November 28, 2015    /    by

5 Online Mistakes to Avoid During the Holidays

The holiday season has arrived and so have the opportunities for Internet deals, sending and receiving holiday cards and many more online activities. Nevertheless, with the good comes the bad – as phishing scams, one-time bargains that are too good to be true and other cyber traps can lead to major headaches. Here are five common online mistakes to avoid as we head toward another New Year’s Eve.

November 21, 2015    /    by

After Paris Attacks: What Is the Future of Encryption?

The recent round of global terrorist attacks have reignited the homeland security versus personal privacy debate. Law enforcement officials point to the apparent use of encryption by ISIS terrorists as proof that encrypted communications need “back doors” to protect the public. But many security experts disagree. So what is the future for encrypted communication as we head into 2016?

credit Shutterstock/blurAZ


November 16, 2015    /    by

Get Ready for Next-Generation Endpoint Security

Advanced cyberthreats, zero-day exploits, sophisticated malware, ransomware and more. These are just a few of the daily challenges that enterprises face as they try to protect their network endpoints each and every day. How can it be done? Enter next-generation endpoint security products and services. Here’s an overview.

Flickr/Phil Whitehouse


November 7, 2015    /    by

Interview with Florida’s Technology and Security Leadership

Where is Florida heading regarding cybersecurity in government? What are the top priorities and hot projects? Hear what the Florida state CIO and CISO have to say in this exclusive interview.

Mr. Jason Allison, Florida's CIO, with Ms. Danielle Alvarez, Florida's CISO. credit Florida Agency for State Technology


November 1, 2015    /    by

Emerging Cyberthreats: What, When, Where and How?

Emerging cyberthreats are a hot topic at cybersecurity summits, in executive boardrooms and remain a top priority with back-office security teams. Here's what you need to know about where we've been, where we are and where online security threats are going.



October 24, 2015    /    by

Governments Need an Internet of Things Strategy

From smart drones to smart homes to smart cars that drive themselves, the world is dramatically changing all around us. So are governments ready to take advantage of these new innovative opportunities emerging within the Internet of Things (IoT)? Or, as almost everything gets connected to the Internet, could these newly connected devices become “Trojan Horses” that inadvertently bring the next generation of data breaches? What’s being done globally in the public sector with IoT right now?

Credit: Shutterstock/Macrovector


October 18, 2015    /    by

What Are Government Chief Information Officers Doing Now?

The National Association of State Chief Information Officers (NASCIO) held its annual conference in Salt Lake City, Utah, this past week. So what were the highlights? From the Internet of Things (IoT) to cloud computing to data center consolidation, which projects, technologies and issues rose to the top of the agenda? Most important, what’s on the minds of government CIOs, and what projects are they actually implementing as we move into 2016?

NASCIO Annual Conference in Utah


October 10, 2015    /    by

From Mississippi to Utah: Cybersecurity Awareness Month is Front and Center

It is October, so National Cybersecurity Awareness Month (NCAM) is front and center from sea to shining sea. But attention on information security, along with events and helpful publications, have evolved over the years. It’s time to take another look at the new resources along with helpful tools and relationships that can last long after your Halloween candy runs out.

Dan Lohrmann at Mississippi Cyber Summit credit: Mississippi ITS


October 4, 2015    /    by

North Carolina IT Leaders Share New Technology Agency Plans

North Carolina Gov. Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State CIO Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.

September 27, 2015    /    by

Will the New Cyber Understanding with China Bring Change?

A new 'understanding' on cybersecurity was announced this past week during Chinese President Xi Jinping's formal state visit. But while this agreement certainly offers a positive step forward for security in cyberspace, many questions remain unanswered.