Sequestration – Do More with Less
You don't have to live in the Washington D.C. area and spend your days working to improve the lives of our dedicated public servants to realize that the tone and tenor of our Nation's fiscal...
View ArticleDiscovery: why bother?
Discovery is an industry buzzword today. IT organizations want to know what's on their networks. What's installed, what it does, and how it's configured. They want to know for several reasons: risk...
View ArticleIdentity is the new perimeter
When hordes of barbarians are bearing down upon you, there is something very comforting about a secure perimeter. Nothing feels secure like a castle and a big moat.So what does it mean when people say,...
View ArticleBYOD – The solution not the problem
After being hacked, Twitter just announced that it would implement Two Factor Authentication (2FA). Google offers Two Factor Authentication and so does Microsoft.Two Factor Authentication is not a new...
View ArticleSecurity and ITAM
I read a blog this week from Nate Rushfinn on ITAM (IT Asset Management), titled ITAM is Boring to Boys with Toys. In the blog post, Nate goes on to discuss how ITAM, boring though it may be, is a...
View ArticleTransforming Government through IT – an alternative view
When you hear the term "Transforming Government though IT", what comes to mind? For me, I think of Service Virtualization, Cloud Computing and Security. If you come up with the same list, you won't be...
View ArticleIdentity-Centric Security – Leveraging Today’s Trends to Enable and Protect...
Recently, one of my colleagues completed a series of blogs on security in this day and age. Sumner Blount is a Director in the Security business unit here at CA Technologies. I would like to share with...
View Article
More Pages to Explore .....