Results 11-20 of 40

The 2014 QDR: A Pentagon Strategy that Delivers, well, Strategy

March 12, 2014arrow Using a 2010 panel's recommendations as a guide, the 2014 QDR shows the Pentagon is making progress on several fronts.

Priorities in Secure Cloud Storage: Where or How?

March 4, 2014arrow Is nationalizing the world's cloud infrastructure the best way to ensure security and privacy?

Social Diplomacy in Action in Ukraine

February 26, 2014arrow A U.S. ambassador's use of Twitter during the Ukrainian revolution reveals the value of social media for diplomacy.

4 Keys to Thwarting Insider Threat

February 21, 2014arrow At a recent Nextgov event, one of the Pentagon's top counterintelligence officials offered four recommendations for preventing insider threat.

How NIH Big Data is Advancing Human Genome Research

February 19, 2014arrow NIH has been utilizing Big Data to accelerate developments in human DNA analysis and cancer research.

How to Prevent the Next VA Backlog: Big Data

February 11, 2014arrow The VA must rely on big data tools to prevent the next generation of backlogged claims.

6 Things to Look for in the 2014 QDR

February 6, 2014arrow A 2010 independent review panel appointed by Congress offers benchmarks for evaluating the 2014 QDR.

3 Big Ways Data Is Improving DoD Performance

April 9, 2013Underwritten by arrow As part of 2012’s Big Data Research and Development Initiative, six major agencies committed funding “to greatly improve the tools and techniques needed to access, organize and glean discoveries from huge volumes of data.” The Department of Defense (DoD) is one of the biggest investors, funding $250 million worth of big data projects each year. While most of the funding currently goes toward the development of autonomous systems and improving the situational awareness, the data processing power behind these capabilities could also be leveraged to improve program performance.

Continuous Monitoring As a Service: A Shift in the Way Government Does Business

March 18, 2013Underwritten by arrow Though continuous monitoring has been “required” of agencies for several years, many lacked the inventory knowledge of their own systems to be able to implement continuous monitoring effectively. To close the gaps, the Department of Homeland Security (DHS) is taking steps to offer continuous monitoring as a service (CMaaS) to all civilian agencies, thereby giving agencies the support services they need to comply with previous mandates.

3 Mobile Security Threats A BYOD Strategy Should Prepare For

March 11, 2013Underwritten by arrow As government works to keep up with the mobile revolution, more applications are becoming available on personal devices. While these programs may simplify transactions and potentially decrease costs, they can also make the agency vulnerable to security breaches. One of the biggest threats is social engineering, a process by which a user is tricked into offering up information or access rights.