This message was sent to ##Email##
|
|
|
FCW
The Department of Homeland Security wants to make sure private companies are prepared for the next major cyberattack, but it's unclear whether "hacking back" adversaries should be part of it. During a Senate Judiciary Committee oversight hearing Jan. 16, Sen. Orrin Hatch (R-Utah) asked DHS Secretary Kirstjen Nielsen if active defense was part of the agency's strategy to help protect private companies from cyberattacks. Nielsen said it was, but she steered clear of endorsing "hacking back."
READ MORE
LOLA
Open Data Education (ODEdu) is a project currently underway to provide educational training to
agency members, including GMIS International. This project is being funded with a grant from
the European Union for 80,000 Euros.
Public sector workers worldwide are facing new and sometimes opposing expectations when it
comes to Open Data. Despite efforts to streamline Open Data policies, it often remains unclear
when data can truly be considered open, how to deal with technical and legal issues, etc.
LOLA is strongly committed to helping the public sector to develop digital skills, including
those required to build a successful Open Data strategy. Therefore, LOLA is launching the
ODEdu project.
READ MORE
CIS
Tax Season is upon us and the scam artists are once again looking for a way to dupe unsuspecting individuals to provide confidential information. Be aware of emails and telephone calls purporting to be from the IRS claiming you have a refund or owe money.
The IRS Will Never:
- Call to demand immediate payment over the phone, nor will the agency call about taxes owed without first having mailed you a bill.
- Threaten to immediately bring in local police or other law-enforcement groups to have you arrested for not paying.
- Demand that you pay taxes without giving you the opportunity to question or appeal the amount they say you owe.
- Require you to use a specific payment method for your taxes, such as a prepaid debit card.
- Ask for credit or debit card numbers over the phone.
If you get a phone call from someone claiming to be from the IRS and asking for money and you don't owe taxes, here's what you should do:
- Do not give out any information. Hang up immediately.
- Contact TIGTA to report the call. Use their "IRS Impersonation Scam Reporting" web page or call 800-366-4484.
- Report it to the Federal Trade Commission. Use the "FTC Complaint Assistant" on FTC.gov. Please add "IRS Telephone Scam" in the notes.
- If you think you might owe taxes, call the IRS directly at 1-800-829-1040.
 |
|
With industry-leading components from Cisco and Pure Storage, FlashStack is a powerful, efficient, and evergreen converged infrastructure solution that will shorten your time to value and deliver serious ROI. It scales, without disruption, as your needs grow and provides a powerful and reliable platform. Watch the video to learn more!
|
|
Headquarters: Mountain View, California
Phone: 206-708-5007
Email: mels@purestorage.com
Main contact: Melanie Stevens
Website: www.purestorage.com
Territory
We have SLED Sales reps across the U.S.
Company Niche
Flash storage for both structured and unstructured workloads, delivering speed and value for applications with FlashArray as well as a platform for analytics with FlashBlade.
Value in GMIS Relationship
It's tight-knit community, where the board works diligently to connect corporate members to the supporting vendors and ensure mutual value.
Company Information
Pure Storage helps government customers build a better world with data. The Pure Storage Data Platform, powered by all-flash storage, offers a simpler, more effective, and more flexible solution for cloud infrastructure and data-rich applications, like artificial intelligence, machine learning and big data analytics. With Satmetrix-certified NPS performance in the top 1% of B2B companies, Pure has an ever-expanding range of State and Local Government customers who are some of the happiest in the world.
InformationWeek
With the arrival of a new year, software developers face a rapidly changing landscape. Platforms and business needs are evolving while programming languages are either gaining or falling in popularity. Developers looking to keep their careers on track should acquire new skills, brush up abilities in areas they've long neglected, and reluctantly bid farewell to favorite tools that are rapidly losing their luster.
READ MORE
Healthcare Informatics
When it comes to IT innovation at healthcare organizations, change is happening at a very uneven pace and hospitals and health systems are approaching it in different ways, a new report finds. While a handful of surveyed CIOs said their organizations are aggressively moving forward with formalized IT innovation efforts, other organizations are not putting more structure at all behind IT innovation right now, according to a report from Impact Advisors.
