"The Federal government today is in the midst of a revolution. The revolution
is challenging the norms of government by introducing new ways of serving the
people. New models for creating services and delivering information; new
policies and procedures that are redefining federal acquisition and what it
means to be a federal system integrator. This revolution also lacks the
physical and tangible artifacts of the past. Its ephemeral nature, global
expanse and economic impact all combine in a tidal wave of change. This
revolution is called cloud computing."
Sponsored by ViON Corporation, my latest whitepaper looks at the challenges
government organizations face as they transition to the cloud computing
"What many saw as merely political theater, Vivek Kundra and Steven Van
Roekel leveraged this amazing confluence of events as the impetus for
reinventing gover... (more)
The CISO Role in Cybersecurity: Solo or Team Sport?
The average length of time in the commercial sector between a network
security breach and when the detection of that breach is more than 240 days,
according to Gregory Touhill, deputy assistant secretary of Cybersecurity
Operations and Programs for the Department of Homeland Security. What could
happen to your company during that eight-month period? Could your company
This alarming statistic is just one of the reasons why the National
Cybersecurity Institute at Excelsior College (NCI) undertook the task of
surveying ... (more)
I woke up this morning to the devastating news about the earthquake in Nepal.
Sitting here in California that destruction is literally on the other side of
the world but my mind immediately went to thinking about my good friend
See Jeremy and his family have been living in Kathmandu for a while now. His
wife, in fact, is the Danish Ambassador to Nepal!
Being a social media kind of guy, I immediately went online to see if Jeremy
was active, but then the other shoe dropped. I realized that I was selfishly
neglecting my global online readership! A quick look at TweepsM... (more)
By Jodi Kohut
Government Cloud Computing Professional
March is Women's History Month. As we celebrate women and their role in our
history, our workplaces, and our homes, I thought it was important to bring
to the forefront some of the strengths that might make them stand out as
compelling agents of change in such a time as this in the IT industry.
Recent research reveals that while women account for about one-half of the
labor force, their numbers for employment in science, technology,
engineering, and math (STEM) fields continues to lag behind men. There is
much speculation as t... (more)
By Melvin Greer
Managing Director, Greer Institute for Leadership and Innovation
Without question, the rise in cyberleaks, nation-state cyber terrorism and
the beach of consumer data across multiple industry domains has led to a
heightened awareness of the enterprise and personal responsibilities
associated with cybersecurity. The consumerization of IT and the adoption of
cloud, mobile and social media by enterprise organizations is opening a new
threat landscape and new threat vectors. Everyone is affected and everyone is
talking about it, from senior executives to teenagers.