Weekly Round-up: April 1, 2011

Gadi Ben-Yehuda

 

Good Cybersecurity Requires Action From Many Players

Cybersecurity continues to be a major focus for Congress and the Administration, and a major investment area for government and industry (see prior blog summary).  Efforts to strengthen security are often based on a traditional cause and effect model – agencies do x, hoping for a result of y.

Creating "Virtual Agencies"

We had no idea what he was talking about when he was describing the Virtual Department of Mary Washington (one of his constituents when he was the senator from Tennessee).  But he was just ahead of his time (and clearly ahead of where the federal government was in the early 1990s).  Since then, several countries have tried to create virtual agencies, most notably Canada, Australia, and Belgium.

Weekly Round-up: April 8, 2011

Gadi Ben-Yehuda

GAO Outlines National Indicator System

The Government Accountability Office (GAO) surveyed the state of the art in developing and using comprehensive indicator systems in its 2004 report, “Informing Our Nation: Improving How to Understand and Assess the USA's Position and Progress.”  That report sparked an initiative by the National Academies of Science, with the support of several non-profit foundations, to explore the feasibility of developing a national indicator system.  This led to the creation of a non-profit, State of the USA,

Managing the Shift from 'Push' to 'Pull' Information Economy

One of the two implications of the paradigm shift I wrote about was the movement from an information economy in which providers pushed out their content to one in which consumers pulled it into their feed.  This movement started with the advent of RSS feeds and has hit a high point in link shortening and sharing on Twitter and facebook.

Weekly Round-up: April 14, 2011

Gadi Ben-Yehuda

Who Are We Online, and How Do Others Know That? The National Strategy for Trusted Identities in Cyberspace

A majority of the country, and virtually the entire Federal Government, now uses the Internet to do business, learn about programs, shop, talk to friends, and engage in a host of other activities.  Some 2 billion people around the world engage in online commerce that will soon exceed $10 trillion; individuals place their information and trust in the many large and small businesses that provide services over the web.  In order to operate online, both the sender and the recipient have to trust what each other is doing. 

Predictive Security Intelligence: Achieving Holistic Cybersecurity

No longer can security programs rely on “if it’s not broke, don’t fix it” — adversaries could already be inside systems, stealing data or probing to get in.  Too many CIOs and CISOs have thought their systems and data were secure when in fact the opposite was true.   Security programs need effective protection of valuable information and systems to prevent data breaches, and to comply with the ever increasing federal compliance requirements (such as the Federal Information Security Management Act (FISMA), the Privacy Act, policy and guidance from the Office of Management and Budget (OMB) an

Pages