Insights / Technology x

Contributors
How Acquisition Professionals Can Accelerate Cybersecurity Solutions

How Acquisition Professionals Can Accelerate Cybersecurity Solutions

Cyber-attacks are an increasingly dangerous threat to the Government. Recently, both the Federal Bureau of Investigation and the Office of Personnel Management experienced attacks, losing sensitive employee information to hackers. As a result, the Department of Homeland Security (DHS) increased its efforts towards hiring cybersecurity subject matter experts and acquiring cutting-edge technology to defend itself against impending attacks.

The Agile IT Business Analyst as Mediator

The Agile IT Business Analyst as Mediator

In the past, advancements in information technology (IT) typically were a topic of discussion among high-level developers, project managers, and analysts. Analysts documented large complex requirements documents that sometimes took years to produce. It was difficult for systems development projects to adjust these documents to evolving needs and new priorities. This process is changing the Government’s broad adoption of Agile to deliver mission-critical software quickly to users.

For Political Appointees: Why Acquisition Success Equals Mission Success

For Political Appointees: Why Acquisition Success Equals Mission Success

Acquisitions are the key to success in major programs of the Department of Homeland Security (DHS). The procurement process deploys the materials, services, and knowledge necessary to operate the DHS’ protective and preventative missions. Without timely and effective procurements, DHS could face new and avoidable challenges in their mission to prevent terrorism, manage our borders, enforce immigration laws, secure cyberspace, and act with resilience in the face of disasters.

Roadmaps for IT Modernization

Roadmaps for IT Modernization

The risk associated with legacy information technology (IT) systems not meeting the Federal Government’s evolving needs is substantial and unacceptable. The costs are also significant with 78% of the $80 billion spent annually on Federal IT going toward maintaining existing systems, crowding out funding for modernization. 

Security in Cyberspace

Security in Cyberspace

Recent large-scale cybersecurity incidents have highlighted the need for increased vigilance and defense against information security threats that affect organizations worldwide. Hackers stole the personal data of more than 21 million people in the Office of Personnel Management (OPM) Breach in 2015. These cyber-attacks resulted in the theft of personal information of millions of Americans, many of whom are current or former Federal workers and contractors. Stolen information enables hackers to conduct individual targeted cyber-attacks, such as spam and phishing campaigns. Individuals, businesses, and other organizations must stay aware of emerging threats and act quickly to secure their data and networks.

EAGLE II - Streamlining Homeland Security Acquisitions for Information Technology

These days, the homeland security mission moves fast… and acquisition lead times just do not support the speed to mission that agencies need to stay ahead of the threat. Acquiring information technology support services such as data analytics, cybersecurity, information sharing, and IT strategy and transformation must happen faster than ever before – yet bring more innovation and lower risk at the same time.

Cyber Crime Trend: The Unlawful Activities of the Dark Web

Cyber Crime Trend: The Unlawful Activities of the Dark Web

Portions of the internet invisible from standard search engines, known as the "Dark Web," are providing rapidly increasing user base access to many illegal activities online. Dark Web websites are publicly visible, yet hide the IP addresses of the servers that run them using anonymity software like Tor or I2P. These software programs encrypt internet traffic in multiple layers and bounce it across randomly selected computers around the world. This lets anyone using one of these programs access a site, but it can be difficult to locate its servers and users. 

Don’t Fall for Phishing in 2015

You have probably never met a Nigerian prince. However, you might have received an email from one asking for help unlocking a fortune with the promise to pay you for your help. These so-called ‘Nigerian prince scams’ are a crude version of fraud that people can easily recognize. 

Information Sharing is a Linchpin for Securing Special Events

Information Sharing is a Linchpin for Securing Special Events

After the tragic events of 9/11, there was overwhelming consensus that a coordinated effort against terrorism and other public safety threats was required between the nation’s entire law enforcement, emergency management, and intelligence apparatus. This includes the identified requirement to secure large-scale public events. These events present a potential target for terrorism and other crimes based on size, scope, and especially notoriety.