Govtech.com
August 20, 2012    /    by

MS-ISAC Annual Meeting 2012 in Atlanta

I'm at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days.

   I’m at the Multi-State Information Sharing & Analysis Center (MS-ISAC) Annual Meeting in Atlanta, where the state and local government Chief Security Officers (CSOs), Chief Information Security Officers (CISOs) and many of their top team members have gathered for three days. The MS-ISAC is now a division of the Center for Internet Security (CIS), and this group plays a vital role in cybersecurity information sharing and situational awareness between the Department of Homeland Security (DHS) and state and local governments.

These meetings provide a venue for collaboration and comparing notes amongst the cyber leaders in federal, state and local government.  For the last few years, the meetings have been held in conjunction with the GFIRST conference, which is sponsored by DHS. READ MORE

August 18, 2012    /    by

Is That Wireless Network Legal?

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer Part 2 of this story.

Back in late June, I wrote about connectivity options while traveling during my vacation in Ocean City, Maryland. The blog was entitled: Vacation WiFi: What Networks Can We Trust? Now, thanks to some emails from an online friend who wishes to remain anonymous, I can offer “Part 2” of this story.

To summarize my vacation wireless options, I wrote: READ MORE

August 12, 2012    /    by

Cybermania: How do you spell cyber... everything?

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber... whatever.

Have you noticed some new words showing up in magazines and newspapers around the country? Words like: cyberattack, cyberwar , cybercrime and cyber…. whatever.

This brings up an interesting question: How do you spell cyber… anything? While this may seem like a trivial topic, I do think it matters. READ MORE

August 4, 2012    /    by

India Suffers Worst Power Outage in History: What Can We Learn?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. What can we learn from this?

Suddenly, without warning, no power. The blackout spreads. The grid goes down. Six hundred million residents, which is one-tenth of the world’s population, left in the dark in the summer heat for a second day. That was India this past week.

Here’s one news report: READ MORE

July 28, 2012    /    by

Could The Olympics Bring Down Your Network? Here's Some Advice

The 2012 Summer Olympic Games are here, and the five to eight hour time difference between the mainland USA and the UK may be just the right combination to bust your work network(s).

I have some time sensitive information for network and security administrators around the country:

Don’t be lulled to sleep by the lack of network traffic at work from the Olympic Games opening ceremony. READ MORE

July 22, 2012    /    by

Game On: The London Olympic Security Teams Can Still Go for the Silver (Lining)

For security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. But while gold may be out of reach, the security teams can still go for the silver lining.

The countdown clock began long ago. We’re now under a week to go until the 2012 Summer Olympic Games begin in the United Kingdom (UK). But sadly for security pros preparing for this massive undertaking, the unflattering headlines pretty much summed up ongoing security problems. Here are a few samples:

Wall Street Journal: An Olympic Security Mess READ MORE

July 14, 2012    /    by

Putting a Defensible Deletion Strategy in Place: An Interview with Jim McGann

e-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

Jim McGanne-Discovery, information management and the legal aspects associated with enterprise data are hot topics for technology leaders to address with their business customers. But what information governance strategies are legally defensible? What compliance approaches work best in the long run? How can enterprises reduce risk when they save or delete data?

To answer these questions, along with several related security topics, I recently interviewed Jim McGann, who is VP of Marketing for Index Engines, a leading electronic discovery provider based in New Jersey. READ MORE

July 7, 2012    /    by

What Can We Learn from Malware Monday?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist. Can we learn anything from this?

Over the past few weeks, global news outlets have been warning users about Malware Monday and the pending Internet shutdown on July 9, 2012, for computers still infected with the DNSChanger malware. While the issue is certainly real, this blogger believes many headlines were (and still are) too alarmist.

For example, I view much of this material as “Fear, Uncertainty and Doubt” (FUD): READ MORE

June 30, 2012    /    by

Vacation WiFi: What Networks Can We Trust?

I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up. I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

 I was recently on vacation with my family in Ocean City, Maryland. As I powered up my iPad from our fifth floor condo on 136th Street, more than a half dozen wireless networks popped up.  I asked myself: Can I use (or trust) any of these? Are they free? Is it worth the risk, if they are?

The names were intriguing to me, ranging from Netgear58-5G to Oceanside136 to OceanNet Public Internet ST to Wireless Beach Access.  Some of these networks had locks next to them and others did not.  Clicking on a few of the options, I received a splash screen asking for a credit or debit card numbers. The price for access ranged from $4.99 for one hour to $9.99 for 24 hours to $42.99 for one month (31 days). READ MORE

June 16, 2012    /    by

Favorite Survival Tips for Using Social Media

What's appropriate and what's not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly? What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

  What’s appropriate and what’s not regarding the use of social networks? Beyond formal codes of conduct at work, what behaviors and attitudes will likely lead to trouble? What tips can we share from those who have gone before us and learned about the good, the bad and the ugly?  What good habits enable a positive experience in the long run? And, what are some examples of social media technology being used in destructive ways that undermine relationships?

These are topics that need more attention, in my opinion. READ MORE