April 19, 2014    /    by

Pennsylvania Cyber Leaders Share Insights

CIO and CISO offer the nation best-practices to mitigate cyberthreats

Penn CIO/CISO

Pennsylvania CIO Tony Encinias (right) with CISO Erik Avakian (left)  READ MORE

April 13, 2014    /    by

Fixing the Heartbleed Bug is essential: But don't forget Windows XP migration

Security pros are feeling the pressure. Are you ready for another action-packed week?

out of time clock

photo credit: Shutterstock READ MORE

April 5, 2014    /    by

Interviews with top state government security leaders: CIO/CSO profile for Delaware

We can learn from front-line government experts who are 'in the arena.' Delaware is raising the bar for the nation in many areas of cybersecurity.

Delaware CIO Jim Sills with CSO Elayne Starkey  READ MORE

March 30, 2014    /    by

Implementing the Cybersecurity Framework within State and Local Governments

A key NIST Cybersecurity Framework kickoff event was held in Washington DC this week. What happened, what can we learn from the event and what's next?

US Capitol

Photo Credit: Shutterstock READ MORE

March 22, 2014    /    by

Interviews with top state government security leaders: CIO/CISO profile for Mississippi

I am kicking-off a series of interviews with state and local government CIOs and CISOs from around the country. The goal is simple: To listen to their words and learn from their ideas and actions.

Mississippi CIO and CISO

Mississippi CIO Dr. Craig Orgeron & CISO Mr. Jay White READ MORE

March 16, 2014    /    by

Big data analytics versus privacy: How can they both win?

Can these hot trends mix, or are they like oil and water? Can we find middle ground on data? Or, will these two trains collide? Do you feel the tension building yet?

Big data in elections

Photo Credit: AP/Gus Ruelas READ MORE

March 9, 2014    /    by

Ten Recommendations for Security Awareness Programs

How do we improve the security culture in our organizations? It's time to take another look at what works for security awareness programs.

Hand on keyboard

How do we improve the security culture in our organizations? Our security team keeps coming back to that fundamental question, and we are constantly looking for ways to help. READ MORE

March 2, 2014    /    by

What's next for privacy?

RSA Conference sessions ask: Who can you really trust to protect your data online?

Keyboard privacy

Photo credit: Flickr/webhamster READ MORE

February 21, 2014    /    by

What the 2014 RSA Conference means for government: Top things to do

Even if you are not going to California, you still need to pay attention.

Moscone Center

Moscone Center, San Francisco, credit moscone.com READ MORE

February 15, 2014    /    by

NIST Cybersecurity Framework: Five reasons why it matters for your infrastructure

This new approach matters more than most people realize.