CBO Director: Defense Spending to “Decline” Long-Term

On Monday, Congressional Budget Office director Douglas Elmendorf spoke at the National Association for Business Economics (NABE).  The conference’s theme was “The New Normal? Policy Choices After the Great Recession,” so Director Elmendor had some remarks about policy based on the CBO’s January report on the budget and economic outlook …

Read More »

26 ways to grow your healthcare IT business

As healthcare reform continues to dominate the headlines, government contractors will be called upon to implement whatever government initiatives come to pass — that much is clear. The question for contractors now is: What does it take to succeed in this space? We brought that question to 11 industry leaders …

Read More »

Twitter Adds Security to Combat Phishing

As a reaction to increasing phishing attacks against Twitter users, Twitter is tightening security. Released, all direct messages submitted to Twitter will be viewed through a new URL, twt.tl. This new coding will not effect the user interface, but provide a more secure platform for direct messages. This site will …

Read More »

Researchers Create Mobile Botnet with Weather App

At last week’s RSA Conference, security researchers with TippingPoint’s Digital Vaccine Group presented their research into mobile botnets. To date, the largest mobile botnet was centered predominately in Europe on “jailbroken” iPhones. Researchers Derek Brown and Daniel Tijerina were able to fool around 8,000 iPhone and Android users into “joining” …

Read More »

FDIC Says Hackers Have Netted Over $120 Million

The Federal Deposit Insurance Corporation (FDIC) announced that a cyber scams targeting U.S. small business have netted over $120 million and has cost U.S. companies approximately $25 million in the third quarter alone. The data, announced by David Nelson, a FDIC examination specialist, at the RSA Conference last week, highlights …

Read More »

Attacks Using PDF Exploits on the Rise

When hackers look assemble their tools to carry out attacks, they often look to exploit commonly used platforms in an effort to increase the number of potential targets. This is why more hackers write viruses for PCs instead of Macs, since the majority of the world’s computer users utilize PCs. …

Read More »

Featured Job- Cyber Threat Analyst with Northrop Grumman

Job Description Req Number: 22492BR Title: Cyber Threat Analyst Specific Responsibilities: Candidate will be part of a cyber threat analysis team, specifically the Surface Analysis Group. Responsible for an advanced level of all-source analysis of cyber threats to US Federal Government networks. This position is unique to the cyber security …

Read More »

Jonas Blogs on “Smarter-er” Organizations

In a recent blog post titled “On A Smarter Planet…Some Organizations Will Be Smarter-er Than Others,” Jeff Jonas described what will happen to firms who handle prediction-enabling information better than others. “The winners will be those organizations that make better decisions, faster,” writes Jonas.  “How fast?  Fast enough to do something …

Read More »

You Need Only ‘One Minute’ to Get Ahead

If there ever was an international classic in business and management books, “The One Minute Manager” (William Morrow) by Kenneth Blanchard and Spencer Johnson would be it. Published in 1982 and hailed as a No. 1 bestselling phenomenon, the book has taught millions of managers in Fortune 500 companies and …

Read More »