From the Winter 2014 Issue

Northrop Grumman and bwtech@UMBC Graduate First Three Companies from Innovative Cyber Cync Program

Author(s):

Marynoele Benson, , Northrop Grumman

Small-business initiative generates cutting-edge cyber technologies to meet tomorrow’s global threats  Northrop Grumman Corporation and the University of Maryland, Baltimore County’s Research Park Corporation – also known as bwtech@UMBC – hosted a ceremony this fall for the first graduating class of the Northrop Grumman-sponsored Cyber Cync Program: AccelerEyes, Five Directions and Oculis Labs. The event … Read more

From the Winter 2014 Issue

Homegrown in Harford County, MD – A Technology Base for the Future

Author(s):

Eric Mc Lauchlin, Chairman, Harford County Economic Development Advisory Board

James C. Richardson, Director of Economic Development, Harford County, Maryland

Technology is perhaps one of the most overused terms in today’s society. Everything is “technology-based” or “technologically advanced.” One of the best explanations of technology comes from a definition for young people and refers to its interaction with life, society and the environment. An article at www.getaheadkids.com.au notes that technology must exist “to contribute to … Read more

From the Winter 2014 Issue

BEST PRACTICES FOR SMALL BUSINESS IN CYBERSECURITY FOR 2014

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, MD) It is the time of year for reviewing your business plan for 2014 and making a few updates to improve operations. Your New Year’s Wish List probably includes the government avoiding another shut-down, or sequestration disappearing in 2014, or perhaps that the Pentagon will figure out its budget priorities, or all of … Read more

From the Winter 2014 Issue

Small Businesses: The Challenges of Securing Networks Without an IT Staff

Author(s):

Paul Ihme, , Visionist, Inc.

Small businesses play a vital role in America’s economy, employing more than 50% of the working population1. As a business grows, so does the volume of data critical to its operation. Given this correlation, how does a growing business secure their critical data (client information, personnel records, etc.) without investing overwhelming amounts of money for … Read more