Tech Tip: Is It Time for Cybersecurity Planning

December 17, 2018

There are great resources out there for businesses that just don’t know where to start with cybersecurity, and the time to make plans is now.

Time Taps ‘The Guardians’

December 13, 2018

The magazine again chose a group of individuals, dubbed them “The Guardians” and honored them for being individuals “who have taken great risks in pursuit of greater truths.”    

Capitol Buzz: Finger Food, Pelosi Vote, Her Grandkids

December 10, 2018

This week’s column explains the “toothpick rule,” Nancy Pelosi’s apparent two-vote margin to be elected speaker of the House and the nonpartisan affection for congressional grandchildren.

Tech Tip: Should My Computer Be Encrypted?


With the drive encrypted, a thief can’t just pull it out, hook it up and suddenly have access to all your files. At least you’ve made it pretty hard to get to your data.

Capitol Buzz: Lots of Goodbyes

December 3, 2018

Our columnist reports on the loss of George H.W. Bush and the departure (and arrival) of representatives and senators, also recommending some novels and memoirs.

Tech Tip: New Quarter, New Password


Maintaining separate passwords, and changing them at least every three months, is a lot of work, but the cybersociety we live in demands it.

Farewell to Bush ’41’: His Character Counted


George H.W. Bush’s presidency — his legacy — was astonishingly thick with events that others might not have handled nearly as well. 

Capitol Buzz: Mika & Joe’s Wedding, Alexandria’s Office, Gary’s Saga

November 26, 2018

In this week’s column, our correspondent looks at incidents in the lives of some of the Hill’s most topical personalities, past and present.

DC Chamber Lunch and Learn, Nov. 29


Rachel E. Ferebee, marketing solutions specialist at Page Global Organic Cyber Solutions, will present on the topic of “Bridging the Gap,” discussing 21st-century business issues.

Tech Tip: Do You Allow Guests to Access Your WiFi Network?


If you give out your password, you’re practically opening the door for anyone to come in and steal private information and infect your private computers.