec Industry
This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...
View ArticlePODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...
With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...
View ArticlePODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...
This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...
View ArticleMcAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...
Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...
View ArticleThe Changing Face of InfoSec
Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...
View ArticleEffective Security Strategy Requires a Lifecycle Approach
A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep...
View ArticleBest of Security in 2013
It’s hard to believe that 2013 is already coming to a close. Before we head into 2014, we want to take a moment and reflect on some of our most read content on TechSource this year. The first in this...
View ArticleCryptoLocker, Heartbleed and the Next Cybersecurity Threat
Although new security threats and vulnerabilities are constantly being discovered, three major security issues were recently exposed that can threaten virtually every citizen and corporation. The first...
View ArticleThe Benefits and Considerations of Big Data Implementations
With the proliferation of devices and sensors that generate data, today’s federal government agencies are faced with the difficult task of storing, managing and sharing a mountain of data and...
View ArticleIs the Government Ready for FedRAMP Ready?
To ensure that the cloud solutions and services being implemented by government agencies are secure and meet an established set of standards, experts from multiple federal agencies, including GSA,...
View Article