Welcome!


Federal Government

A recent press report quoted unnamed US intelligence sources saying Russia had no intention of invading the Ukraine. The appraisal became the subject of considerable debate when Russian President Vladimir Putin ordered his nation's military into Ukraine's Crimea region. Follow-on media...
Federal records management is an increasingly complex undertaking in the era of big data. Three principles are needed for success in records management: capture on creation; manage and secure through the workflow; and archive responsibly.
In my last blog, I discussed the debate surrounding the true definition of open and unfettered Internet, and the different interpretations various groups and individuals have on the matter. In this posting, we continue the discussion. The U.S. government has not enacted legislation to...
My name is Larry Warnock, and I'm the CEO of Gazzang, a data security software company based in Austin, Texas. Our headquarters are actually right across the street from the Capital Factory which you visited this past May. I recognize that the healthcare.gov launch hasn't exactly met ...
As with other industries, the daily operations of law enforcement and criminal justice organizations rely heavily on obtaining, holding and sharing sensitive data. The FBI’s Criminal Justice Information System (CJIS) is responsible for providing many critical pieces of data that crimin...
Most people would agree that finding terrorists and stopping them before they can wreak havoc is a good thing. It is also safe to assume that most people would allow that the US Government should be in the intelligence-gathering business, if only to stop the aforesaid terrorists. Count...
George Newstrom, head of Dell's federal government defense and national security business, outlines the evolution of information technology from mainframes and servers to "disruptive" technologies such as cloud computing and mobile devices. Platform one saw mainframes and terminals hi...
There are several certainties in computer security. One is that when adversaries have intent they will always find a way to get what they want. Another certainty is that leadership in government and industry is quick to forget the lessons learned in cyber security, especially those dea...
US Defense Secretary Leon Panetta said in a speech in New York City that America is facing a cyber Pearl Harbor that could result in the death of civilians and paralyze the country, scaring everybody out of their wits. He’s thinking about hacks on critical infrastructure, energy g...

Here is today’s federal cybersecurity and information technology news: U.S. Cyber Command recently conducted a tactical-level exercise called Cyber Guard where it collaborated with subject matter experts from the National Security Agency, the National Guard, the Department of ...

Cyber attacks on government systems are increasing at an exponential rate. Over a three-year period, government agencies reported a 400-percent increase in attempted incursions into federal systems. While there is no current data on the number of attempts to compromise intelligence and...

Here is today’s federal cybersecurity and information technology news: Customs and Border Protection plans to purchase an outside computer program to track aircraft inventories despite Homeland Security Secretary Janet Napolitano’s call to use existing capabilities. More here....

Government agencies in the United States and around the world are increasing their use of social media to enhance the quality of government services and to encourage more citizen engagement and dialog. When used properly, social media can build trust and develop more efficient communic...

CTOvision, CTOlabs and the tech consultancy behind them Crucial Point LLC are all run out of the Washington DC area. We seek global views of technology but this region is definitely our base and we have  a very high percentage of readers in the local ecosystem. For those of you here...

Here is today’s federal cybersecurity and information technology news: IBM and the Lawrence Livermore National Laboratory are working together on the Vulcan supercomputer to analyze data for developing new technologies in applied energy, green energy, manufacturing, data manag...

