Welcome!


From the GovIT Blogosphere

Without question, the rise in cyberleaks, nation-state cyber terrorism and the beach of consumer data across multiple industry domains has led to a heightened awareness of the enterprise and personal responsibilities associated with cybersecurity. The consumerization of IT and the adop...
Those watching federal cloud security in the defense space were pleased to learn the Defense DOD Cloud Computing Security Requirements Guide (v1) (SRG) last month. This 152-page document outlines the security requirements that Department of Defense (DOD) mission owners must adhere to w...
It is widely known that the National Security Agency houses an impressive cyber force with the capacity to bypass the digital defenses of private individuals, enterprises, and even foreign governments – a force powerful enough to draw criticism from the American public and American all...
Technology leadership is driven by the innovation and creativity of science, technology, engineering and mathematics (STEM) professionals. STEM careers offer some of the highest-paying jobs and the potential for a high quality of life. However, the realization of such promises has not ...
Cybersecurity breaches are seemingly making headline news every day. Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chi...
Recent data breaches involved an unclassified computer network used by President Obama’s senior staff, prompting countermeasures by the administration and resulting in temporary system outages. Officials said the attack did not appear to be aimed at destruction of either data or hardwa...
"Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since the transaction doesn't involve any physical entity, procedures and processes a...
With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew Research has even suggested that cyber-attacks are likely to increase. Some 61% of over 1600 security expert respondents to a recent...
The President showed respect for something many American's may not have heard of, but you dear readers know very well: Coding! In the context of education he remarked that "we’re connecting community colleges with local employers to train workers to fill high-paying jobs like coding, a...
A new transformative research approach is gaining global attention and adoption. The scientific opportunities enabled by convergence-the coming together of insights and approaches from originally distinct fields-will make fundamental contributions in our drive to provide creative solut...
The worlds of cloud, mobile, social and cyber will continue expanding, permuting and recombining. Their individual effect on society and commerce will become moot as these technological capabilities merge to deliver products and services straight out of Star Trek! Traditional system i...

By Bob Gourley

The FBI just posted the first official written articulation of why they believe North Korea is linked to the ongoing Sony Hack. As someone who has worked with FBI investigators in the past I have...

For more than a decade we have heard constant warnings about the coming of “cyber war” and “cyber terrorism.” The prophets of cyber doom have promised that cyber attacks are just around the corner that will be on par with natural disasters or the use of weapons of mass destruction. Wit...
SaaS and cloud computing continue to gain real traction in the enterprise – and that trend is sure to continue for a long time to come. But the reality is that, to date, those gaining real benefit from cloud at the enterprise level have been limited largely to isolated pockets; e.g., s...
This case study assumes you want to build a private cloud on top of an existing virtualized datacenter composed of multiple hosts running vSphere and managed by one or several instances of vCenter. It is understood that you do not want to abandon your investment in VMware by retooling ...
You're in a quarterly meeting where everyone is armed with slide decks; some good, some mind numbingly bad. It's your turn, and you have a concise five-slide deck comprised of targeted, well designed, and insightful graphs. The graphs are clear and the room is able to discuss the highs...
This week Dell released its first Global Technology Adoption Index (GTAI). This survey of more than 2,000 global organizations took a close look at how organizations are truly using security, cloud, mobility and big data to drive success. While the data collected from this effort shoul...
What is Cloud Computing & what are its advantages & disadvantages. Join us for this installment of our Technical Insight series as expert Learning Tree instructor Kevin Jackson examines the following questions- How can Cloud Computing help your business and do you need to be concerned ...
The revolutionary business aspects of cloud excite me every day, but the business diversity is even more exciting. This fact really struck me after teaching my last Learning Tree Cloud Computing Introduction class in New York City. I’ve been in the regular rotation here for four months...

#SDAS #HTTP #webperf #SSL De facto standards can be as difficult to transition off of as official ones

If you haven't heard about HTTP 2.0 it's time to start paying attention. It i...

