John Linkous


As the pirates of Silicon Valley rage against each other – as they have for decades – with patent infringement suits, new technology introductions, verbal quips against competitive CEOs, and a host of other one-upsmanship activities that would make any Congressional Committee Chair proud, we’ve recently seen an interesting coalescence of solidarity among technology companies that hasn’t been seen in ages: a united – and ultimately successful – front against SOPA, the Stop Online Privacy Act.

While privacy-focused organizations such as the Electronic Frontier Foundation have been laser-focused on stopping technology-focused legislation that restricts privacy for some time, this is perhaps the first occasion since the NSA’s introduction of the ill-fated Clipper Chip in 1993 that has brought together so many industry competitors into what is being portrayed as a fight for their very survival. By proclaiming the House-driven SOPA and its sister bill in the Senate, PIPA, as “Blacklist Bills” that will stifle First Amendment speech, fail to curtail online piracy, and present a nightmare engineering scenario for everyone from ISPs, to corporate network managers, to federal agencies, corporations and public policy groups alike (such as the EFF) have killed this legislation. Internet stalwarts such as Wikipedia and Reddit went “black” for a 24-hour period in protest, and others (I’m looking at you, Craiglist and Google) displayed messages of solidarity with otherwise competitive organizations. Content providers kicked their P.R. and lobbying machines into high gear, and pulled hard on the ears of any Representative or Senator willing to listen. Keep reading →


Cyber, cyber, cyber… everywhere we turn today, cybersecurity is at the forefront of enterprise data and technology management.

This is, of course, a good thing; for far too many years – decades, in fact – functionality has trumped security, to the point where today’s massive focus on cybersecurity has become a constant echo of post-development and (to a lesser degree) post-implementation activity. As we continue to build the cybersecurity wave, we as a nation have unfortunately lost focus of what is commonly pointed to (incorrectly, as we’ll point out shortly) as the “opposite” of information security: information privacy. Keep reading →


As a person who works with both the federal government and private industry, I’m lucky to be able to see the recent focus on federal cybersecurity not only from the perspective of lawmakers and agencies, but also from the outside looking in. Unfortunately, the view from both perspectives isn’t very pretty. Throughout the lifecycle of federally-mandated cybersecurity, there is inconsistency, overlap, and contradiction across the spectrum, from legislation, to implementation, to awareness and communication.

The federal government clearly wants to lead by example in cybersecurity; but a leader without direction, focus or communication skills is no leader at all.” Keep reading →


After five-plus years of smartphones saturating the market, it’s become clear that mobile device applications are an unqualified phenomenon, and a boon to application developers and app store vendors.

Apple recently reported that it is currently selling more than 1 billion mobile apps every month from the Apple Store; that’s an average rate of 23,148 apps per minute! The number of available apps is also increasing at an almost exponential rate. As the Apple marketing campaign goes, “there’s an app for that”, and not just on Apple’s app store: Google’s Andriod Marketplace, Microsoft’s Windows Marketplace for Mobile, RIM’s Blackberry App World, Symbian’s Horizon, and many others provide instant, downloadable applications and content that range from absolutely free, to thousands of dollars. Keep reading →

Among all of the many breaches of data over the past year across both the public and private sector, none seems to strike more fear into the hearts of federal agencies, managers and security personnel more than Wikileaks. To be sure, the Wikileaks incidents have caused more than their fair share of reputational damage, embarrassment to federal officials, criminal response, and calls from angry Congressmen to establish yet another layer of regulation and auditing to help prevent this type of issue in the future.

But what’s really insidious about Wikileaks is the nature of the crime: unlike the external attacks perpetrated by Anonymous, LulzSec, and other third parties by breaching security controls, Wikileaks was allegedly committed by an insider who already had access to the information he is suspected of leaking to Wikileaks. Keep reading →


Mobile computing technologies represent a true paradigm shift for organizations, providing an unprecedented level of autonomy and productivity for users by eliminating geographical barriers.

The traditional model of centralized applications and data are rapidly fading away as users continue to exploit the value of on-demand information regardless of geographic boundaries. From the user’s perspective, mobile technology is fantastic. Keep reading →