The Questions to Ask When Hiring an IT Security Consultant

by Jessica Thiefels, VP of Community Management for PolySwarm If you can’t afford an in-house IT security team, you have to look outside to find the support you need. However, if you lack IT security skills or knowledge, it can be [...]

The Questions to Ask When Hiring an IT Security Consultant 2018-05-24T13:27:08+00:00

Beware the ‘thought police:’ The dangers of human and AI integration

By Kevin McDonald Humans have always strived to become smarter, faster and more creative through the use of tools. Starting with the basic calculator and advancing to the amazing computing devices we use today, our use of technology as a [...]

Beware the ‘thought police:’ The dangers of human and AI integration 2018-04-10T22:13:45+00:00

Imran Awan case shows lax security controls for Congressional IT staff

By Kevin McDonald Investigations into the conduct of the IT staff of the House of Representatives raised alarms. Kevin McDonald explains what we can learn from the case of Imran Awan. Those who operate with high-level system access, [...]

Imran Awan case shows lax security controls for Congressional IT staff 2018-04-08T21:10:15+00:00

Private sector’s national cybersecurity strategy contributions lacking

By Kevin McDonald The U.S. government has been very public about its concern for national cybersecurity. There have been grandiose speeches, presidential declarations and several attempts by the legislature to pass new cybersecurity laws. Private companies should be responsible for [...]

Private sector’s national cybersecurity strategy contributions lacking 2018-01-31T01:05:51+00:00

How information technology advisory groups can benefit organizations

By Kevin McDonald In today's cyber environment, many public safety organizations struggle to advance their technology and maintain security. Many departments would love to seek out efficiencies through advanced, cost-saving technology. They know they must improve their cybersecurity and operating efficiency. [...]

How information technology advisory groups can benefit organizations 2017-12-27T23:10:14+00:00

CRN’s story on the CIA Wikileaks leak

Partners Say Alleged CIA Hacking Papers Prompt 'Constant Vigilance' In Mobile SecurityIn its news release on the so-called "Vault 7" documents, WikiLeaks describes a specialty CIA unit that develops malware to "infest, control and exfiltrate data" from iPhones as well [...]

CRN’s story on the CIA Wikileaks leak 2017-05-25T15:17:57+00:00

DFARS 252.204-7012 is going to define new winners and losers in defense contracting

Kevin McDonald has just published his latest article of DFARS (Defense Federal Acquisition Regulations Supplement) at SearchCompliance.TechTarget.com.If you fall into this category, a recently implemented rule from the Department of Defense called the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 [...]

DFARS 252.204-7012 is going to define new winners and losers in defense contracting 2017-05-25T15:17:57+00:00

Aligning IT and compliance procedures increasingly a business priority

Kevin McDonald writes for TechTarget SearchCompliance on Aligning IT and compliance procedures increasingly a business priority.He says, "When I've asked IT pros about HIPAA Security Rule compliance within their organization, they've typically responded with, "That is the compliance officer's realm" or [...]

Aligning IT and compliance procedures increasingly a business priority 2017-05-25T15:17:57+00:00

IT solution providers speak out on the Silicon Valley/Trump Summit meeting

Irvine, CA - IT solution providers have never been a shy bunch. In this article by CRN - Solution Providers Cheer Trump Tech Summit, Hoping It Will Help Channel Partners Create More Jobs, many share their thoughts on where our president-elect [...]

IT solution providers speak out on the Silicon Valley/Trump Summit meeting 2017-05-25T15:17:58+00:00

Data Privacy: What are the Risks?

If you are handling PII (Personally Identifiable Information) for your clients or anyone else you should read this article. It is delivered in the context of a sweepstakes type of program, but it is applicable to anyone handling PII. The [...]

Data Privacy: What are the Risks? 2017-11-13T07:22:40+00:00
Load More Posts