by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 30, 2014
September 30, 2014 FCW.COM 25 nical testing expertise; and to support the IT function across the exchange- related business process efforts. 27Quality Technology $13,199,706 obligated; $8,953,718 expended through February 2014 To provide an operational support cen- ter to assist various stakeholders with implementation and operational issues. 28 Science Applications International Corp. $10,870,013 obligated; $5,289,646 expended through February 2014 To implement enterprise remote identity-proo ng services for the federal and state exchanges. 29 Scope Infotech $1,094,967 obligated; $821,225 expended through February 2014 To provide user support and system development for exchange collaboration tools.30 Spann and Associates $3,000,000 obligated; $0 expended through February 2014 To provide information security support services. 31SphereCom Enterprises $4,377,828 obligated; $2,631,755 expended through February 2014 To provide information security and pri- vacy support. 32 Terremark Federal Group $48,860,711 obligated; $33,499,929 expended through February 2014 To provide a cloud computing infrastruc- ture that complies with the Federal Infor- mation Security Management Act and can dynamically scale as needed. 33 TurningPoint Global Solutions $5,748,814 obligated; $3,921,291 expended through February 2014 To provide independent veri cation and validation services. by Sean Lyngaas Twitter is a crowded place, with hundreds of millions of tweets red off daily. Cybersecurity is a lively part of that chatter, but even a quick search of #cyber spits back more than one can handle. To spare you that bombard- ment and confusion, FCW (@FCWnow onTwitter) suggests four particularly insightful cyber- security experts to follow. 1 Richard Bejtlich (@taosecurity), chief security strategist at FireEye Bejtlich helps his more than 27,000Twitter followers put cybersecurity in historical context. He recently mused: "Problem for aspiring #cyber historians: lack of documented primary sources. Classi cation, NDAs and culture of secrecy are some obstacles. " His feed is full of military his- tory, referencing everything from the Civil War to Richard III. It also includes the latest in cyberse- curity news and challenges to conventional wisdom. An Aug. 12 tweet wondered if widely cited security technologist Bruce Schneier s presentation at a recent hackers conference was a rehash of established ideas. 2 Richard Stiennon (@stiennon and @cyberwar), executive editor of Securi- tyCurrent and founder of IT-Harvest Stiennon is a regular commenta- tor on cybersecurity for Forbes. His recent posts have examined the possibility of another leaker at the National Security Agency and have defended former NSA Director Gen. Keith Alexander for reportedly charging six to seven gures for his consulting services. Stiennon s articulation of what he has called the "IT secu- rity mindset" could help bridge a gap between policy-makers and cybersecurity gurus. When several IT commentators lashed out at White House Cybersecu- rity Coordinator Michael Daniel for recently arguing for a less technical approach to cyber- security, Stiennon offered a measured response, saying, "It s the role that is at fault here, not Mr. Daniel or anyone else chosen to be the cybersecurity policy coordinator. " 3 Jason Healey (@Jason_ Healey), director of the Atlan- tic Council's Cyber Statecraft Initiative This cyber hand sTwitter feed offers critiques and insights into U.S. cyber policy that can only come from executive branch experience. (He was director for cyber infrastructure protection at the George W. Bush White House from 2003 to 2005.) In a recent tweet, he said NSA should not be too forceful in contributing to the government s multi-agency handling of cyber- security: "There are 9 players on the cyber ball eld; don t need any one player, much less Ft Meade, running around yelling 'I got it, I got it! " The former Air Force man has also been outspoken on the service s cybersecurity strategy: "Sad. 'Non-kinetic effects rather than desperate need for defense dominate cyber section of new Air Force strategy. " 4 Robert M. Lee (@RobertMLee), Air Force cyberspace operations of - cer and Ph.D. candidate at King's College London Lee wears many hats: He is a co-founder of Dragos Security (a control-systems security rm) and a cyberspace operations of - cer in the Air Force, givingTwitter users a rare perspective from an active-duty military of cer. Lee is notably passionate on Twitter about safeguarding IT product security. "I understand to some extent it s their own fault, but I hate seeing people get taken advantage of by security product vendors. #snakeoil, "he tweeted recently. 4 cybersecurity gurus to follow on Twitter
September 15, 2014