state
Why the Future of Freedom, and Secure Communications, Is in the Cloud
We enjoy a wonderful array of freedoms in our nation. But with the ever-shrinking news cycle and flurry of daily life, that fact is often ignored. It’s easy to forget that our freedoms started with thousands of farmers, small business owners, laborers, and other colonists seeking self-governance. To…
The big myth about security patch management
“If we had just kept our systems patched, the malware wouldn’t have been a problem.” After every major breach you usually hear those words echoed across news media. You might even pause for a moment and tell yourself that if the victims had just patched their systems, they would have bee…
Edge and fog computing: Key to safer streets? (Part 3)
In parts one and two, we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing and how they may be the key to smarter cities. In our third and final blog, we’ll break with the old west theme a bit and look to the future of transportation. From aut…
What’s all the buzz about integrated, threat-driven CDM?
The rollout of the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program has been a game changer for government agencies. And whether you realize it or not, you’re just getting to the good part. As you leave Phases 1 and 2 behind (who and what is on the network)…
Edge and fog computing: The key to smarter cities? (Part 2)
In part one (Edge and fog computing: Cutting through the haze), we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing. Now, we’ll explore how government can use them to improve our communities. Edge and fog computing hold great potential to mak…
Annual Cybersecurity Report: Impacts on Government
Cyber attacks against government are growing In our just released 2018 Annual Cybersecurity Report: Impacts on Government, we found that cyber attacks against agencies across the U.S. are increasing every day. From ransomware and distributed denial of service (DDoS) to IoT botnets and cryptojacking,…
Trick-Or-Treat? As Cybersecurity Month winds down, which will your agency pick?
As Cybersecurity Awareness Month draws to a close and All Hallows’ Eve nears, it’s time for one last thought. And it is, appropriately, a dark one – the “Dark Web”. It is the graveyard of the Internet, a maze of death-filled tombs and twisted conjurings that are giving average, everyday…
Experience the Digital Community at Cisco Live
Cities, states, and other communities continue to face an increasing variety of challenges: traffic congestion, parking, public safety and security, waste and water management, and access to education and healthcare. As such, government leaders are looking to technology to solve these challenges, wh…
Use Cloud Collaboration to Improve Your Agency’s Communication
Collaboration technologies power a new way of working where everyone, everywhere can be more productive through face-to-face and instantaneous communication. In previous posts, we’ve discussed how VoIP, TelePresence and Mobile Collaboration are reshaping the government workspace. For those organiza…
4