We encourage you to download and review Symantec’s latest “Internet Security Threat Report (ISRT)” Volume 22. It’s comprehensive nature provides valuable insight on current trends and threats.
Tag: Technology
Marketing in the Age of the IoT
At its most basic, The Internet of Things (IoT) describes the network of anything with a power switch that connects to the internet. Not just phones, laptops, and tablets, but also headphones, lamps, dryers, espresso machines, and more. The number of things that can connect to the IoT is growing daily, which is creating opportunities…
Government Accountability Office’s (GAO) “Technology Readiness Assessment Guide”
One of the challenges the government faces in terms of technology development is making decisions about when early stage technology can and should move out of the development phase. To this end, the Government Accountability Office (GAO) had previous created guides for cost estimating and scheduling to help agencies decide if a project is ready…
Our Client Responds to 1,000-Year Flood
Our client, Disaster Solutions LLC has completed its response to the flooding incident that impacted the City of White Sulphur Springs, West Virginia. Disaster Solutions was responsible for assisting local first responders in coordinating response and recovery efforts and documenting the impact of flooding damage to public and private resources in the City. In spite of all the…
Disaster Solutions LLC’s Answer to Emergencies Abroad
United States’ citizens who experience emergencies while traveling abroad don’t have an easy, reliable way to communicate their status to the US State Department. As American tourism increases and global terrorism rises, we need a way for US Embassy personnel to quickly verify the location and status of US citizens in the event of an…
Washington Technology 2016 Insider Report
Navigating the trend and changes in the year ahead The Washington Technology 2016 Insider Report (download) offers us a quick reference guide to technology in 2016, divided into two sections – how the market is changing, and the changes your company must consider to remain relevant and successful. How the Market is Changing While last year…
Intelligence: Q3 2015 Security Threat Report
In its Q3 2015 Security Threat Report Cloudmark reveals that SoftLayer Technologies – a Dallas-based hosting and cloud computing company that is owned wholly by IBM – generated the largest amount of spam detected by Cloudmark’s Global Threat Network. A whopping 42% of all outbound e-mail from SoftLayer in Q3 was spam, up seven times…
Register: March 11th – Mobile Identity Management Webcast
“Mobile Identity Management: Real World Challenges for Governments & Commercial Organizations” Join us on March 11, 2016 at 10:00AM EST for a complimentary webcast hosted by thought leader, senior executive, and Bill & Melinda Gates Foundation Advisor Charles “Chuck” Brooks. Join the Webcast We will discuss challenges & solutions to Mobile Identity Management with Mr. Scott…
Report: IBM X Force Intelligence Quarterly 4th Q 2015
In its quarerly X-Force Threat Intelligence Report, IBM provides us with information about “how cybercrime trends and incident forensics are evolving—based on the real-world insights of the IBM Security Services team. ” This quarter they begin with the top four cybercrime trends. A rise in “onion-layered security incidents” means that security teams must execute investigations…
Emerging Vs. Disruptive: Which Market is Your Technology?
Emerging Vs. Disruptive: Which Market is Your Technology? Correctly identifying which market your technology lies in is integral to the sales & marketing program of any firm, however special attention is required for firms with emerging and disruptive technologies where the risk of failure is high. We live in an ever-evolving world of technology –…