August 3, 2016
Close the Gap between Threat Detection and Response with User and Entity Behavior Analytics premium
Could user and entity behavior analytics (UEBA) be the missing piece of the puzzle that security teams have been waiting for in their bid to outmaneuver threat actors? As the average amount of time passed to identify data breaches caused by malicious attacks reaches staggering proportions (265 days) and the mean amount of time to […]
premium
Government Writer
August 1, 2016
4 Technology Stories You May Have Missed Last Week premium
The Most Critical Skills Gap: Cybersecurity Since Target’s hack back in 2013, cybersecurity has been top of mind for organizations, especially those with sensitive information. However, the talent pool of those who are skilled in intrusion detection, secure software development and attack mitigation is not growing at the same rate as the demand. Many reasons […]
premium
Tech Writer
July 29, 2016
BIM for Facility Management: The Disconnect Between AEC Firms and Building Owners premium
For government building owners and managers, BIM delivers demonstrable value from design, through construction, and into operations. In fact, BIM is just as much about digitizing facilities management (FM) as it is about virtual construction says Kath Fontana, FRICS, in her article, 10 things facilities managers should know about BIM. A great example of BIM […]
premium
Autodesk Tech Writer
July 28, 2016
Why US Airports Should Leverage BIM for Infrastructure Woes premium
U.S. airport infrastructure is under pressure. With a rebounding economy comes more air travel. This places more demand on airport operators to guarantee passengers and cargo carriers a safe, secure, and efficient experience. But in an increasingly merger-driven airline industry, where hubs are being consolidated at breakneck speed, keeping pace with change is a challenge. […]
premium
Government Writer
July 26, 2016
Here’s a pop quiz: What is Your Cloud Readiness Factor (CRF)? premium
Cloud computing is no doubt on the mind of IT teams at every college and university. But moving to the cloud isn’t just an IT decision. The unique culture within Higher Ed impacts how cloud buying decisions are made. For example, students inhabit a multi-platform world and expect interoperability across devices and desktops. Funding and […]
premium
SVP Cloud Solutions, DLT
July 25, 2016
4 Technology Stories You May Have Missed Last Week premium
Technology Is Monitoring the Urban Landscape Technology is changing the urban landscape in the U.S., starting with San Francisco, by automating and remodeling buildings and streets. Parking spaces will be cut down, thanks to Uber, Lyft and self-driving cars making car-sharing easier, and buildings will be remodeled using 3D printing and robots to help with […]
premium
Tech Writer
July 22, 2016
6 Best Practices for Moving Beyond a Reactive, Point-Product Security Infrastructure premium
Incident response (IR) teams are overwhelmed. Larger attack surfaces, state-sponsored cyber terrorism, and the industrialization of cyber crime all create fires and headaches for IR teams. According to a survey by Intel Security, investigations are taking up too much time. Scoping an attack, finding out what systems were impacted, what was altered, and what other […]
premium
Government Writer
July 20, 2016
Smart Records Retention for Government Social Media Content premium
Social media has had a significant impact on federal, state, and local governments across the country. From the routine to the critical, social media has become a vital tool for building awareness of missions, sharing policy updates, communicating services and products, and enhancing citizen engagement. The immediacy of social media is also particularly useful to […]
premium
Tech Writer
July 18, 2016
4 Technology Stories You May Have Missed Last Week premium
Posing as Ransomware, Windows Malware Just Deletes Victims’ Files Ranscam, a new ransom malware which threatens the deletion of files unless a Bitcoin payment is made, has surfaced on a small batch of computers, says Cisco Talos. Cisco Talos discovered the malware on a few of their customers’ computers and reported that every message was […]
premium
Tech Writer