On March 22, GOP voters in Utah will go to the polls to make their choice of presidential candidate, and for the first time in America, Internet voting is being deployed as an option in a presidential contest.
Recent Publications By TWB Writers
This is where you will find articles from prominent magazines, newspapers and other publications written by Tech Writers Bureau’s writers.
Leveraging NIST Standards to Build Your Enterprise Security
The federal government has produced a body of standards and guidelines—including the NIST Cybersecurity Framework—that can help the private sector as well as government agencies improve information security.
5 Hot Security Job Skills
Cybersecurity job openings are looking for people with a blend of technical, security, and industry-specific talents — and it helps to know Python, Hadoop, MongoDB, and other big-data analysis tools, too. Cybersecurity job postings grew by 91% between 2010 and 2014, faster than overall IT jobs. The demand for cybersecurity professionals shows no signs of … Continue reading 5 Hot Security Job Skills
So You Want to Be a Security Researcher?
According to Verizon’s 2015 Data Breach Investigations Report, more than 317 million new pieces of malware — computer viruses or other malicious software — were created in 2014. That means nearly one million new threats were released each day. Someone has to keep current with all the new malware that can be used to exploit … Continue reading So You Want to Be a Security Researcher?
Tenable Blog: Grappling with State and Local legacy IT
With many states relying on IT systems that are 20 years old or more, government agencies are challenged to secure legacy technology that is no longer supported and often hidden from view.
Tenable Blog: Payment Paradox – The True Cost of Payment Data Breaches
It’s natural to assume the most direct impact of a cyberattack within the financial payment system is the stolen data or funds. In reality, the true impact extends to the loss of consumer confidence and the subsequent increase of transactional costs. Most bankers subscribe to the notion that the payment system is the heart and … Continue reading Tenable Blog: Payment Paradox – The True Cost of Payment Data Breaches
Protecting Sensitive Government Info on Contractor Networks
The Defense Department has given contractors two years to meet new requirements for securing sensitive DOD data on nonfederal IT systems, responding to industry concerns over moving too quickly to the new standards.
GPS III to boost accuracy, security
The Air Force is on track to deliver in August 2016 the first of a series of advanced GPS satellites that promise to vastly improve the accuracy, reliability and security of the global positioning system constellation used by the military and civilian users, according to Air Force Col Steven Whitney, director of the Global Positioning … Continue reading GPS III to boost accuracy, security
Utah, other states, begin embracing drone hobbyists community
The FAA has been cracking down on people flying drones in Washington, but other states are embracing their drone-flying communities, training them and turning them into auxiliary volunteer air forces ready to help out their communities. Read all about it in the latest Emerging Tech column from NextGov.
How Battery Technology is Charging Ahead
Innovations in microchips and semiconductors keep pushing advances in mobile computing devices, yet the battery technology that helps power those same devices remains stagnated. By some accounts, lithium-ion batteries haven’t changed much over the past 15 years. That could change soon with developments in next-generation solid-state batteries. Vacuum manufacturer Dyson’s recent investment in a solid-state … Continue reading How Battery Technology is Charging Ahead