Some GBC findings suggest that Daniel’s non-technical credentials could actually be an asset in dealing with the current cyber threat landscape.
ALL GOVERNMENT BUSINESS COUNCIL POSTS
To stop the tens of thousands of cyber attacks against them each year, federal agencies are turning to continuous monitoring, which uses big data analytics to detect potential threats.
DoD is ahead of the curve in continuous diagnostics & mitigation (CDM), but is its data infrastructure ready for the Three V's?
Just months before its December drawdown deadline, the military’s retrograde operations still face considerable hurdles
Ever since the fluorescent cubicle seclusion model co-opted the souls of designers in the 1960s, the convention has had few challengers-- until now.
Although management and security challenges remain, mobility could be key for attracting innovative employees.
Adapting to a more commercialized defense acquisition process will pit DoD's efforts to maintain control over intellectual property against the pressures of the global marketplace.
While improving cloud security continues to be an important theme as the world prepares for the Internet of Things, human factors --not a direct breach of Apple’s systems-- were the likely cause of the leak.
The Pentagon’s updated acquisition reform initiative emphasizes technological innovation, but its efforts to improve communication among stakeholders are at least as important.
Technological and process failures have resulted in preventable tragedy and pose a threat to bridge safety nationwide.