READ MORE
|
Unlike ordinary managed service providers, backup and disaster recovery is all we do.
We even write, test and maintain your DR plan while keeping costs predictable.
There’s a reason the majority of ThinkGard’s customers are public sector agencies.
Perhaps you should find out why.
Visit our website! See Case Study.
|
|
|
|
|
Personalized, Connected, Secure Cloud
A modern cloud platform. What if your cloud was truly personalized to your business? What if it seamlessly connected your entire organization from anywhere and from any device? What if you were confident that your cloud data was more secure than ever? It can be with Oracle’s modern cloud.
Read more
|
|
|
|
|
EdTech
By 2019, there were will be a global shortage of cybersecurity professionals of about 2 million, IT governance nonprofit ISACA reported in a 2016 skills gap analysis.
With this looming over their heads, university leaders have recognized that they need to better train cybersecurity students — from creating more engaging experiences to reshaping programs so they go beyond just the technical skills.
But most students have already ruled out careers in cybersecurity by the time they reach college, so the responsibility of closing the skills gap also is falling on K-12 schools.
READ MORE
Forbes
With 2018 shaping up to be the most prolific year hacking has ever seen given 2017, it's time to establish a universal language and understanding of those foundational facts that govern our data-security lives. So without further ado, here are five laws of cybersecurity, and while there could easily be more, these five will forever be the immutable universal constants that govern this topic and our existence in relation to it.
READ MORE
MedCity News
Currently, we depend upon the eyes, ears, and touch of medical staff to examine the human body and diagnose patients. Physicians must identify abnormalities of the skin, check for any bodily irregularities, examine complex MRIs, listen for arrhythmias, and inspect CT scans day in and day out. While all of these tasks seem routine, they actually test physicians’ knowledge about everything that could possibly be wrong with the human body.
READ MORE
CIO Dive
Until there is a more equal representation of women to men in the tech industry, reports on diversity, or lack of, will continue. Many girls and women are not exposed to the outlets that could illuminate cybersecurity and IT as a feasible career choice.
READ MORE
By Lisa Pafe
It's time for another proposal color team review. The proposal manager is faced with one of the following all-too-familiar scenarios. The first is that the reviewers conclude that the proposal stinks. They don't really know why, but they don't like it. They offer recommendations — some of which are actionable, some of which are compliant, but none of which improve the proposal quality. Some of the reviewers never read the RFP thoroughly, so their comments must be taken with a grain of salt.
READ MORE
CIO
Legacy technology can hinder your ability to meet changing market dynamics. Here's how to prioritize and execute IT modernization efforts that drive business value.
READ MORE
CSO
What we have here is a failure to communicate.
Security training and awareness campaigns too often fail to change user behavior in any meaningful way, putting both the user and the organization at risk. The solution, experts say, is better security analogies.
READ MORE

CMS Wire
The last few years have been hot for information security (InfoSec), driven mainly by high profile breaches at Target, Home Depot, Anthem, the DoD, NSA, Equifax and others. Add to that the weaponization of cyber attacks by nation states (think Stuxnet or Russia's attacks on Estonia and elsewhere), and it's no surprise that InfoSec is the priority for governments as well as public and private sector organizations of all sizes and in all industries.
READ MORE
MIT Technology Review
In an office at Tsinghua University in Beijing, a computer chip is crunching data from a nearby camera, looking for faces stored in a database. Seconds later, the same chip, called Thinker, is handling voice commands in Chinese. Thinker is designed to support neural networks. But what's special is how little energy it uses — just eight AA batteries are enough to power it for a year. Thinker can dynamically tailor its computing and memory requirements to meet the needs of the software being run.
READ MORE
Missed last week's issue? See which articles your colleagues read most.
|
Don't be left behind. Click here to see what else you missed.
|
|
|
|
 7701 Las Colinas Ridge, Ste. 800, Irving, TX 75063
|