Govtech.com
July 5, 2015    /    by

Should We Start Over with the Internet?

Network failures. Colossal data breaches. Global online privacy problems. The bad news reignites debate. Do Internet troubles necessitate a new start? Is it time to push the 'reset' button? But others say that cyberspace is improving and will go much further -- even solving a long list of historic problems. One thing is indisputable: The Internet is changing rapidly before our eyes.

Reset

Credit: Shutterstock/Christian Delbert READ MORE

June 28, 2015    /    by

False Alert: Can You Really Trust that Tweet for Emergency Communications?

A recent article in The New York Times describes a highly coordinated disinformation campaign using social media. This scary development raises new questions about the reliability of alerts and other emergency communications that rely on social media platforms. Will disinformation campaigns become a growing trend that will undermine recent advances in spreading important information during emergencies?

Twitter pic

Over the past few years, there has been skyrocketing growth in the use of social media to get the word out during emergency situations. From fires to disease outbreaks to police shootings, more and more people turn to Twitter, Facebook or other social media sites to get the latest updates on incidents from reliable sources and "friends." READ MORE

June 21, 2015    /    by

Data Breach: Why We Need a Scale

Data breaches are becoming much more common. Most states have laws mandating the public disclosure of data breaches where personally identifiable information (PII) is at risk. Cyberinsurance policies even cover data breach costs. However, not all data breaches are the same. We need a data breach scale. Here's why...

Scale

“We have a confirmed data breach.” Those are the words that no security or technology professional wants to hear. READ MORE

June 13, 2015    /    by

Top Strategies from Ohio Government's Technology and Security Leaders

We are continuing the series of interviews with top CIOs and CISOs from around the nation regarding the best state and local government cybersecurity strategies. This week, we turn toward the Buckeye State to learn from two respected executive leaders. At a time when the federal government is reeling from a major OPM data breach, this security discussion has never been more important.

Ohio Leaders

Ohio CIO Stu Davis (left) with CISO David Brown   credit: Ohio State Government READ MORE

June 6, 2015    /    by

A Life of Lies and Spies: Interview with Author Alan B. Trabue on his Real-Life CIA Adventures

Alan B. Trabue worked for the CIA for over 38 years, and he has hundreds of true stories to tell about domestic and foreign agents and lies and spies. He has just published an amazing book that tells about his career as a covert operations polygraph interrogator with exciting travels all over the world. For anyone who is interested in polygraph exams or for those who are intrigued by the complexities of intelligence operations around the world, you must read this book. Here is a brief book preview and an interview with the author of 'A Life of Lies and Spies.'

Lies and Spies book cover

America loves reading spy-thrillers and watching James Bond movies. From Tom Clancy to Daniel Silva novels and from James Bond to the Bourne film series, we can never seem to get enough action-packed adventure. But it is rare to get a glimpse of what really goes on behind the scenes at the CIA and around the world in the global intelligence community. READ MORE

May 30, 2015    /    by

Interview with Retiring MS-ISAC Founder Will Pelgrin and Incoming CIS CEO Jane Lute

Will Pelgrin started the MS-ISAC more than a decade ago, and he is a leading voice in government cyberdefense. Tomorrow is his last day with the Center for Internet Security, and I caught up with him and new CEO Jane Lute to discuss the past, the present and the future of global cybersecurity -- especially within governments.

Will Pelgrin

William F. Pelgrin   Credit: Center for Internet Security READ MORE

May 25, 2015    /    by

Smart Cities Resources: Who, What, When, Where and How?

Everyone is talking about smart cities. And yet, new public- and private-sector questions are emerging as more organizations engage with this global technology megatrend. So how can you take these opportunities to the next level? Who are the leaders within this hot Internet of Things (IoT) category? Which academic studies and white papers offer best practices and the most helpful resources to take your region to the next level? What cyber-risks are emerging? Here are answers and resources to consider.

connected cityMost large urban areas like (and want) the label “smart city,” but what does that really mean? When and where will smarter things start to happen? Who is offering the latest white papers and how can you engage with public- and private-sector organizations? Where can you go for thoughtful answers?

These are just a few of the questions that I wanted to answer as I researched the latest government technology infrastructure trends around the world. I captured some of what I have learned so far in this blog, in the hope that an initial primer will help teams around the world as they investigate best practices within smart cities. READ MORE

May 18, 2015    /    by

Cyber Terrorism: How Dangerous is the ISIS Cyber Caliphate Threat?

Industry experts disagree on whether the Islamic State’s ability to mount a dangerous cyberattack is a top concern or an emerging online threat or completely overblown. But one thing is not in doubt, ISIS is making news headlines in 2015 for their exploits in cyberspace. In my view, ISIS is an emerging online threat to keep a close watch on. Here’s why.

“The electronic war has not yet begun.”

That was one message released in video on Monday, May 11, 2015, from a hacker group that claimed to be affiliated with the Islamic State. According to the International Business Times: READ MORE

May 11, 2015    /    by

Federal Cybersecurity Legislation

The latest bills, privacy concerns and information-sharing actions.

This has been a busy few months inside the Washington, D.C., Beltway for policy topics related to cybersecurity. President Obama signed an executive order in February regarding the promotion of private-sector information sharing. The U.S. Congress is now debating several bills, as both sides of the political aisle agree that addressing cybersecurity is an urgent issue.

According to TheHill.com: “President Obama recently called cyberattacks a “national emergency,” and the cybersecurity legislation has moved through the Republican-controlled Congress relatively quickly because leaders from both political parties recognize that cybercrime threatens us all in a very big way. Now.” READ MORE

May 3, 2015    /    by

Middle East Cybersecurity and Infrastructure: Dubai Offers a Different Model

I traveled to the United Arab Emirates (UAE) this past week to present the opening keynote at the Gulf Information Security Expo & Conference (GISEC 2015) in Dubai. The event offered a refreshing mix of leading global voices on security and technology topics. But most surprising, the Gulf region's public and private sector executive leaders who presented, the companies exhibiting and the amazing city as a whole offered attendees a different perspective and a positive model for the current cybersecurity and technology infrastructure challenges in the Middle East and the world as a whole.

What are the cybersecurity and infrastructure challenges facing the Middle East? How are companies and governments in the region responding to cyberattacks? Are governments in the region working together with Western nations in the global battle on cybercrime? Why is Dubai considered to be a model “smart city” in the world? Is traveling in the Middle East even safe right now? READ MORE