Properly planned and well-executed, cloud migration can result in significant savings, increased efficiency and performance, and even enhanced privacy and security. This section of the SafeGov.org site includes case studies of cloud deployments with the goal of articulating best practices and potential pitfalls by focusing on the risk management, strategic planning, and resource management issues that define a successful cloud transition.
Wednesday, August 20, 2014
Mobile malware continues to proliferate, particularly on Android devices. These four steps help counter the threat. It often happens without you knowing. Malware takes over your smartphone or tablet, exploiting vulnerabilities and trolling for information. Perhaps the processing speed on your smartphone slows down. Or a preview of a text message that you didn't write temporarily pops up on your screen. These and other clues lead you to become suspicious that someone has access to your device and data.
Jane Snowdon, FederalTimes, Friday, July 18, 2014
Many regulations, laws, and industry guidelines govern how sensitive personal information and regulated data are managed in the healthcare, banking, and financial industries. Improper release of regulated or sensitive information can result in significant consequences and damage, making compliance with government regulatory acts and industry guidelines paramount.
Tuesday, July 15, 2014
From my vantage point data centers are really about four distinct services. They represent the compute power, the storage capability, the network (delivery) system and finally a structured place to build security solutions. So based on my view let’s take a look at what the data center of tomorrow might look like.
Monday, May 19, 2014
Cloud migrations are expanding as are the supported workloads in the cloud today. Several analysts have pegged the percentage of workloads that can be run in the cloud to be at 80% by 2017. That means that there are workloads that in theory won’t run in the cloud.
The Chertoff Group
Friday, May 02, 2014
On May 1st the Administration released its long-awaited, review of Big Data -- a report from the Executive Office of the President on the phenomenon of large-scale data collection and analysis. The report is likely to set the framework for the policy debate over Big Data for the next 5 years – and that will have significant implications for many cloud applications. Those who collect and aggregate data are going to have to be more proactive and responsible; and that’s a likely sea change. In many ways the report is an excellent summary of the phenomenon of Big Data as it is used today. It collects, in one place, a remarkably concise compendium of information, including contemporary use models for big data; existing government initiatives; and taxonomy of policy questions that arise from new data analytics.
Wednesday, April 30, 2014
The concept of cloud broker and cost remains an interesting question. It’s one that I have looked at from a number of angles over the past year and I’ve come to some interesting conclusions as a result.
Aimee Chanthadavong, ZDNet, Friday, April 11, 2014
The NSW government is giving more than 50 industry companies the opportunity to offer on-premise cloud services through its GovDC Marketplace to its agencies.
Tuesday, March 25, 2014
A California lawsuit suggests the federal government must take stronger steps to protect government data from data mining and user profiling by cloud service providers. In the technology-rich world we live in, it's critical for everyone to understand how their data is processed and used. For the government, it is arguably even more important, given the massive amounts of sensitive citizen data it possesses and stores.
Tuesday, March 04, 2014
Last year at this time, I wrote about the introduction of Samsung KNOX, Samsung’s enhanced version of Android with unique security and enterprise features. At the time I was very excited to see this type of solution as I felt it met a critical need for business and government customers who wanted to use Android devices.