Security

Richard Falkenrath on Cybersecurity, Liability

Richard A. Falkenrath by Richard A. Falkenrath, Chertoff Group
Tuesday, January 31, 2012

Richard Falkenrath, a principal at the Chertoff Group and a Bloomberg Television contributing editor, talks about the findings of a Bloomberg Government study on cybersecurity.

Data, Data everywhere and not a drop to drink, why cloud hosters will change security forever

Scott Andersen by Scott Andersen, Lockheed Martin
Monday, January 30, 2012

In a hosting scenario there are two new layers of complexity that offer interesting albeit not stronger security scenarios.

Can cloud-based collaborative data-sharing be secure enough for defense systems?

Ellen Messmer, Network World,  Wednesday, January 25, 2012

Though wariness about the perceived lack of security in cloud-based services is often voiced, there are some situations where the opposite is the case. Some businesses mindful of security say the cloud services that are important to them have done a lot of work to meet their expectations about security.

Homeland Security Going to the Cloud?

Michael Chertoff by Michael Chertoff, Chertoff Group
Wednesday, January 25, 2012

Chertoff Group Chairman and SafeGov.org expert Michael Chertoff weighs in on the benefits and downfalls of cloud storage.

U.S. Government Online Security Website Hacked

John Riberio, CIO,  Tuesday, January 24, 2012

Hackers under the AntiSec banner appeared to have hacked late Monday the website of OnGuardOnline.gov, the U.S. federal government's online security website, in protest against controversial legislation.

DOD to allow Android on classified networks

Amber Corrin, Federal Computer Week,  Tuesday, January 24, 2012

New security standards expected to be approved soon would let devices powered by the Android operating system use the Defense Department's classified networks, according to an Army official.

The Uncertainty of Mobile Device Security

H. Bryan CunninghamGeneral Michael Hayden by Bryan Cunningham, Cunningham Levy LLP
General Michael Hayden, Chertoff Group
Thursday, January 19, 2012

At the beginning of his Administration, President Obama created a minor controversy by insisting on using a personal mobile device, but much of that debate, such that it was, revolved around Presidential records. Little was said, at least publicly, about the profound security implications of the Commander in Chief sending and receiving important, possibly vital, information through cyberspace. Appropriately, even less was known about the type of data President Obama accesses, creates, and stores on the device, and the degree to which any such data is stored in “the cloud,” particularly in non-government-controlled cloud storage. What is known, however, is that mobile devices are the most prevalent, and most rapidly expanding, gateways to all types of cloud services.

Foreign Cloud Privacy Issues Dismissed by U.S. Officials

Kenneth Corbin, CIO,  Thursday, January 19, 2012

A pair of senior Obama administration officials on Wednesday sought to tamp down recent stirrings of controversy over the privacy protections under U.S. law surrounding content stored in the cloud residing in data centers in foreign jurisdictions.

Who Else is Watching Our Transition to the Cloud?

Richard A. Falkenrath by Richard A. Falkenrath, Chertoff Group
Thursday, January 19, 2012

When the then-Chief Information Officer of the U.S. government, Vivek Kundra, announced a new "Cloud First" policy for the federal government, he was communicating mainly to the U.S. officials responsible for procuring their agencies' information technology and the vendors that support them. But the buyers and sellers of federal information technology were not the only people listening to Kundra; also listening were intelligence officers from foreign governments whose job it is to steal data from the U.S. government.

Could agencies' individual needs break FedRAMP?

Rutrell Yasin, Government Computer News,  Thursday, January 19, 2012

Federal agencies tend to have their own set of compliance issues and special modification requirements, which could break a program such as The Federal Risk Authorization Management Program, which seeks to establish a standardized approach to the security authorization process for cloud products and services, some industry observers told a Washington audience.