Government

Last week, the General Services Administration had the pleasure of hosting a roundtable in Washington, D.C., that brought together federal CIOs, CTOs, and thought leaders in technology from the public and private sectors. Together, they discussed the future of government IT, and how agencies should respond to shrinking budgets and increased expectations for workplace efficiency.

Owing to the growing disparity between shrinking budgets and the need for emerging technologies, agency CIOs are under increasing pressure to do more with less. Keep reading →


Republican presidential candidate Herman Cain made only indirect references to recent sexual harassment allegations but addressed a slew of other topics — from his famed tax plan to technology’s role in economic growth — at a speaking engagement in Northern Virginia on Wednesday.

Cain received a warm welcome and several bouts of laughter and applause in a ballroom full of Northern Virginia Technology Council members at the Ritz-Carlton in McLean, Virginia. Keep reading →

COMMENTARY:
A new arms race began a few years back and its rapid revolutions will make the cold war era look like a minuscule research project for a white paper!

The new race is to develop offensive, defensive and intelligence collection capabilities for cyber space operations. Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

COMMENTARY:
The cyber threats we face today routinely transcend industries, geographic boarders as well as government, military, and business domains. The impact of the aggressive cyber attacks we have witnessed recently, however, have become so substantial that it has now reached priority status in the executive suite.

“C” level executives are now routinely involved when their organizations experience one of these attacks. That is a departure from what we have seen. Keep reading →