|
Date (yyyy-mm-dd) |
Outlet | Title | Description |
|---|---|---|---|
| 2022-04-10 | Washington Executive Magazine | Accenture Federal Services Hires CrowdStrike Cyber Exec Shawn Wells | Accenture Federal Services has added cybersecurity executive Shawn Wells to its cybersecurity practice as managing director of cybersecurity strategy and technology. |
| 2022-04-08 | Washington Business Journal | People on the Move - Shawn Wells | Shawn Wells has joined Accenture Federal Services’ cybersecurity practice in the role of Managing Director, Cybersecurity Strategy and Technology |
| 2022-04-06 | ExecutiveGov | Industry Veteran Shawn Wells Appointed to Accenture Federal Cybersecurity Function | Former CrowdStrike executive Shawn Wells has been added to the cybersecurity division at Accenture’s federal business. |
| 2020-05-01 | Book Sprints Ltd | OpenShift Security Guide: our first virtual Book Sprint experience | In April we facilitated our first fully virtual Book Sprint with Red Hat, and we are thrilled to share that OpenShift Security Guide was released for Kindle on May 8th on Amazon, where the book is already #1 new release and #13 in the system administration ranks! |
| 2019-11-12 | WashingtonExec Magazine | 2019 Pinnacle Awards: Cybersecurity Industry Exec of the Year Shawn Wells, Red Hat | Shawn Wells, senior principal and chief security strategist of Red Hat‘s U.S. public sector, has won the WashingtonExec Pinnacle Award for the Cybersecurity Industry Executive of the Year. |
| 2019-11-03 | WashingtonExec Magazine | 2019 Pinnacle Awards Winners Revealed | WashingtonExec on Oct. 31 announced the winners of the second annual Pinnacle Awards before an audience of over 525 GovCon leaders, influencers and government innovators. The Judges Committee received hundreds of nominations across 18 categories, making it a challenge to down-select the 75 finalists. |
| 2019-10-15 | WashingtonExec Magazine | Finalists Announced for Second Annual WashingtonExec Pinnacle Awards | WashingtonExec — with presenting sponsor Bloomberg Government—announced today the finalists for its Pinnacle Awards, which honor successful executives and businesses spurring innovation for federal clients across the region. |
| 2018-11-05 | ExecutiveBiz | Red Hat, Army School Adopt ‘Open Organization’ Model to Encourage Cyber Workforce Productivity; Shawn Wells Quoted | Red Hat has implemented an “open organization” approach that allows public-serving cybersecurity teams to assess employee performance and outcome of missions. In an article posted Friday on Federal News Network, the company noted the U.S. Army‘s Cyber School at Fort Gordon in Georgia also uses the model to train soldiers in cyber-related projects. |
| 2018-11-02 | WTOP News | Enabling the cyber workforce through the Open Organization | Cyber professionals must not only be trained with the proper skill sets, they must be empowered and motivated to move beyond traditional role-based jobs to concentrate on mission-focused outcomes. |
| 2018-10-31 | State Tech Magazine | How States Need to Tackle Cybersecurity | State CIOs can save millions and enhance IT security by applying the federal government’s cybersecurity practices. |
| 2018-10-04 | CivSource Online | Navigating the Cybersecurity Cyclone | Hurricane season is upon us, and many state and local governments are preparing their emergency response teams. But even as agencies prepare for high winds and flooding rains, they are already feeling the effects of a different type of storm: a cybersecurity cyclone that has been gathering steam for years and is now right at their doorsteps. |
| 2018-09-25 | GovLoop | How Federal Cybersecurity Standards Reach State, Local Governments | Government agencies have long battled with how to operate efficiently while innovating effectively for the future. Technology advancements have made iterating through experimentation relatively inexpensive, helping learning and innovation occur faster. |
| 2018-09-12 | Red Hat Corporate Blog | Red Hat’s OPEN FIRST road tour rolls on -- and into D.C. | Two years ago, the U.S. government took an important step towards its technological future. The issuance of the Federal Source Code Policy in 2016 called for "efficiency, transparency, and innovation through reusable and open source software." Since then, a number of important programs and initiatives have been created, including Code.gov, code.mil and others. Yet we believe there is still a significant amount of untapped potential for open source in government. That’s why we have created the Red Hat OPEN FIRST Road Tour, a nationwide seminar series aimed at bringing the open source discussion to government leaders across the U.S. |
| 2018-07-26 | GovLoop | How Federal Cybersecurity Standards Reach State, Local Governments. An interview with Shawn Wells (page 17) | Shawn Wells, senior principal and chief security strategist of Red Hat‘s U.S. public sector, has won the WashingtonExec Pinnacle Award for the Cybersecurity Industry Executive of the Year. |
| 2018-07-26 | GovLoop | The Value of Cybersecurity Standards At All Levels of Government | The federal government is responsible for numerous agencies, so unifying cybersecurity best practices and standards across them keeps the entire enterprise in lockstep together. Cybersecurity standards that are good enough for the federal government can prove equally beneficial to its state and local counterparts, however, while keeping all three on the same page nationwide. |
| 2018-05-29 | The Business Monthly | 2018 Cyber Conference: Navigating the Security Pitfalls of a Connected World | The GovConnects program has been organizing and hosting a Cyber Conference for eight years now, and it has become a can’t miss event for anyone working in cybersecurity or related fields in the region. |
| 2017-10-11 | WTOP News | Immutable infrastructure can ease agencies into agile, DevOps | Automation is a key technology helping IT organizations deploy, take apart, and reload technologies into production without human intervention. But once technology is deployed, federal managers want to make sure that systems can’t be misconfigured and infrastructure components aren’t altered once they have been approved. |
