Grooming the Next Generation of Cybersecurity Professionals
The growing number of cybersecurity threats is becoming a daily occurrence that organizations must prepare for. Hacktivist groups like Anonymous and LulzSec have made it a game to point out, in a very...
View ArticleRSA Conference 2012: Inside the Event
By Daniel Nowak, Lead Security Architect I spent late last month in the San Francisco Bay area imbibing the energy of the original Sin city—the energy, the Golden Gate, the flavorful culture, the Blue...
View ArticleShooting phish in a barrel: Attacks grow among government agencies
Could it be as easy as shooting phish in a barrel? We’ve seen a number of threats against government agencies this past year, many of which have been targeted by organizations looking to prove a point....
View ArticleExecutive Chef: Howard Schmidt Resignation Points to a Larger Issue in the...
Something that many people within the information security community rarely give thought to is how difficult and arduous the path to becoming “Chef” really is. It is not a role as defined by you or me,...
View ArticleStudy: Federal Government Failing at Mobility
The federal government is laser-focused on mobility. In fact, federal CIO, Steven VanRoekel, recently announced a comprehensive digital government strategy that details ways in which the government and...
View ArticleThe Graying of Black Hat, DEFCON and InfoSec Industry
This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...
View ArticlePODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...
With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...
View ArticlePODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...
This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...
View ArticleMcAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...
Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...
View ArticleThe Changing Face of InfoSec
Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...
View ArticleEffective Security Strategy Requires a Lifecycle Approach
A traditional IT security model typically requires a defense-in-depth strategy. Organizations believe that if they put in enough layers of security boxes, they can deter or catch the bad guys and keep...
View ArticleBest of Security in 2013
It’s hard to believe that 2013 is already coming to a close. Before we head into 2014, we want to take a moment and reflect on some of our most read content on TechSource this year. The first in this...
View ArticleCryptoLocker, Heartbleed and the Next Cybersecurity Threat
Although new security threats and vulnerabilities are constantly being discovered, three major security issues were recently exposed that can threaten virtually every citizen and corporation. The first...
View ArticleThe Benefits and Considerations of Big Data Implementations
With the proliferation of devices and sensors that generate data, today’s federal government agencies are faced with the difficult task of storing, managing and sharing a mountain of data and...
View ArticleIs the Government Ready for FedRAMP Ready?
To ensure that the cloud solutions and services being implemented by government agencies are secure and meet an established set of standards, experts from multiple federal agencies, including GSA,...
View ArticleThe Graying of Black Hat, DEFCON and InfoSec Industry
This past week was easily one of the most compact and dense information security experiences to be had within the continental U.S. Inside of a short five days, a large chunk of the world’s active...
View ArticlePODCAST: Lisa Dezzutti, CEO and President of Market Connections, Discusses...
With uncertain budgetary times looming ahead, many government contractors are dealing with new realities. Where once was year-over-year organic growth, now contractors need to seek new revenue streams...
View ArticlePODCAST: Daniel Nowak, Principal Security Architect, Iron Bow, Discusses Key...
This month we will be featuring a series of interviews with various subject matter experts on future trends in the areas of cybersecurity, virtualization, cloud, mobility and collaboration. Today we...
View ArticleMcAfee’s Ken Kartsen Discusses the Security Challenges Impacting the Adoption...
Data is the modern paper. Where once we produced reams of paper that needed to be stored, we now generate terabytes of data that need to be managed, stored, shared and, most importantly, secured. These...
View ArticleThe Changing Face of InfoSec
Having wanted to attend Jeff Carr’s Suits and Spooks (SNS) event for a number of years, life offered me a touch of luck since his latest event landed in Arlington, VA – just a quick jaunt from our Iron...
View Article