DISA preps milCloud to go commercial

Amber Corrin, C4ISR & Networks,  Tuesday, May 31, 2016

The Defense Information Systems Agency is ushering Defense Department organizations and users into the commercial cloud, including through issuing guidelines and standardizing security. The agency also has maintained its own classified in-house cloud solution, milCloud, but now even that capability soon will open to commercial administration.

Public cloud computing vendors: A look at strengths, weaknesses, big picture

Larry Dignan, ZDNet,  Thursday, May 26, 2016

Public cloud vendors are establishing unique characteristics that indicate the market won't be a zero-sum game that'll support multiple players. Cowen & Co. conducted a survey of 314 public cloud customers and found Amazon Web Services is the top dog with Microsoft Azure a strong No. 2. Meanwhile, IBM and Google Cloud Platform (GCP), which is grabbing more workloads, are above average in quality of IT support.

Report: In mixed cloud landscape, hybrid IT rules agencies

Eli Richman, Fierce Government IT,  Wednesday, May 25, 2016

"The findings of this year's study paint a clear picture: Cloud adoption is nearly ubiquitous, but it's not now and will not in the foreseeable future be suitable for all workloads," said Joel Dolisy, CIO of SolarWinds, in a press release. "The resulting dynamic – one set of critical on-premises services connected with another set of services in the cloud – is hybrid IT." That dynamic is being fed by agencies' dual responsibilities to both use more cloud services and ensure the security of critical systems, databases and applications, SolarWinds found.

4 things every CIO should be paying attention to

Austin Adams, Federal News Radio,  Wednesday, May 25, 2016

Agency leaders – from chief information officers to agency records officers to information security managers – are at an intersection of the technology revolution, where the cultural shift toward a digital world and the demanding requirements of security and compliance often collide. When it comes to managing information assets, agencies need tools that allow for collaboration, workflow processes and content management, and the flexibility to meet the needs of a changing content landscape – all while maintaining the security standards and structural controls that government IT demands.

Half of EU members sidle up to EC: About the data-sharing rules. C'mon. Chill out

Alexander J Martin, The Register,  Monday, May 23, 2016

Ministers from half of the European Union's 28 member states have signed a letter asking the EU Commission to drop its “barriers to the free flow of data”. The letter was sent to the EU's digitally focused folk ahead of Wednesday, when the commission will publish the findings of its inquiry into online platforms (“search engines, social media, knowledge and video sharing websites, app stores, etc.”) which took place after the publication of the EU's Digital Single Market Strategy last year. Essentially something of a cry against the EU's data protection legislation, the letter is signed by ministers from Belgium, Bulgaria, Czech Republic, Denmark, Estonia, Finland, Great Britain, Ireland, Latvia, Luxembourg, Lithuania, Poland, Slovenia and Sweden.

How to handle the new US-EU data regulations

Jamie Carter, Tech Radar,  Monday, May 23, 2016

After a long wait while bureaucrats worked out the details of new EU data protection law, the European General Data Protection Regulation (GDPR) is here – or at least, it will be in two years. In the wake of Safe Harbour and Privacy Shield, the latest data sharing agreement between the EU and the United States, the GDPR affects all businesses processing personal data, but how?

Survey: Feds see frustration in FedRAMP, not security

Aaron Boyd, Federal Times,  Monday, May 23, 2016

The Federal Risk and Authorization Management Program (FedRAMP) — the program charged with managing security accreditations for cloud vendors selling to the government — is in the midst of a renaissance but federal managers have yet to be impressed, according to a new survey. A poll of 150 federal IT managers conducted by MeriTalk showed less than half — 45 percent — believe the program has led to better cybersecurity at their agency and the vast majority — 79 percent — view FedRAMP as just another frustrating exercise in compliance.

DISA Pushes Enterprise Office Software into the Cloud

William Matthews, GovTech Works,  Thursday, May 19, 2016

When Defense Enterprise Email (DEE) launched in 2011, it offered the ultimate in collaboration: Users could share attachments even if they didn’t have the same software. It was a major step forward. Five years later, as advances in commercial communication and collaboration technology make DEE almost a cyber relic, the Pentagon is aiming to replace it with something bigger, broader and far more capable: DEOS, the Defense Enterprise Office Solution. “There are so many ways now to collaborate that simply weren’t possible when DEE 1.0 was introduced,” said David Gagliano, chief technology officer for global solutions at General Dynamics Information Technology. “Today, I can run a meeting online with a chat going in one window, voice over IP on audio, and deliver data via text-to-speech technology. These collaboration capabilities are already common in industry, but will be a dramatic leap forward for DoD users.”

Click here to receive FCW magazine for FREE! inShare Comment Building an agile government with cloud-based analytics

David Wang, FCW,  Tuesday, May 17, 2016

Unsurprisingly, the explosion of data volume, variety and velocity in the federal government has created enormous challenges for acquiring technology and talent to meet the surging data analytics need. As a result of that "analytics gap," many federal agencies are struggling to meet their mandated objectives.

How Security and Regulatory Compliance Differ

Howard Cohen, Channel Insider,  Monday, May 16, 2016

Regulatory compliance audits are designed to capture the state of a given organization's operations at a given moment in time. On the other hand, security requires a constant interaction between the management of a business and its assets. Constant scrutiny not only of the assets themselves but also of the measures put in place to protect them is an absolute requirement of an optimally secure environment.