August, 2014
Sunday, August, 31, 2014 | Philip J. Smith
“Size doesn’t matter,” says the hacker
Tags: Cyber Security
Small federal agencies, which typically consist of 6,000 or fewer employees, have been in the spotlight lately when it comes to data security. Similar to small businesses, criminals tend to look at small agencies as low-hanging fruit, mainly because they typically lack the manpower and resources required to sufficiently protect all of their attack vectors.
Friday, August, 1, 2014 | Gerri Whichard
Definition of Done vs. Acceptance Criteria
Tags: Agile
The Federal government is increasingly transferring from non-iterative approaches of software development to an Agile based framework. This change is leading to an increased misunderstanding of certain elements that provide value to utilizing the methodology. One of those elements includes the difference between Definition of Done compared to Acceptance Criteria. Even in the commercial environment, these ideas are often confused or used interchangeably, albeit inaccurately. So where does one begin to explain the differences? It first begins with having what I like to call a “healthy”
Friday, August, 1, 2014 | Marc Berman
Clearing the Biggest Hurdles in Evaluating a Security Clearance
Tags: Security
It almost goes without saying that security clearances are of paramount importance in the field of homeland security, largely as a result of their access to classified material. Whether a related position involves access control, biometrics, border protection, disaster recovery, emergency preparedness, IT security, maritime and port security, rail security, security at the state and local level, or urban security, there is no doubt that a successful candidate-for-hire is going to need either a Secret or Top Secret clearance.
Friday, August, 1, 2014 | Chris Wiedemann
Federal Health IT Spending Trends, Today and Tomorrow
Tags: Health IT, Federal Healthcare IT
The federal share of the health market is growing fast, bringing health IT spending along with it. While Electronic Health Records (EHRs) are still the primary drivers of spending, interoperability, mobility, security, and analytics are all the subjects of hot debate, particularly in defense health activities.
Friday, August, 1, 2014 | Rick Kerestesy, Ken Farber
Using Strategic Acquisitions to Drive IT Transformation
Tags: Technology Strategy
When comparing commercial and public sector best practices for Information Technology (IT), you might wonder why the public sector lags so far behind. The public sector’s failure to quickly adopt these best practices turns out to be the result of differing incentive structures. Incentive structures inform an organization’s risk tolerance. Although both sectors face similar challenges in doing business, they tend to see different options for overcoming those challenges based on their perception and tolerance for risk.