December 6, 2015 /
What is the current situation regarding cybersecurity in Latin America? To answer this question, I turned to Mr. Carter Schoenberg, who is a respected industry security expert who recently started a cybersecurity company in Panama. Here’s the informative interview.
November 28, 2015 /
The holiday season has arrived and so have the opportunities for Internet deals, sending and receiving holiday cards and many more online activities. Nevertheless, with the good comes the bad – as phishing scams, one-time bargains that are too good to be true and other cyber traps can lead to major headaches. Here are five common online mistakes to avoid as we head toward another New Year’s Eve.
November 21, 2015 /
The recent round of global terrorist attacks have reignited the homeland security versus personal privacy debate. Law enforcement officials point to the apparent use of encryption by ISIS terrorists as proof that encrypted communications need “back doors” to protect the public. But many security experts disagree. So what is the future for encrypted communication as we head into 2016?
November 16, 2015 /
Advanced cyberthreats, zero-day exploits, sophisticated malware, ransomware and more. These are just a few of the daily challenges that enterprises face as they try to protect their network endpoints each and every day. How can it be done? Enter next-generation endpoint security products and services. Here’s an overview.
November 7, 2015 /
Where is Florida heading regarding cybersecurity in government? What are the top priorities and hot projects? Hear what the Florida state CIO and CISO have to say in this exclusive interview.
November 1, 2015 /
Emerging cyberthreats are a hot topic at cybersecurity summits, in executive boardrooms and remain a top priority with back-office security teams. Here's what you need to know about where we've been, where we are and where online security threats are going.
October 24, 2015 /
From smart drones to smart homes to smart cars that drive themselves, the world is dramatically changing all around us. So are governments ready to take advantage of these new innovative opportunities emerging within the Internet of Things (IoT)? Or, as almost everything gets connected to the Internet, could these newly connected devices become “Trojan Horses” that inadvertently bring the next generation of data breaches? What’s being done globally in the public sector with IoT right now?
October 18, 2015 /
The National Association of State Chief Information Officers (NASCIO) held its annual conference in Salt Lake City, Utah, this past week. So what were the highlights? From the Internet of Things (IoT) to cloud computing to data center consolidation, which projects, technologies and issues rose to the top of the agenda? Most important, what’s on the minds of government CIOs, and what projects are they actually implementing as we move into 2016?
October 10, 2015 /
It is October, so National Cybersecurity Awareness Month (NCAM) is front and center from sea to shining sea. But attention on information security, along with events and helpful publications, have evolved over the years. It’s time to take another look at the new resources along with helpful tools and relationships that can last long after your Halloween candy runs out.
October 4, 2015 /
North Carolina Gov. Pat McCrory just established the new Department of Information Technology as the single source of accountability and authority over state government technology projects. State CIO Chris Estes will lead the consolidation effort, along with executive support from his leadership team, including Chief Information Risk Officer Maria Thompson. So who are these leaders? What are their plans and priorities? Where are they heading regarding information security? These are just a few of the questions answered in this exclusive interview.