October 4, 2015    /    by

North Carolina IT Leaders Share New Technology Agency Plans

North Carolina Governor Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State Chief Information Officer Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.

Credit N.C. Dept. of Information Technology READ MORE

September 27, 2015    /    by

Will the New Cyber Understanding with China Bring Change?

A new 'understanding' on cybersecurity was announced this past week during Chinese President Xi Jinping's formal state visit. But while this agreement certainly offers a positive step forward for security in cyberspace, many questions remain unanswered.

President Obama with Chinese President

Credit: Flickr/White House/Pete Souza READ MORE

September 20, 2015    /    by

For Elected Officials: A Guide to Address Online Security

Elected officials often fail to prioritize cybersecurity until after a data breach when it's too late. So what are the important security issues and actions that are needed by state and local elected officials right now? A new guide by Governing magazine and CGI was just released to answer that question.

Credit: Governing and CGI Group READ MORE

September 11, 2015    /    by

Where Next for Government Cybersecurity?

On the 14th anniversary of 9/11/01, there are plenty of reasons to be thankful regarding public safety in America. And yet, there is also a growing list of cyberthreats that are grabbing news headlines almost daily. To help understand where we are today and where we are going regarding federal government cybersecurity initiatives, I interviewed Dr. Andy Ozment, the U.S. Department of Homeland Security assistant secretary, who is the new point person for the National Cybersecurity and Communications Integration Center.

Dr. Andy OzmentDHS Assistant Secretary Andy Ozment. Photo: U.S. Dept. of Homeland Security

Everyone in America remembers where they were on Sept. 11, 2001. As we think back over the years, there have been physical attacks thwarted and numerous close calls. READ MORE

September 6, 2015    /    by

Free Open Source Security Tools Offer Intelligence-Based Defense

Lockheed Martin recently released new open source tools to help defend enterprises from cyberattacks. The system, called Laika BOSS, offers a malware detection and analysis framework for security analysts to share intelligence with other cyber defenders worldwide. Here's my interview with leading cyberexperts who are offering cutting-edge insights and workable solutions to emerging battles in cyberspace.

Laika BOSS

Many technology companies offer free open source software and security tools to help protect enterprise systems and networks from dangerous cyberattacks. For example, Google and Facebook released free open source cybersecurity tools last year “to help security professionals gather statistics about bugs and malware, without infringing on individual users' privacy.” READ MORE

August 30, 2015    /    by

What to Do About Phishing?

Phishing and spear-phishing are growing problems. The clever enticements to click are getting more sophisticated and more targeted than ever. The data breach costs are mounting. What can your organization do to take phishing awareness and response to the next level?


Shutterstock/wk1003mike READ MORE

August 23, 2015    /    by

Reinventing: What Government Leaders Can Learn From Tim Tebow

Many government technology leaders are struggling. From national headlines to local audit findings, the majority of the news has not been good. Meanwhile, public trust in government as a whole is near historic lows. What can be done? Is it time for reinvention? Back to the drawing board? If so, there is a lot to learn from the journey and actions of Tim Tebow.


Credit: Flickr/Intel Free Press READ MORE

August 16, 2015    /    by

The Security Startup Challenge: Winners Offer Innovative Ideas

The technology and security industries are struggling to keep up with an ever-growing list of problems and cyberattack vectors. There has been a consistent call for new solutions to address evolving cyberspace challenges. One popular answer: New innovative startup companies to help. In order to accelerate these companies, the 'Security Startup Challenge' was formed earlier this year by Kaspersky Lab and several partners. And now, we have the winners.

Security Startup Challenge Winners

Credit: The Security Startup Challenge READ MORE

August 9, 2015    /    by

Intelligence Sharing Partnerships Are Needed to Improve Critical Infrastructure Cybersecurity

A new survey of top IT executives reconfirms the findings from other recent cybersecurity studies regarding the online defense at utilities and other vitally important public- and private-sector organizations. The report outlines what is good and what needs improvement in our online defense of critical infrastructure facilities.

Grand Coulee Dam

Credit: Shutterstock/Matt Ragen  READ MORE

August 2, 2015    /    by

Hacking: When Your White Hat Is Really a Black Hat

A series of recent news headlines reveal cybersecurity experts, who were being paid to defend networks, battle malware and fight cybercrime, were actually black hat hackers. What happened and what can be done to address this growing trend? Is your enterprise prepared?

hacker picture

Credit: Shutterstock/Amir Kaljikovic READ MORE