Cyber assurance for government mission accomplishment

Government Cyber Assurance

Subscribe to Government Cyber Assurance: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Government Cyber Assurance: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories

Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis communication service to receive a Federal Risk and Authorization Management Program (FedRAMP) authorization from the United States Government for its AtHoc Alert and AtHoc Connect services. If you're not familiar with FedRAMP, it is a US government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The Blackberry certification was sponsored by the US Federal Aviation Administration. While you may not need a US Government certified solution in an emergency, your organization may really want to consider the benefits of cloud computing for crisis response. From a communications point of view, companies can... (more)

Cloudy Thinking and Digital Transformation | @CloudExpo #DX #Cloud #Analytics

(Originally posted on the Engility Corporation Blog) There's a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and information from the infrastructure on which it lies. A process that is a LOT more involved than dragging some folders from your desktop to a shared drive. Cloud computing as a mission transformation activity, not a technological one. As an organization moves from local information hosting to the cloud, one of the most important challenges is addressing cloud computing as a mission transformation activity, not a technological one. Cloud computing isn't a new technology. It's a new way of consuming and provisioning information technology services. Adopting cloud computing means paralleling your mission processes, rethinking the economic models and abstracting your applicati... (more)

Blockchain Business Innovation | @CloudExpo #Cloud #FinTech #Blockchain

Is there more than bitcoin to blockchain? Absolutely, because today's blockchain is opening up a pathtowards the delivery of trusted online services. To understand this statement, you need to see blockchain as more that it's more famous bitcoin use case. As a fundamental digital tool, blockchain is a shared, immutable ledger for recording the history of transactions. If used in this fashion, it can enable transactional applications that can have embedded trust, accountability and transparency attributes. Instead of having a Bitcoin blockchain that is reliant on the exchange of cryptocurrencies with anonymous users on a public network, a Business blockchain can provide a permissioned network with known and verified identities. With this kind of transactional visibility, all activities within that network are observable and auditable by every network user. This end-to... (more)

Both Sides of Enterprise Mobility | @CloudExpo #Cloud #Mobile #DigitalTransformation

Enterprise mobility has become table stakes in the world of business. The ability to access current information at any time, from anywhere, on any device has really become a cliché. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.  This reality is driven by the fact that companies must actually have two mobile strategies. The first face of mobility is an inside strategy focused on supporting employees and business partners. From this viewpoint, mobility becomes the central point of access and the management tool for corporate information and intelligence. The organizational goal here is to introduce context to business processes in order to offer viable options and drive better decisions. An additional benefit of this capability is to create fr... (more)

Digital Transformation Driven by ITaaS | @CloudExpo #Cloud #ITaaS #DigitalTransformation

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure. Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlow stands today as the d... (more)

TeamDrive Partners with SmartOffice to Offer First Office Productivity Solution with End-to-End Encryption

Empower your mobile workforce and prevent data leakage with TeamDrive Secure Office. Register to be notified when a free 30-day trial becomes available at http://www.teamdrive.com/ Hamburg, Germany - 23 April 2013 - Enterprise cloud provider TeamDrive Systems, a 2012 IT Security Award winner, today announced it is integrating document viewing and editing tools from SmartOffice Technologies to create a fully secure office productivity solution called TeamDrive Secure Office. Scheduled for release this spring, TeamDrive Secure Office is believed to be the first technology of its kind to address the corporate and government need for complete, end-to-end encryption when sharing data between multiple users and mobile devices. With TeamDrive Secure Office, shared documents will never leave the secure environment created by TeamDrive and SmartOffice. Even when workers acce... (more)

Cloud Computing Forensics Readiness | @CloudExpo #API #Cloud #Security

In today's globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access and trust computer log data in the identification of a breach and the determination of what datasets may have been compromised. As organizations rapidly move into the cloud, the complexities of this multi-jurisdictional and multi-tenancy environment has made the importance of cloud forensics even more pronounced. This reality has also drastically heightened the legal risk associated with information technology operations. Cloud and digital forensics readiness are therefore critical to business disaster recovery, continuity of business services and cloud ecosystem management. The benefits of digital forensic readiness include: Reducing the cost of cyber investigations; Quick determination of re... (more)

How Quantum Computing with DNA Storage Will Affect Your Health | @CloudExpo #Cloud #Storage

How Quantum Computing with DNA Storage Will Affect Your Health By Guest Contributor Taran Volckhausen Contributing Editor at Vector Moore's Law, which states that processing speeds will double every two years as we cram more and more silicon transistors onto chips, has been faltering since the early 2000s when the law started to run up against fundamental limitations presented by the laws of thermodynamics. While the chip industry, with Intel leading the charge, has found ways to sidestep the limitations up until now, many are now saying that despite the industry's best efforts, the stunning gains in processor speeds will not be seen again by the simple application of Moore's Law. In fact, there is evidence to show that we are reaching the plateau for the number of transistors that will fit on a single chip. Intel has even suggested silicon transistors can only keep ... (more)

36 Shades of Hybrid IT | @CloudExpo #PaaS #SaaS #AI #DigitalTransformation

Everyone has heard of the 50 Shades of Grey. But do you know the "36 Shades of Hybrid IT"? These shades are a new way of describing the 36 point solutions across a hybrid IT environment. Enterprises looking to transform the way information technology is leveraged should evaluate their options by analyzing a transition across three specific high-level domains and their relevant sub-domains, namely: IT Implementation Model Traditional Managed Service Provider Cloud Service Provider Technology Service Model Infrastructure-as-a-Service Platform-as-a-Service Software-as-a-Service Deployment Model Private Hybrid Community Public Combinatorically (3 IT Models x 3 Service Models x 4 Deployment Models = 36 options) these components are used to identify the "36 Shades of Hybrid IT". These domains and sub-domain outline a structured decision process that aims to place the rig... (more)

NATO ACT 'Art of the Possible' Interoperability Demonstration

NATO ACT 'Art of the Possible' Interoperability Demonstration GovCloud Network is proud to have served as the Program Manager for the NATO Allied Command Transformation, "Art of the Possible" Interoperability Demonstration on December 16, 2016. supporting the The Network Centric Operations Industry Consortium (NCOIC), this effort featured an important demonstration for military, government and business leaders by its member-companies to underscore the benefits of collaborating via an interoperable network environment. The demonstration used a secure, federated-cloud infrastructure to highlight the consortium's work over the past few years in how to develop a trusted environment, including governance processes and federation management as well as interoperability verification. This demonstration itself is an outgrowth of  the NCOIC Interoperability Verification (IV)... (more)

The BYOD Problem | @CloudExpo #Cloud #Mobile #Security

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on "Bring Your Own Device" (BYOD). The key trends influencing enterprise BYOD and mobile security line up as follows: Increased employee mobility (63%), satisfaction (56%) and productivity (55%) dominate as the top drivers of BYOD. These employee related drivers are considered more important than reduced costs (47%). Security (39%) and employee privacy (12%) are the biggest inhibitors of BYOD adoption. 20% of surveyed organizations have suffered a mobile security breach, primarily driven by malware and malicious WiFi. Security threats to BYOD... (more)