From the Summer 2021 Issue

New Executive Order Knocks Down Old Barriers

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

New Executive Order

Southwest Airlines (SWA), Flight 1380, was climbing through 32,000 feet on the morning of April 17, 2018. At approximately 11:03 am, fan blade No. 13 of the left engine shattered along a previously undetected stress fracture. A 12-inch section, weighing about 6.825 pounds and a two-inch section of a fan blade weighing .650 pounds, separated … Read more

President Biden Holds a Press Conference Following Geneva Summit

Author(s):

Lauren Abshire, Editor, United States Cybersecurity Magazine

Biden Holds Press Conference Addressing Cybersecurity

President Biden held a Press Conference following his meeting at the Geneva Summit with Vladimir Putin. During the Press Conference, President Biden briefly explained the various topics covered by himself and Vladimir Putin. President Biden noted that the tone of the entire meeting was positive, there wasn’t any strident action taken. Where they disagreed, they … Read more

Biden Signs Executive Order for Nation’s Cybersecurity

Author(s):

Lauren Abshire, Editor, United States Cybersecurity Magazine

Biden Holds Press Conference Addressing Cybersecurity

On Wednesday, May 12, 2021, President Biden signed an Executive Order (EO) to improve the Nation’s Cybersecurity and to protect Federal Government Networks. After a string of cyber-attacks against the U.S. Federal Government, most recently the attack against Colonial Pipeline, a need for sufficient cybersecurity is more important than ever. Below, is the Fact Sheet … Read more

U.S. Launching “Cyber Task Force” After Massive Attack

Author(s):

Stefan Maraj, Staff Writer, United States Cybersecurity Magazine

U.S. Launching Cyber Task Force After Massive Attacks

Early in March, 2021, we saw an “unusually aggressive” attack on companies in the U.S. The attack, first reported by Brian Krebs on March 5, 2021, led to hackers gaining access to at least 30,000 email accounts belonging to employees at many organizations across the country. In response, the New Administration moved to launch a … Read more

Cybersecurity Legislation and Education

Author(s):

Pratik Kirve, ,

cybersecurity legislation

The increase of data breaches and cyber-attacks have pushed governments to take different measures to tighten the cybersecurity. There are numerous methods and techniques regarding hacking, and these practices are always evolving. Therefore, governments need to come up with various measures and innovative strategies to counter and eliminate attacks. However, they must implement concrete types … Read more

From the Fall 2014 Issue

Market Intelligence: The Key to Government Business Development

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

Increasingly, every day of every week, of every month, of every year, more business is being conducted online. Federal, state and local government prime contracting, subcontracting and teaming are no exception. In fact, most government contracting opportunities and research is now available online and easily accessible. The key is to know the proper techniques and … Read more

From the Fall 2014 Issue

5 Things to Do Today to Increase the Value of Your Government Contracting Business

Author(s):

Pat Lowry, MBA, ASA, CVA, , Patuxent Valuation Group LLC

Realtors are asked for their tips on selling homes, chefs are asked for their secret spices, and cops are asked how to get out of speeding tickets. Me? I’m constantly asked what’s most important to increasing the value of someone’s business. 10 years of experience consulting with and valuing government contracting businesses – some that … Read more

From the Fall 2014 Issue

Their Own Worst Enemies-DoD Responds to Insider Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

The Department of Defense (DoD) has as part of its mission to prevent and deter national security threats and attacks on the American people – but what if the DoD can’t prevent its own employees and service members from contributing to or causing security breaches? A recent survey1 conducted by SolarWinds and Market Connections found … Read more

From the Fall 2014 Issue

Chinese Hackers and Their New Target- Federal Employees

Author(s):

Ellen Cornelius, J.D., Senior Law & Policy Analyst, The Center for Health & Homeland Security

Currently, the U.S.  government monitors approximately 20 Chinese hacking groups; however, no system is flawless. Federal agencies reported that in fiscal year 2013, 9,883 malware attacks were launched.1 The number of intrusions was not released. In March 2014, Chinese hackers allegedly infiltrated the networks of the Office of Personnel Management (OPM), the Government Accountability Office … Read more