The Expanding Use of Virtual Reality in the Military

Virtual Reality (VR) has strong roots in the military. Long used for training and simulations, the military has helped develop VR technology and continues to innovate in how it can be used. VR continues to be invaluable to tactical, mission training but is also being used in other training areas. For example, the Virtual Welder Trainer program simulates multiple welding processes, blending real world and computer-generated images into a VR environment to allow welders to train without having to use real world resources. Just as flight simulators save money in terms of aircraft use, other virtual reality in military training applications provide similar cost savings in terms of equipment and travel.

Designing and Maintaining Military Equipment

VR is being utilized in all aspects of equipment management. In the design phase, VR can help engineers test designs in combat environments. It can also help determine if a piece of equipment designed for one scenario might work in another and what changes would have to be made to ensure products can operate in a desert environment as well as in cold and rainy climates. Continue reading

Schools Have to Learn the ABCs of Ransomware

Ransomware has traditionally been a practice where cybercriminals encrypt data and demand ransom in exchange for a decryption key. More recently, a growing number of these bad actors threaten to make this information public if they do not get paid. This shift in the practice of ransomware has increased the "attractiveness" of K-12 schools for cyber criminals. Information about children is among the most highly protected data there is, making it more likely ransoms will be paid to keep it private. For this and other reasons, K-12 schools are seeing an increase in ransomware activity. In 2021, there were at least 62 reported ransomware cases as compared to only 11 in 2018. 2021 also saw ransomware as the most common cyber incident for K-12 schools for the first time ever.

What Gets Compromised in a Ransomware Attack?

An incident in 2020 involving Fairfax County, VA Public Schools resulted in employee social security numbers being posted online. Hackers targeting a school district in Allen, Texas emailed parents with threats to expose their childs' personal information if educators did not pay a ransom. Showing the full swing of ransomware impacts from the serious to the mundane, a 2022 attack on the Griggsville-Perry School District in Indiana had many records compromised and leaked including a detention slip from December 2014 for a student who would not stop interrupting his health class. This shows the breadth of access that hackers had to documents and has led many schools to reexamine their file retention policy to reduce the amount of data accessible to bad actors. Continue reading

Facing the Future of Biometrics

With many of us using our faces to "open" our phones, biometric technology has become an everyday consumer technology. Capitalizing on the comfort and ease of use of facial recognition, government agencies are looking to incorporate it (and other biometric methods) into their modern cybersecurity plans and approaches but are realizing implementation in a government setting raises a host of complications.

Interest in facial recognition is strong

The U.S. Government Accountability Office (GAO) released a report in August of 2021 that detailed current and planned use of facial recognition technology by federal agencies. In a survey of 24 departments and agencies it found that 18 reported using the technology and 10 reported plans to expand their use of it. Continue reading

Are We There Yet? The Future of Modernization

There's no shortage of mandates and guidance related to modernization-PMA, Technology Modernization Fund, FITARA, Cyber EO, CX EO-pushing the government to update how they deliver services online, but what does it really mean, and what is involved?

Modernization in government began with transforming data centers and integrating cloud computing into government IT architectures and moved on to improving customer experience. Agencies have made inroads in all areas. The recent FITARA scorecard showed that data center consolidation goals have been completed. Cloud efforts have moved from Cloud First to Cloud Smart in an effort to ensure cloud was just not a checkbox but was being used to transform how the government consumes and distributes IT services. Citizen Experience (CX) has been a priority across three administrations with the next generation of CX efforts outlined in an executive order. These modernization efforts have resulted in billions of dollars in cost savings and increased efficiency for a government workforce that is now telework friendly, but the work is not done. Continue reading

Recognizing and Celebrating Women in Technology

March is Women's History Month, a time to reflect on the contributions women have made to history, culture, and society. The technology industry is one area where the contribution of women has been greatly under-reported. In fact, some of the innovations that are the cornerstone of today's tech were developed by women. Continue reading