Rise in IoT pushes government agencies to rethink security

Ryan Matthew Pierson, ReadWrite,  Tuesday, May 3, 2016

It used to be protecting your network meant keeping track of the desktop and laptop computers that access it. Then, smartphones came onto the scene, and now wearables and other IoT devices as well as the cloud computing are making it harder than ever to keep up. IoT and the cloud have both become hot-button issues in the world of information technology as good security practices are no longer just a matter of securing a single system, but every third-party system that it has connected to it, as well. “Government institutions are seeing digital transformation at an unprecedented scale, but those changes come at the price of ever-evolving security risks,” said Maria Horton, CEO of EmeSec and former CIO of the National Naval Medical Center.

On the importance of data privacy to cloud deals: Some benchmarks

Paula Barrett, IAPP Privacy Perspectives,  Tuesday, May 3, 2016

The report demonstrates that deals are in fact failing because of data privacy concerns, with both customers and suppliers choosing to walk away because of data-related concerns. Indeed amongst other notable statistics the top three reasons were data privacy and security related. Meanwhile, the commercial appetite for cloud surges and the regulatory position gets ever more complex. So this report provides some hard evidence to help customers and providers understand the importance these issues now carry and hopefully act accordingly to achieve successful conclusions.

With Microsoft’s trusted Cloud, startups and ISVs are building a safer, secure digital world

Sindu Mv, YourStory.com,  Monday, May 2, 2016

A trusted Cloud partner bridges the gap between innovation and security concerns. The right partner, technology, and processes, can help the most complex enterprise move to the Cloud with confidence. Against this backdrop, Microsoft brought together eminent security leaders for an exclusive event on April 20, to help organisations in India understand cyber risks based on industry standards and to remediate current security gaps. The summit reiterated Microsoft’s commitment to helping organisations deal with security challenges. Leaders including; Capt. Raghu Raman, President Risk, Security & New Ventures – Reliance Industries and former CEO of NATGRID; Burgess Cooper, Partner – Information & Cyber Security – E&Y, spoke extensively on cyber security. Kevin Turner set the tone of the summit with his keynote address, highlighting how we are a part of the fourth industrial revolution and how digital disruption is driving massive business disruption. He also emphasised how Microsoft is differentiating with security and privacy.

Microsoft & Google alleviate cloud fears with data privacy and security certifications

James Nunns, CBR,  Friday, April 29, 2016

Security continues to be a hot topic for public cloud vendors as concerns around meeting regulatory demands, and securing data against breaches remain a core consideration around whether or not to move to the cloud. As vendors such as Microsoft create more cloud-based services it is necessary for them to prove the security of them. Both Microsoft and Google have received boosts in this area by achieving certifications for security and privacy standards. Microsoft for starters, has revealed that its Azure ML service for predictive analytics with machine learning has achieved the standard ISO 27001 and the EU Model Clauses, as well as others.

Hybrid Cloud Environments Offer Federal Agencies the Best of Both Worlds

Bob Kirby, FedTech,  Friday, April 29, 2016

By embracing a hybrid clouds, agencies can put highly sensitive information in private clouds while using public clouds for low-cost storage.

Agencies increasingly see the cloud’s silver lining

Josh Jaquish, GCN,  Thursday, April 28, 2016

The openness to new technology is a shift for a sector that has traditionally felt that “serving the common good” meant ensuring data security via private networks. Perhaps the openness to new technology can be attributed to concerns stemming from high-profile data security breaches of recent years -- JP Morgan Chase, Target and even the U.S. government -- being several examples.

Intelligence community launches classified marketplace for cloud technology

Jared Serbu, Federal News Radio,  Thursday, April 28, 2016

The U.S. intelligence community has just opened a new marketplace for cloud applications, the idea being to let analysts and developers test-drive thousands of commercial data analytic tools for a pittance and without waiting for their agencies to make large commitments of time and money via usual government procurement channels.

Working together in Europe makes us stronger

Stephen Orfei, The Hill,  Tuesday, April 26, 2016

As we have seen in recent years, trouble often looms when stakeholders get confused by non-standard approaches to payment security. The push-and-tug of competing standards, laws, regulations and variations between countries and regions can bog companies down with trying to figure out what to do without getting clobbered by a breach and its devastating fallout. With that challenge in mind, the PCI-ECPA strategic partnership hopes to simplify the path to greater data security by helping all stakeholders achieve their goals – including governments and regulatory agencies.

Cloud will make U.S. immigration agency more agile

Kenneth Corbin, CIO,  Saturday, April 23, 2016

With those efforts, Schwartz's agency views the provision of services to citizens -- or, in his case, citizen-aspirants -- in much the same way that a private enterprise views its customers. That is, the IT department under Schwartz's leadership at CIS is trying to adopt a consumer-centric approach and deliver a clean, user-friendly experience on its digital properties.

10 Emerging Compliance and Information Governance Trends

Chris Preimesberger, eWeek,  Thursday, April 21, 2016

Not all enterprise data is created equal, nor should it all have the same protections. Numerous and well-publicized data breaches highlight the increasing need for companies to better secure truly sensitive data. Social media, cloud-based data storage and a growing bring-your-own-device (BYOD) work environment also are creating a big data perfect storm. This threat is beginning to overwhelm legal departments. In-house counsel concerns range from identification and collection of disparate information to the cost and security of the entire e-discovery process. While many organizations lack executive support for information governance, and others feel hampered from executing on small, tactical projects due to their legal or regulatory profile, it is important to prepare for the emerging trends and challenges that will have an impact on compliance efforts in the coming year.