Filter by category
By: Kathy StershicCloud computing has moved into the mainstream, and federal agencies are embracing it along with their private sector counterparts. While there have long been concerns about the security of cloud environments, particularly public cloud which dwells outside an agency’s firewall, big strides in cloud security have been made, increasing its attractiveness for a breadth of
By: Kathy StershicThe Northern Virginia Technology Council (NVTC) recently presented an expert panel discussion on blockchain technology’s potential to transform federal government business processes. Kudos to the panelists for making this mysterious and quickly-evolving technology a bit less formidable. At the most basic level, blockchain (also referred to as “distributed ledger”) stores transactions in a growing set
By: Tom ResauWith RSA Conference 2018, the world’s largest cybersecurity gathering, just wrapped up, people are asking me about this year’s big conference take-away. Past RSA events have often seen one or two blockbuster storylines dominate the show. This year that wasn’t the case. In the absence of major news or distractions, what I did hear instead
By: Tom ResauIt’s RSA time again. With 50,000 expected attendees from all over the world, the RSA Conference is the place to be for anyone wanting to make their mark in information security. Given the number of cybersecurity and privacy clients our firm is privileged to serve, we have a lot of firsthand experience with RSA—and how
By: Mike Atkinson(If you like this blog, please share it. Thanks!) You just landed that big media opportunity: In approximately 30 minutes, your client’s spokesperson will appear live on national television. And when you think nothing can go wrong, you get the call … Your spokesperson’s car broke down on the way to the studio. Now what?