IoT in Government: How Government is Using Digital Twins

Digital twins are virtual, 3D representations of buildings, neighborhoods, or products built with real-world data collected from internet-of-things (IoT) devices like sensors, video cameras, and other enterprise data applications. These twins allow researchers, planners, and policymakers to experiment with changes to the object or environment to see if the desired results of that change are achieved. Applications include infrastructure improvement, sustainability planning, emergency response preparedness, and research and development. IoT in government is being driven by the results digital twins can achieve. One report showed that cities can expect to save $280 billion by 2030 with the deployment and use of digital twins. Continue reading

Schools Have to Learn the ABCs of Ransomware

Ransomware has traditionally been a practice where cybercriminals encrypt data and demand ransom in exchange for a decryption key. More recently, a growing number of these bad actors threaten to make this information public if they do not get paid. This shift in the practice of ransomware has increased the "attractiveness" of K-12 schools for cyber criminals. Information about children is among the most highly protected data there is, making it more likely ransoms will be paid to keep it private. For this and other reasons, K-12 schools are seeing an increase in ransomware activity. In 2021, there were at least 62 reported ransomware cases as compared to only 11 in 2018. 2021 also saw ransomware as the most common cyber incident for K-12 schools for the first time ever.

What Gets Compromised in a Ransomware Attack?

An incident in 2020 involving Fairfax County, VA Public Schools resulted in employee social security numbers being posted online. Hackers targeting a school district in Allen, Texas emailed parents with threats to expose their childs' personal information if educators did not pay a ransom. Showing the full swing of ransomware impacts from the serious to the mundane, a 2022 attack on the Griggsville-Perry School District in Indiana had many records compromised and leaked including a detention slip from December 2014 for a student who would not stop interrupting his health class. This shows the breadth of access that hackers had to documents and has led many schools to reexamine their file retention policy to reduce the amount of data accessible to bad actors. Continue reading

Recognizing and Celebrating Women in Technology

March is Women's History Month, a time to reflect on the contributions women have made to history, culture, and society. The technology industry is one area where the contribution of women has been greatly under-reported. In fact, some of the innovations that are the cornerstone of today's tech were developed by women. Continue reading

Cloud, Cyber and Mobile Conferences Announce Session Track Topics

Originally posted for immediate release by Kristin Graybill at Connelly Works

Co-located Events to Offer a Comprehensive Program for Government Technology and Policy Leaders

Vienna, Va - 1105 Media's Government Events Group, the leading producer of trade shows and conferences for the government information technology (IT) market, today announced the session track topics for the upcoming Cloud & Virtualization, Cybersecurity and Mobile Government Conferences. Taking place October 22-23, 2012 at the Grand Hyatt in Washington, D.C., these three events are being co-located to provide comprehensive educational opportunities for government and industry in one location.

NASA CIO, Linda Cureton to Keynote

Ms. Cureton's address will focus on IT leadership and how to better understand acquisition standards. She'll also discuss how her latest initiative within NASA - spearheading the agency's shift to cloud - has reportedly saved her agency $1 million.Only full conference attendees get access to this exclusive keynote!

Continue reading