Ideas

Why I Changed My Mind about Federal User Cyber Training

Layer on all the protective systems you want—at the end of the day, the user still has to make a good decision.

The Case for Commercial Solutions in Government

The applications an agency is looking for are very likely already on the market, cost-effective and field-proven.  

Looking Beyond the Technical to Fill America's Cyber Workforce Gap

Think of nontechnical skills as skills that are useful in every possible job like critical thinking, listening to others, and initiative.

Why Are Scientists So Excited about a Recently Claimed Quantum Computing Milestone?

To understand, we need to go back to conventional, or digital, computers.

How Federal Agencies Can Be More Proactive About Cloud Security

For starters, agencies need a deep understanding of user behavior.

The Problem With the State-Level Investigation of Google

The probe may do more for the attorneys general than for the public they’re supposed to protect.

The Problem With the Whistle-Blower System

As the country learned this week, authorities have too much power to decide the fate of whistle-blower claims, especially when they involve the intelligence community.

Algorithms Are People

The secret sauce of search engines gives tech companies an abundance of plausible deniability.

Featured eBooks

Actually, It's OK to Disagree. Here Are 5 Ways We Can Argue Better

Unfortunately, being logical, reasonable and open-minded is easier said than done.

Happy Insider Threat Awareness Month!

Insider threats are potentially far more dangerous than those attacking from outside.

Agencies to Security Industry: Automate Cloud Compliance Faster

Cloud providers also want faster, more efficient FedRAMP compliance, and today, this is well in reach.

How Congress Turns Citizens' Voices into Data Points

No matter why or how people contact their elected officials, they all want one basic thing: They want someone to listen.

I Won’t Buy My Teenagers Smartphones

Denying a teen a smartphone in 2019 is a tough decision, and one that requires an organized and impenetrable defense.

9 Tips to Help Secure Every Federal Employee’s Mobile Device

Bad actors increasingly target smartphones and endpoint devices that are generally less protected than government computers.