Some GBC findings suggest that Daniel’s non-technical credentials could actually be an asset in dealing with the current cyber threat landscape.
ALL INSIGHTS POSTS
To stop the tens of thousands of cyber attacks against them each year, federal agencies are turning to continuous monitoring, which uses big data analytics to detect potential threats.
DoD is ahead of the curve in continuous diagnostics & mitigation (CDM), but is its data infrastructure ready for the Three V's?
Just months before its December drawdown deadline, the military’s retrograde operations still face considerable hurdles
Ever since the fluorescent cubicle seclusion model co-opted the souls of designers in the 1960s, the convention has had few challengers-- until now.
Why open source, hybrid clouds are the key to a more modern government
Although management and security challenges remain, mobility could be key for attracting innovative employees.
Adapting to a more commercialized defense acquisition process will pit DoD's efforts to maintain control over intellectual property against the pressures of the global marketplace.
While improving cloud security continues to be an important theme as the world prepares for the Internet of Things, human factors --not a direct breach of Apple’s systems-- were the likely cause of the leak.