Today’s federal cybersecurity and information technology news: The U.S. Office of Naval Research is partnering with Chilean scientists to develop a mobile application to provide information helpful in countering pirates, arms traffickers, and illegal fishermen. More here. The Arm...
This week Ustream gets an injection of political reality, Apple fixes a critical encryption blunder affecting some of its users, FBI documents are leaked detailing their worries over Bitcoin digital currency, and Anonymous takes down more Governmental websites as part of its ongoing op...
Today’s federal cybersecurity and information technology news round-up: The proposed Social Networking Online Protection Act (SNOPA) would make it illegal for employers to demand access rto social media accounts. More here. The Defense Advanced Research Projects Agency has reques...
Today’s federal cybersecurity and information technology news: The White House has threatened to veto the Cyber Intelligence Sharing and Protection Act (CISPA) if it reaches the President in its current form. More here. The Office of Management and Budget agrees, asking President...
NASA was hacked 13 times last year, resulting in major breaches of sensitive government data. Hackers working from Chinese IP addresses gained full access to NASA’s files, employee credentials and system logs. Unencrypted laptops were also stolen containing codes for controlling the In...
Linode Hacked, Bitcoins Stolen: Linode.com, popular provider of virtual private servers (VPS) systems responded to a morning breach of it’s control panel software, which apparently enabled a malicious attacker to gain control over several virtual servers of a bitcoin service named Bitc...
United States military contractors are under unprecedented pressure to find ways to cut costs for their federal government customers despite the interest in developing new technologies to fight the war on terrorism. Gone are the days when contracts would swell exponentially without any...
An alphabetical selection of some of the many themes & topics to be discussed at Cloud Expo Silicon Valley (9th Cloud Expo) - being held November 7-10, 2011, at the Santa Clara Convention Center, CA. The markets may still be melting, but Cloud Expo is definitely coming of age!
Howard Schmidt, the cyber security czar for the Obama administration, stated it clearly when he said, "the government needs to focus its cyber security efforts to fight online crime and espionage." As cyber security coordinator at the White House Schmidt published the Comprehensive Na...
Sen. Joe Lieberman of Connecticut has said he will retire when his term expires at the end of 2012. For those among us who kind of dig the Internet, this cannot come soon enough. He recently went on record saying he wanted “to clear the air once and for all” regarding his wacky idea o...
If you are a technologist in the IT industry I would like to recommend some reading to you. The US Department of Commerce has unveiled a report which includes a policy framework designed to enhance the protection of consumer privacy online while supporting innovation and continued enha...
With all the commotion recently regarding the airports new back-scatter x-ray machines,(privacy, health etc.) I wanted a first hand look/feel at this experience. While I am sensitive to and an advocate for issues of privacy regarding persons with medical conditions and children, the ...
Is Web 3.0 maybe going to be less the utopia we've been envisaging and more like the real, physical world, with all the real-world limitations that follow along with it...?| The latest WikiLeaks ("Cablegate") affair, coming as it does at the very end of the first decade of the 21st ...
The federal government needs to step up continuous monitoring of its IT infrastructure and move beyond outdated security reporting methods, says a recent panel at a trade organization conference, in a story I read online. That’s entirely consistent with the wish list that I’ve been hea...
Within the $79 billion--which is actually a slight reduction from the 2010 budget--there is a $50 million allocation for cross-governmental experimentation, as nicely reported by Wyatt Kash in the far-more-responsible-than-BW publication Government Computer News. Kash further reported ...
The headlines are no surprise to those in the Internet business. "Police in Central China have shut down a hacker training operation that openly recruited thousands of membersonline…" ( AP) We've know China, Russia, and several of the former Soviet block countries are the source of sop...
Today, Brad Smith, senior vice president and general counsel at Microsoft Corp., urged both Congress and the information technology industry to act now to ensure that the burgeoning era of cloud computing is guided by an international commitment to privacy, security and transparency fo...
Right before Christmas, the White House tapped Microsoft’s long-ago chief security officer, the CEO of the non-profit Information Security Forum Howard Schmidt as head of US cyber security. Despite the national priority, between pressure from US companies and reported infighting am...
Newspapers and blogs around the globe have been carrying an amazing story of technological arrogance and organizational ineptitude regarding security of a key data feed from US intelligence systems. We read headlines like: “Iraq Insurgents Hack US Drones” (WSJ), “Hacked Drones: How Se...
Attendance at today's Armed Forces Communications and Electronics Association (AFCEA) Bethesda Chapter Breakfast Series entitled "Federal Cloud Computing Environments – Modernizing IT Systems" was very heavy, as viewed from the Blackstone Technology Group sponsored table. The panel dis...

Starting December 2, 2009, the Armed Forces Communications and Electronics Association (AFCEA) will be putti...
As part of a continuing Government Cloud computing education program, Dataline, LLC has released a Government Cloud Computing Value Survey. This online resource has been designed as an aid to help Federal agencies explore the value of cloud computing. Through a 15 minute interactive se...
"Many people don't realize - or forget - that some of our greatest advancements in the 20th century grew out of innovation in the space and intel programs in the Federal government. We may be returning to that with regard to Cloud Computing." In this brief interview with SYS-CON's Clo...
Jill Tummler Singer, Deputy Chief Information Officer at the Central Intelligence Agency (CIA), is now a Ulitzer author. Appointed in November 2006, Ms Singer is responsible for ensuring CIA has the information, technology, and infrastructure necessary to effectively execute its missio...
China Security & Surveillance Technology, Inc. ("CSST" or the "Company") (NYSE: CSR; Nasdaq Dubai: CSR) announced that it has entered into definitive agreements with certain accredited investors at a price at $6.25 per share under its Form S-3 Registration Statement resulting in gros...