Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

Guest Blogs

Guest Blog: Finding the Bug in Your Appstack

November 4, 2014
By Chris LaPoint

Sixty million malware programs are written annually, according to McAfee President Dave DeWalt. That is up from 3 million in 2007. With attacks aimed at virtually anything connected to the Internet and coming at networks from all entry points, finding the bug in an agency's appstack can prove quite difficult. Guest blogger Chris LaPoint outlines how taking a holistic view of the appstack and optimizing visibility into the entire information technology environment is key to running a healthy organization.

Guest Blog: The Network of Today

October 20, 2014
By Anthony Robbins

Network modernization is becoming a priority for defense agencies—and for good reason. Much of our defense network infrastructure was conceived 20 years ago and put into place almost a decade ago. While the networks remain the same, the technologies that depend on them have advanced, and innovation can no longer be supported by outdated and ineffective infrastructure.

Guest Blog: Government IT Pros Hindered by Lack of App Visibility

September 23, 2014
By Chris LaPoint

Without quick problem resolution, information technology pros are very often the first to be blamed for slow application performance. A SolarWinds survey found that the lack of cross-silo visibility delays app problem resolution, hindering government information technology professionals from accomplishing their missions.

Guest Blog: Is 'Bring Your Own App' the Answer to Mobile Security?

August 25, 2014
By Chris LaPoint

"There’s an app for that" is truer than ever these days. As BYOD and BYOA increasingly infiltrate government agencies, public sector information technology departments must consider the impact these apps and devices have on their own environments. Chris LaPoint explains why agencies need to focus on applications, not devices, as the key to enabling a mobile work force.

Guest Blog: Cyber Trading Posts Ignite the Spark in Public-Private Collaboration

July 31, 2014
By Jessica Gulick

Partnerships are growing from disparate groups in search of the same goal.

Guest Blog: Continuous Monitoring Meets DISA STIG Compliance

July 3, 2014
By Chris LaPoint

Compliance with Defense Information Systems Agency rules are a must. Break the rules, and companies can lose their applications or have systems removed from the network.

Guest Blog: Mobile Battlefield Trends and the State of In-Theater Communications

June 4, 2014
By Chris LaPoint

Ongoing changes in the tactical networks—the mobile battlefield—should provide the U.S. Cyber Command with an increased ability to discover and address vulnerabilities in these networks.

Guest Blog: Making A Strategic Investment In Network on the Road to Innovation

May 27, 2014
By Anthony Robbins

Ongoing budget cuts place the Defense Department in a challenging situation, tasked with continually supporting warfighters on an increasingly tight budget. The most direct route for the department to accomplish mission goals and support warfighters is through information technology innovation.

Guest Blog: Let Go of Central Control to Increase Network Security and Visibility

April 30, 2014
By Chris LaPoint

In large federal organizations, tension always exists between local and central personnel who have different priorities, available resources and levels of control. In the U.S. Defense Department, that tension is especially apparent between the information technology professionals at the local level and the folks who oversee all of an agency’s operations.

Guest Blog: A Brief Look into the Cybersecurity Framework

April 23, 2014
By Matthew Smith

Whether a well-established company or one just getting started with cybersecurity risk management programs, those in the industry often can use a little help navigating the cumbersome and technical systems. This snapshot features pointers to clarify existing guidance and help organizations manage cybersecurity risk.

Pages

Subscribe to RSS - Guest Blogs