May 4, 2014    /    by

The identity crisis within social networks

Facebook, Google, LinkedIn and others want to be your trusted data broker

social media

Credit: Gil C/Shutterstock.com READ MORE

April 27, 2014    /    by

Digital Deception: Watch out for click fraud, shady metrics and biased reviews online

Tempting the click is everywhere in cyberspace. Keep asking: Is that really true?

Photo Credit: Shutterstock READ MORE

April 19, 2014    /    by

Pennsylvania Cyber Leaders Share Insights

CIO and CISO offer the nation best-practices to mitigate cyberthreats.

Penn CIO/CISO

Pennsylvania CIO Tony Encinias (right) with CISO Erik Avakian (left)  READ MORE

April 13, 2014    /    by

Fixing the Heartbleed Bug is essential: But don't forget Windows XP migration

Security pros are feeling the pressure. Are you ready for another action-packed week?

out of time clock

photo credit: Shutterstock READ MORE

April 5, 2014    /    by

Interviews with top state government security leaders: CIO/CSO profile for Delaware

We can learn from front-line government experts who are 'in the arena.' Delaware is raising the bar for the nation in many areas of cybersecurity.

Delaware CIO Jim Sills with CSO Elayne Starkey  READ MORE

March 30, 2014    /    by

Implementing the Cybersecurity Framework within State and Local Governments

A key NIST Cybersecurity Framework kickoff event was held in Washington DC this week. What happened, what can we learn from the event and what's next?

US Capitol

Photo Credit: Shutterstock READ MORE

March 22, 2014    /    by

Interviews with top state government security leaders: CIO/CISO profile for Mississippi

I am kicking-off a series of interviews with state and local government CIOs and CISOs from around the country. The goal is simple: To listen to their words and learn from their ideas and actions.

Mississippi CIO and CISO

Mississippi CIO Dr. Craig Orgeron & CISO Mr. Jay White READ MORE

March 16, 2014    /    by

Big data analytics versus privacy: How can they both win?

Can these hot trends mix, or are they like oil and water? Can we find middle ground on data? Or, will these two trains collide? Do you feel the tension building yet?

Big data in elections

Photo Credit: AP/Gus Ruelas READ MORE

March 9, 2014    /    by

Ten Recommendations for Security Awareness Programs

How do we improve the security culture in our organizations? It's time to take another look at what works for security awareness programs.

Hand on keyboard

How do we improve the security culture in our organizations? Our security team keeps coming back to that fundamental question, and we are constantly looking for ways to help. READ MORE

March 2, 2014    /    by

What's next for privacy?

RSA Conference sessions ask: Who can you really trust to protect your data online?

Keyboard privacy

Photo credit: Flickr/webhamster READ MORE