| 2017-08-01 | AFCEA Fort Knox Gold Vault Chapter | August AFCEA Fort Knox Gold Vault Chapter Newsletter | You are cordially invited to join our luncheon at the next Gold Vault Chapter General Membership Meeting! This event will be held on September 14th, 2017 at the Saber & Quill and is sponsored by CoreSys and Red Hat Enterprise Linux (RHEL). The event time will be 11:30-1, check-in begins at 11:00. We are excited to announce that Mr. Shawn Wells, Chief Security Strategist of Red Hat will be our special guest speaker |
| 2017-07-12 | GovLoop | Changing the Open Hybrid Cloud Game | In GovLoop’s Gov Security in a Digital World Virtual Summit, Harold Wong, Cloud Architect at Microsoft and Shawn Wells, Chief Security Strategist in Red Hat’s Public Sector, teamed up to provide architectural guidance on deploying Red Hat OpenShift Container Platform in Azure Government, which is a hybrid cloud solution. |
| 2017-07-12 | GovLoop | The New Era of Digital Security | As citizens demand digital access and more software is delivered as a service, government organizations need new technologies to offer these services. But adopting them makes security and regulatory compliance more difficult. In addition, securing devices and infrastructure that are outside of your environment is a key challenge. |
| 2017-04-28 | FCW Magazine | Why Compliance Demands a DevOps Approach | This classic “waterfall” approach to the creation of security and compliance procedures is in direct contrast to the fast and agile DevOps approach to application development that many agencies embrace today. |
| 2016-11-01 | Army News Service | Partnerships Answer Dilemma in Army Cyber | The once-innovative auto industry has trouble keeping pace with new developments of autonomous vehicles, sensors and information technology gadgets going into their cars. Likewise, the Army has trouble keeping up with new cyber technologies used by adversaries against the United States. |
| 2016-10-28 | Fort Gordon News | Clockspeed Dilemma Hobbling Army Cyber | Frustration with the pace of integrating new technologies within Army cyber can be likened to the 'clockspeed dilemma,' a term applied recently to the auto industry, said Brig. Gen. Patricia Frost. |
| 2016-10-12 | U.S. Army | 'Clockspeed dilemma' hobbling Army cyber, but partnerships may be answer | Frustration with the pace of integrating new technologies within Army cyber can be likened to the 'clockspeed dilemma,' a term applied recently to the auto industry, said Brig. Gen. Patricia Frost. |
| 2016-08-03 | SIGNAL Magazine | Facing the Truth on Cyber | On day two of the AFCEA TechNet Augusta conference, cyber experts from across the military and industry openly and bluntly discussed the challenges of cybersecurity. |
| 2016-08-03 | SIGNAL Magazine | When Hackers Corrupt GPS Data | When a hacker talks about a novel way to disrupt the power grid, people listen. At least that was the case on day two of the AFCEA TechNet Augusta conference taking place in Augusta, Georgia. |
| 2016-06-30 | Red Hat Developer | DevNation Blog: End-to-end OpenSCAP for automated compliance | OpenSCAP is a security framework for determining the compliance of a system to some defined set of standards. Jeffrey Blank of the National Security Agency and Shawn Wells of Red Hat gave their talk on automated compliance. |
| 2015-08-27 | Red Hat Blog | Defense in Depth Event Will Bring Red Hat Summit's Security Focus to the Beltway | We spent a lot of time discussing security at Red Hat Summit, but we understand that for those of us working inside the beltway, it might be difficult to attend the event to learn more about open source software and its place in government agencies. That's why we're bringing those conversations to you – with Red Hat's Defense in Depth 2015 event. |
| 2015-01-21 | iTEN Wired | iTEN Wired 2013 Interview: Shawn Wells of Red Hat | Interview: Shawn Wells of Red Hat and morning keynote speaker. |
| 2014-11-30 | FCW Magazine | FCW Rising Star Award | When Shawn Wells, director of innovation programs for Red Hat's U.S. public-sector group, wrote a security guide for the open-source Security Content Automation Protocol, he was moving forward on an idea that most people weren't even talking about yet. |
| 2014-11-25 | opensource.com | 2014: Year of Open Source Miracles | Open source software is still software and vulnerabilities are expected. Unlike a filesystem bug or a kernel panic, they cause no pain until they strike. |
| 2013-12-02 | Inside HPC Magazine | Big Savings with Multi-level Security in Altair PBS Pro | In this video from SC13, Shawn Wells from Red Hat, Inc. describes how the company’s MLS technology works in PBS Professional. |
| 2009-12-01 | Red Hat Blog | Where’s Red Hat this December? | If there’s any way to say good bye to 2009 with a bang, then Red Hat knows how to do it! The year 2009 may be closing out in a month, but Red Hat has events to keep you busy and up-to-date on the open source world before we enter 2010. |
| 2009-09-09 | Dark Reading | Trusted Computer Solutions Introduces Automated Lock Down Solution | Trusted Computer Solutions, Inc. (TCS), a leading developer of cross domain and cyber security solutions, today announced that Security Blanket, the company's award-winning automated lock down solution, is now available for Red Hat Enterprise Linux 5 operating systems running on IBM System z hardware. |
| 2009-07-01 | Altair Press Release | Lockheed Martin Improves Security Capabilities and Reduces HPC Costs with Altair PBS Professional™ | Security is critically important for government computing systems, so when the experts at Lockheed Martin are tasked with configuring one, they use Red Hat® Enterprise Linux® cross-domain system (CDS) configurations for multi-level security (MLS) — enabling users and data at different security levels to share the same resources including hardware, operating systems, and disks. The MLS policy and other features built into Red Hat Enterprise Linux enable role-based access control (RBAC), automated auditing, and many other security features. |