virtualization

2011 could very well be called “Year of the Cyber Attack” given the thousands of reported and unreported hacking events. There is no doubt cyber threats facing governments and companies have certainly increased, but they’ve been met by host of powerful new ways to respond to them. Like a sickness to the body, industry and government have been working hard to build immunity with varying degrees of success.

Virtualization and cloud strategies now allow large and small companies to manage their data architecture with a flexibility that was impossible a few years ago. New collaboration software allows them to share documents more reliably on secure storage spaces. Modern data centers allow them to make their data continuously available to those who should have access to it, and invisible to those who don’t. The exponential growth of mobile devices drives an exponential growth in security risks. Keep reading →


Email and SharePoint are no brainers for CIOs looking to move parts of the computing operations to the cloud. But what’s next? Not surprisingly as the Air Force drives to consolidate data centers and move apps to the cloud, IT executives are looking to virtualize as many applications as make sense.

But “sometimes it is difficult to determine what should actually be virtualized,” said Frank Konieczny, Air Force Chief Technology Officer, during a recent Federal Executive Forum on Emerging Technologies. Keep reading →

This article was originally published by FedInsider.

CIOs often say that cybersecurity should be built into software and systems, and not thought of as a later add-on. In practice this ideal is seldom reached. But the National Nuclear Security Administration is in the midst of a three-pronged IT initiative to both modernize its infrastructure and get closer to having cybersecurity baked in. Keep reading →

Page 2 of 212