Featured Government Content

  1. Third-Party Auditor Helps Verify Red-Light Camera Issued Violations
    2/27/2017

    Winter Park Police use StarTraq Assurance to detect anomalies and verify violations. By Christine Kern, contributing writer

  2. FBI Launches “Most Wanted” App
    2/15/2017

    Federal agencies use mobile applications to make it easier to find fugitives and missing persons. By Christine Kern, contributing writer

  3. Helping Federal Agencies “Ace The Big Data Test”
    2/14/2017

    Federal agencies must address data collaboration woes to ace the Big Data test. By Christine Kern, contributing writer

  4. Study: Chief Data Officers Make Difference For Federal Agencies
    12/19/2016

    Eighty-eight percent of agencies with a CDO say they have a positive impact. By Christine Kern, contributing writer

  5. Hacking Attacks Raise Fears As U.S. Military Increasingly Outsources IT
    12/6/2016

    Security must extend to affiliated entities to ensure protection of sensitive data. By Christine Kern, contributing writer

  6. Growing Insider Threats And The Need For End User Cybersecurity Engagement
    12/5/2016

    Nearly half of IT pros are more concerned about insider threats than external ones. By Christine Kern, contributing writer

  7. 48% Of Organizations Have Suffered Ransomware Attacks In Past Year
    11/29/2016

    It takes an average of 33 hours to recover from a ransomware attack. By Christine Kern, contributing writer

  8. Feds Could Save More Than $5B Annually By Improving Actionable Cyber Awareness
    11/28/2016

    New study highlights the need for better threat monitoring, correlation, and protection automation. By Christine Kern, contributing writer

  9. 95% Of Ransomware Attacks Bypass Firewalls; 77% Permeate Email Filtering
    11/22/2016

    One-third of attacks were successful even when victims had undergone security awareness training. By Christine Kern, contributing writer

  10. Implications Of China’s National Cybersecurity Law
    11/17/2016

    A new report examines cloud adoption practices and priorities in the Chinese Financial Sector. By Christine Kern, contributing writer