Find additional Electroblogs using the search box below.
by Eugenio Rivera
The Continuous Diagnostic and Mitigation (CDM) Program, launched in 2013, allows federal agencies to scrutinize their information technology (IT) systems and react almost instantaneously to vulnerabilities. It empowers agencies to identify and prioritize risks…
by Sarbari Gupta
On May 21, 2019, the Office of Management and Budget (OMB) released M-19-17, a policy memorandum entitled, “Enabling Mission Delivery through Improved Identity, Credential, and Access Management.” This far-reaching policy memo rescinds a number…
by Diana Proud-Madruga
Retrofitting security within legacy systems is expensive and rarely fixes all the security holes. However, if your company is upgrading its systems and/or moving to cloud-based services, it is an…
by Chris Bronkar
Bitcoin-the-token is the newest form of cryptocurrency, or electronic cash, taking the market by storm. Bitcoin-the-protocol is a decentralized digital currency that can be sent from user to user on the peer-to-peer bitcoin network. The token and…
by Femi Alabi
I’ve always wanted to be at the intersection of innovative and emerging technology. One exciting emerging technology is Hyper-Converged Infrastructure (HCI). HCI is a software-defined system seamlessly integrated with storage, networking and other computer…
by Francisco Jauregui
The Office of the National Coordinator for Health IT (ONC) held its 2nd Interoperability Forum on August 6-8, 2018 in Washington, D.C. This event brought people together from ONC, federal partners, the healthcare industry and the technology sector…