Richard A. Falkenrath,
Tuesday, January 31, 2012
Richard Falkenrath, a principal at the Chertoff Group and a Bloomberg Television contributing editor, talks about the findings of a Bloomberg Government study on cybersecurity.
Monday, January 30, 2012
In a hosting scenario there are two new layers of complexity that offer interesting albeit not stronger security scenarios.
Ellen Messmer, Network World, Wednesday, January 25, 2012
Though wariness about the perceived lack of security in cloud-based services is often voiced, there are some situations where the opposite is the case. Some businesses mindful of security say the cloud services that are important to them have done a lot of work to meet their expectations about security.
John Riberio, CIO, Tuesday, January 24, 2012
Hackers under the AntiSec banner appeared to have hacked late Monday the website of OnGuardOnline.gov, the U.S. federal government's online security website, in protest against controversial legislation.
Amber Corrin, Federal Computer Week, Tuesday, January 24, 2012
New security standards expected to be approved soon would let devices powered by the Android operating system use the Defense Department's classified networks, according to an Army official.
At the beginning of his Administration, President Obama created a minor controversy by insisting on using a personal mobile device, but much of that debate, such that it was, revolved around Presidential records. Little was said, at least publicly, about the profound security implications of the Commander in Chief sending and receiving important, possibly vital, information through cyberspace. Appropriately, even less was known about the type of data President Obama accesses, creates, and stores on the device, and the degree to which any such data is stored in “the cloud,” particularly in non-government-controlled cloud storage. What is known, however, is that mobile devices are the most prevalent, and most rapidly expanding, gateways to all types of cloud services.
Kenneth Corbin, CIO, Thursday, January 19, 2012
A pair of senior Obama administration officials on Wednesday sought to tamp down recent stirrings of controversy over the privacy protections under U.S. law surrounding content stored in the cloud residing in data centers in foreign jurisdictions.
Richard A. Falkenrath,
Thursday, January 19, 2012
When the then-Chief Information Officer of the U.S. government, Vivek Kundra, announced a new "Cloud First" policy for the federal government, he was communicating mainly to the U.S. officials responsible for procuring their agencies' information technology and the vendors that support them. But the buyers and sellers of federal information technology were not the only people listening to Kundra; also listening were intelligence officers from foreign governments whose job it is to steal data from the U.S. government.
Rutrell Yasin, Government Computer News, Thursday, January 19, 2012
Federal agencies tend to have their own set of compliance issues and special modification requirements, which could break a program such as The Federal Risk Authorization Management Program, which seeks to establish a standardized approach to the security authorization process for cloud products and services, some industry observers told a Washington audience.