American interest in online privacy and surveillance programs has jumped since Edward Snowden’s revelations about digital government surveillance in the United States. Deteriorating public relations have plagued intelligence agencies that have been identified as participating in the ma...
A key component of this event will be a series of ‘Advisory Clinics’ that will run throughout the summit. These clinics are designed to provide attendees the opportunity to meet one-to-one with some of the industry’s leading advisors from critical areas of growth and development. GovC...
GovCloud Network is proud to announce that we have teamed with Tech Equity Ltd to deliver cloud education and training on a global basis. With this partnership, GovCloud Network will also add the Cloud Clinique Online Training and Cloud Computing Best Practices program to it's list of ...
A recent Inc.com article claimed that the percentage of U.S. small businesses using cloud computing is expected to more than double during the next six years, from 37 percent to nearly 80 percent (l). This forecast was gleaned from a just released Emergent Research and Intuit study. Th...
So you won your first Government Contract… Congratulations! Among the new issues you will need to consider, your accounting systems, both practices and technology, will need to pass muster with Defense Contract Audit Agency (DCAA) auditors. This will require a combination of interna...
Security and Defense People offers a tremendous opportunity for experts and consultants, whether you are focused on building your brand or seeking work. You can target your messages and interactions to the right targeted audience, publish your content that connects with that audience, ...
Addressing the global cloud skills gap is the number one priority to help accelerate the successful adoption of Cloud, according to the Cloud Credential Council. To address the skills gap specifically related to FedRAMP, the Cloud Credential Council has released an online course and ex...
Kevin L. Jackson, CEO and Founder of GovCloud Network, LLC, was showcased in US Veteran's Magazine for his work with Veteran's 360, a San Diego, California non-profit. With more than 30,000 troops return to civilian life after serving the country, Vets360 helps them through this som...
Cyber-secure cloud computing can help both businesses and governments improve their ability to collaborate with non-traditional partners so they can quickly and cost-effectively tackle complex problems. That’s the message Kevin Jackson of the Network Centric Operations Industry Consort...
In February 2011, Vivek Kundra announced the “Cloud First” policy across the US Government. The directive, issued through the Office of Management and Budget, required agencies to give cloud technology first priority in developing IT projects. He also described cloud computing as a “10...
Congratulations to my friends at "On The FrontLines Magazine" for an EXCELLENT presentation of important operational and managerial cloud computing transition lessons. This issues showcases cloud computing leaders from government and the private sector that share their views on this cr...
From “military dedication” to “civilian success,”Veterans 360 Services is approaching the challenging transition of military service to civilian life with an innovative, focused and all-inclusive, 360 degree, process of education and employment. This San Diego-based veteran’s non-profi...
Private Digital Network Services (PDNS) and partners will provide its national, Private Digital Network (PDN) core and a suite of highly sought after services to the Interoperability Clearinghouse Agile Cloud effort. Its partners include Gannett Company Inc., Global Interactive Solutio...
Last Wednesday, Maj Gen, USAF (Ret) John T. Brennan, Interoperability Clearinghouse (ICH) Executive Director, kicked off the Agile Cloud collaboration. This industry-wide effort is targeted at developing an open and inclusive cloud service brokerage environment capable of rapidly provi...
Thank you for the honor of being named a "Top 100 Cloud Professionals to Follow on G+"! Congratulations also to my 99 colleagues.
The Information Technology Acquisition Advisory Council (ITAAC) and the Telecommunications Industry Association (TIA) are announcing a slate of innovative leaders to serve as facilitators for the upcoming "Agile Sourcing Environment for Commercial Cloud" brainstorming session being he...
I am the CEO and founder of GovCloud Network, LLC. In a consultative role, I help companies develop and execute targeted media strategies via social media channels to over 1.5 million professionals across 20 industry verticals. With a specialty in cloud computing, we and our partners a...
Today PerspecSys announced the results of a survey conducted at the 2014 RSA Conference concerning the attitudes and policies of organizations towards cloud-based security. After polling 130 security professionals on the show floor of the RSA Conference, PerspecSys found that "an overw...
The Network Centric Operations Industry Consortium (NCOIC) has begun offering an open process that will enable governments, agencies and businesses to create and manage a secure, hybrid IT computing environment quickly and cost effectively. Known as the NCOIC Rapid Response Capability...
You are invited to attend the Cloud Webinar Series: Why State & Local Governments Should be Prepared for Cloud. This educational webinar is brought to you by RISC Networks, and will be hosted on BrightTalk.com at 12:00 pm on March 26, 2014. The webinar will present Moving to the Cloud:...