Security
Building a threat hunting team
Threat hunting is not just about the tools or techniques; it’s about the people behind the process, including your in-house capabilities, and external partnerships.
Why Information is the New Currency
We live in a digital world. A testament to this new reality is the growing value of digital content. People download songs, purchase movies online,…
• 3 minute read
Digital-First Fridays: Information is the New Currency
We live in a digital world. A testament to this new reality is the growing value of digital content. People download songs, purchase movies online,…
• 3 minute read
Digital-First Fridays: What is a Digital Enterprise?
In my first post in this blog series, I examined how the speed of digital is disrupting market leaders, and determined that the only way…
• 4 minute read
Empowering Government with a Digital Agenda
Like private businesses, governments are driven by information. Consider the amount of information associated with a single citizen: a birth certificate, passport, driver’s license, student…
• 5 minute read
Step Aside Cloud, Mobile and Big Data, IoT has just Entered the Room
This article provides a review of the ARC Advisory Group Forum in Orlando and expands on the ever increasing importance of analytics in relation to…
• 9 minute read
Mobility is Critical for E-Government
Mobile devices are transforming the way citizens interact with their governments—from using digital IDs for access to program information to crowdsourcing apps to improve city…
• 4 minute read
Under the Hood – BIRT iHub F-Type: Understanding the Processes
While your customers don’t need to see the inner workings of your app, as a developer, you need to be the master of its parts…
• 4 minute read
Mark’s Predictions: Top Tech Trends for 2015
2014 marked an incredible year. We watched technology cross the threshold from futuristic concept to mainstream use with biometric devices like Apple’s Touch ID featured…
• 6 minute read
Why Buy a Visualization Server?
When an organization starts to develop a software application, the development team will always be tempted to create as much of the application as possible on their own….
• 3 minute read
Cyber Security in Government
Cyber-attacks are on the rise. Data breaches are becoming more common and devastating. Akamai’s State of the Internet Report revealed that hacker attacks on websites…
• 4 minute read
Digital: Disrupt or Die
I’m pleased to announce the release of my latest book Digital: Disrupt or Die. It’s an exciting discourse about the emerging Digital-First World and…
• 4 minute read
8 Reasons Why Customers Benefit from Online Document Delivery
Companies today are seeing the advantages of offering bills, notices, and account statements through secure customer portals. But it is clear that businesses are not the only…
• 3 minute read
Stay in the loop!
Get our most popular content delivered monthly to your inbox.